Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
FJRUb5lb9m.exe

Overview

General Information

Sample name:FJRUb5lb9m.exe
renamed because original name is a hash value
Original sample name:dd0cbee3fccd6992b6441f30f51b452caaa7cfc79edd13204fa4099a19421525.exe
Analysis ID:1588680
MD5:896cef1e1ce8fb012437f05a81195d27
SHA1:b825b626e64342dd5c3162ccd3df9c8c7c593f7b
SHA256:dd0cbee3fccd6992b6441f30f51b452caaa7cfc79edd13204fa4099a19421525
Tags:exeFormbookuser-adrian__luca
Infos:

Detection

FormBook
Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected FormBook
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Switches to a custom stack to bypass stack traces
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Writes to foreign memory regions
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Sample file is different than original file name gathered from version info
Sigma detected: Uncommon Svchost Parent Process
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • FJRUb5lb9m.exe (PID: 1964 cmdline: "C:\Users\user\Desktop\FJRUb5lb9m.exe" MD5: 896CEF1E1CE8FB012437F05A81195D27)
    • svchost.exe (PID: 1380 cmdline: "C:\Users\user\Desktop\FJRUb5lb9m.exe" MD5: 1ED18311E3DA35942DB37D15FA40CC5B)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000002.00000002.1542995143.0000000000400000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
    00000002.00000002.1543024692.0000000000520000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
      SourceRuleDescriptionAuthorStrings
      2.2.svchost.exe.400000.0.raw.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
        2.2.svchost.exe.400000.0.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security

          System Summary

          barindex
          Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Users\user\Desktop\FJRUb5lb9m.exe", CommandLine: "C:\Users\user\Desktop\FJRUb5lb9m.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\FJRUb5lb9m.exe", ParentImage: C:\Users\user\Desktop\FJRUb5lb9m.exe, ParentProcessId: 1964, ParentProcessName: FJRUb5lb9m.exe, ProcessCommandLine: "C:\Users\user\Desktop\FJRUb5lb9m.exe", ProcessId: 1380, ProcessName: svchost.exe
          Source: Process startedAuthor: vburov: Data: Command: "C:\Users\user\Desktop\FJRUb5lb9m.exe", CommandLine: "C:\Users\user\Desktop\FJRUb5lb9m.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\FJRUb5lb9m.exe", ParentImage: C:\Users\user\Desktop\FJRUb5lb9m.exe, ParentProcessId: 1964, ParentProcessName: FJRUb5lb9m.exe, ProcessCommandLine: "C:\Users\user\Desktop\FJRUb5lb9m.exe", ProcessId: 1380, ProcessName: svchost.exe
          No Suricata rule has matched

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: FJRUb5lb9m.exeReversingLabs: Detection: 65%
          Source: FJRUb5lb9m.exeVirustotal: Detection: 51%Perma Link
          Source: Yara matchFile source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000002.00000002.1542995143.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.1543024692.0000000000520000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
          Source: FJRUb5lb9m.exeJoe Sandbox ML: detected
          Source: FJRUb5lb9m.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
          Source: Binary string: wntdll.pdbUGP source: FJRUb5lb9m.exe, 00000000.00000003.1361828125.0000000003D40000.00000004.00001000.00020000.00000000.sdmp, FJRUb5lb9m.exe, 00000000.00000003.1361540015.0000000003EE0000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1499116420.0000000002E00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1491513974.0000000000A00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1543331375.0000000000B9E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1543331375.0000000000A00000.00000040.00001000.00020000.00000000.sdmp
          Source: Binary string: wntdll.pdb source: FJRUb5lb9m.exe, 00000000.00000003.1361828125.0000000003D40000.00000004.00001000.00020000.00000000.sdmp, FJRUb5lb9m.exe, 00000000.00000003.1361540015.0000000003EE0000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000002.00000003.1499116420.0000000002E00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1491513974.0000000000A00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1543331375.0000000000B9E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1543331375.0000000000A00000.00000040.00001000.00020000.00000000.sdmp
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeCode function: 0_2_0106445A GetFileAttributesW,FindFirstFileW,FindClose,0_2_0106445A
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeCode function: 0_2_0106C75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_0106C75C
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeCode function: 0_2_0106C6D1 FindFirstFileW,FindClose,0_2_0106C6D1
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeCode function: 0_2_0106EF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0106EF95
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeCode function: 0_2_0106F0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0106F0F2
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeCode function: 0_2_0106F3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0106F3F3
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeCode function: 0_2_010637EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_010637EF
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeCode function: 0_2_01063B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_01063B12
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeCode function: 0_2_0106BCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0106BCBC
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeCode function: 0_2_010722EE InternetReadFile,InternetQueryDataAvailable,InternetReadFile,0_2_010722EE
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeCode function: 0_2_01074164 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_01074164
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeCode function: 0_2_01074164 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_01074164
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeCode function: 0_2_01073F66 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_01073F66
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeCode function: 0_2_0106001C GetKeyboardState,SetKeyboardState,GetAsyncKeyState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,0_2_0106001C
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeCode function: 0_2_0108CABC DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_0108CABC

          E-Banking Fraud

          barindex
          Source: Yara matchFile source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000002.00000002.1542995143.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.1543024692.0000000000520000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY

          System Summary

          barindex
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeCode function: This is a third-party compiled AutoIt script.0_2_01003B3A
          Source: FJRUb5lb9m.exeString found in binary or memory: This is a third-party compiled AutoIt script.
          Source: FJRUb5lb9m.exe, 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_9f8b9475-6
          Source: FJRUb5lb9m.exe, 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_1b46211b-e
          Source: FJRUb5lb9m.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_fe05dd1d-3
          Source: FJRUb5lb9m.exeString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_33e2669d-b
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0042CCE3 NtClose,2_2_0042CCE3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A72B60 NtClose,LdrInitializeThunk,2_2_00A72B60
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A72DF0 NtQuerySystemInformation,LdrInitializeThunk,2_2_00A72DF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A735C0 NtCreateMutant,LdrInitializeThunk,2_2_00A735C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A74340 NtSetContextThread,2_2_00A74340
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A74650 NtSuspendThread,2_2_00A74650
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A72AB0 NtWaitForSingleObject,2_2_00A72AB0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A72AF0 NtWriteFile,2_2_00A72AF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A72AD0 NtReadFile,2_2_00A72AD0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A72BA0 NtEnumerateValueKey,2_2_00A72BA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A72B80 NtQueryInformationFile,2_2_00A72B80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A72BE0 NtQueryValueKey,2_2_00A72BE0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A72BF0 NtAllocateVirtualMemory,2_2_00A72BF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A72CA0 NtQueryInformationToken,2_2_00A72CA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A72CF0 NtOpenProcess,2_2_00A72CF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A72CC0 NtQueryVirtualMemory,2_2_00A72CC0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A72C00 NtQueryInformationProcess,2_2_00A72C00
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A72C60 NtCreateKey,2_2_00A72C60
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A72C70 NtFreeVirtualMemory,2_2_00A72C70
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A72DB0 NtEnumerateKey,2_2_00A72DB0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A72DD0 NtDelayExecution,2_2_00A72DD0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A72D30 NtUnmapViewOfSection,2_2_00A72D30
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A72D00 NtSetInformationFile,2_2_00A72D00
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A72D10 NtMapViewOfSection,2_2_00A72D10
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A72EA0 NtAdjustPrivilegesToken,2_2_00A72EA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A72E80 NtReadVirtualMemory,2_2_00A72E80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A72EE0 NtQueueApcThread,2_2_00A72EE0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A72E30 NtWriteVirtualMemory,2_2_00A72E30
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A72FA0 NtQuerySection,2_2_00A72FA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A72FB0 NtResumeThread,2_2_00A72FB0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A72F90 NtProtectVirtualMemory,2_2_00A72F90
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A72FE0 NtCreateFile,2_2_00A72FE0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A72F30 NtCreateSection,2_2_00A72F30
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A72F60 NtCreateProcessEx,2_2_00A72F60
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A73090 NtSetValueKey,2_2_00A73090
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A73010 NtOpenDirectoryObject,2_2_00A73010
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A739B0 NtGetContextThread,2_2_00A739B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A73D10 NtOpenProcessToken,2_2_00A73D10
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A73D70 NtOpenThread,2_2_00A73D70
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeCode function: 0_2_0106A1EF: GetFullPathNameW,__swprintf,CreateDirectoryW,CreateFileW,_memset,_wcsncpy,DeviceIoControl,CloseHandle,RemoveDirectoryW,CloseHandle,0_2_0106A1EF
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeCode function: 0_2_01058310 _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_01058310
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeCode function: 0_2_010651BD ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_010651BD
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeCode function: 0_2_0100E6A00_2_0100E6A0
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeCode function: 0_2_0102D9750_2_0102D975
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeCode function: 0_2_0100FCE00_2_0100FCE0
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeCode function: 0_2_010221C50_2_010221C5
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeCode function: 0_2_010803DA0_2_010803DA
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeCode function: 0_2_010362D20_2_010362D2
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeCode function: 0_2_010225FA0_2_010225FA
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeCode function: 0_2_0103242E0_2_0103242E
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeCode function: 0_2_0103878F0_2_0103878F
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeCode function: 0_2_0105E6160_2_0105E616
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeCode function: 0_2_010166E10_2_010166E1
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeCode function: 0_2_010188080_2_01018808
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeCode function: 0_2_010368440_2_01036844
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeCode function: 0_2_010808570_2_01080857
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeCode function: 0_2_010688890_2_01068889
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeCode function: 0_2_0102CB210_2_0102CB21
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeCode function: 0_2_01036DB60_2_01036DB6
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeCode function: 0_2_01016F9E0_2_01016F9E
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeCode function: 0_2_010231870_2_01023187
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeCode function: 0_2_0102F1D90_2_0102F1D9
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeCode function: 0_2_010130300_2_01013030
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeCode function: 0_2_010012870_2_01001287
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeCode function: 0_2_010155200_2_01015520
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeCode function: 0_2_010214840_2_01021484
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeCode function: 0_2_010157600_2_01015760
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeCode function: 0_2_010276960_2_01027696
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeCode function: 0_2_010219780_2_01021978
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeCode function: 0_2_01039AB50_2_01039AB5
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeCode function: 0_2_01021D900_2_01021D90
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeCode function: 0_2_0102BDA60_2_0102BDA6
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeCode function: 0_2_01087DDB0_2_01087DDB
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeCode function: 0_2_0100DF000_2_0100DF00
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeCode function: 0_2_01013FE00_2_01013FE0
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeCode function: 0_2_015B25180_2_015B2518
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00401BC62_2_00401BC6
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040E8432_2_0040E843
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040E8392_2_0040E839
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004028AE2_2_004028AE
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004028B02_2_004028B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0042F2F32_2_0042F2F3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00402C282_2_00402C28
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00402C302_2_00402C30
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004104F32_2_004104F3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004035C02_2_004035C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00416ECE2_2_00416ECE
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00416ED32_2_00416ED3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040E6F32_2_0040E6F3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004107132_2_00410713
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AD20002_2_00AD2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AF41A22_2_00AF41A2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00B001AA2_2_00B001AA
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AF81CC2_2_00AF81CC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A301002_2_00A30100
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00ADA1182_2_00ADA118
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AC81582_2_00AC8158
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AC02C02_2_00AC02C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AE02742_2_00AE0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A4E3F02_2_00A4E3F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00B003E62_2_00B003E6
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AFA3522_2_00AFA352
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AEE4F62_2_00AEE4F6
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AE44202_2_00AE4420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AF24462_2_00AF2446
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00B005912_2_00B00591
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A405352_2_00A40535
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A5C6E02_2_00A5C6E0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A3C7C02_2_00A3C7C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A407702_2_00A40770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A647502_2_00A64750
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A268B82_2_00A268B8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A6E8F02_2_00A6E8F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A4A8402_2_00A4A840
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A428402_2_00A42840
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A429A02_2_00A429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00B0A9A62_2_00B0A9A6
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A569622_2_00A56962
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A3EA802_2_00A3EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AF6BD72_2_00AF6BD7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AFAB402_2_00AFAB40
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AE0CB52_2_00AE0CB5
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A30CF22_2_00A30CF2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A40C002_2_00A40C00
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A58DBF2_2_00A58DBF
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A3ADE02_2_00A3ADE0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A4AD002_2_00A4AD00
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00ADCD1F2_2_00ADCD1F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A52E902_2_00A52E90
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AFCE932_2_00AFCE93
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AFEEDB2_2_00AFEEDB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AFEE262_2_00AFEE26
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A40E592_2_00A40E59
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00ABEFA02_2_00ABEFA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A4CFE02_2_00A4CFE0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A32FC82_2_00A32FC8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A82F282_2_00A82F28
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A60F302_2_00A60F30
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AE2F302_2_00AE2F30
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AB4F402_2_00AB4F40
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AF70E92_2_00AF70E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AFF0E02_2_00AFF0E0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AEF0CC2_2_00AEF0CC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A470C02_2_00A470C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A4B1B02_2_00A4B1B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A7516C2_2_00A7516C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A2F1722_2_00A2F172
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00B0B16B2_2_00B0B16B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A452A02_2_00A452A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AE12ED2_2_00AE12ED
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A5B2C02_2_00A5B2C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A8739A2_2_00A8739A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AF132D2_2_00AF132D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A2D34C2_2_00A2D34C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AFF43F2_2_00AFF43F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A314602_2_00A31460
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00ADD5B02_2_00ADD5B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00B095C32_2_00B095C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AF75712_2_00AF7571
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AF16CC2_2_00AF16CC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A856302_2_00A85630
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AFF7B02_2_00AFF7B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A438E02_2_00A438E0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AAD8002_2_00AAD800
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AD59102_2_00AD5910
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A499502_2_00A49950
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A5B9502_2_00A5B950
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00ADDAAC2_2_00ADDAAC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A85AA02_2_00A85AA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AE1AA32_2_00AE1AA3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AEDAC62_2_00AEDAC6
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AB3A6C2_2_00AB3A6C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AFFA492_2_00AFFA49
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AF7A462_2_00AF7A46
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A5FB802_2_00A5FB80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AB5BF02_2_00AB5BF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A7DBF92_2_00A7DBF9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AFFB762_2_00AFFB76
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AFFCF22_2_00AFFCF2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AB9C322_2_00AB9C32
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A5FDC02_2_00A5FDC0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AF7D732_2_00AF7D73
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A43D402_2_00A43D40
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AF1D5A2_2_00AF1D5A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A49EB02_2_00A49EB0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AFFFB12_2_00AFFFB1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A41F922_2_00A41F92
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A03FD22_2_00A03FD2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A03FD52_2_00A03FD5
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AFFF092_2_00AFFF09
          Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 00A2B970 appears 280 times
          Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 00A87E54 appears 110 times
          Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 00AAEA12 appears 86 times
          Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 00A75130 appears 58 times
          Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 00ABF290 appears 105 times
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeCode function: String function: 01028900 appears 42 times
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeCode function: String function: 01007DE1 appears 36 times
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeCode function: String function: 01020AE3 appears 70 times
          Source: FJRUb5lb9m.exe, 00000000.00000003.1364579283.0000000003E63000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs FJRUb5lb9m.exe
          Source: FJRUb5lb9m.exe, 00000000.00000003.1362477742.000000000400D000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs FJRUb5lb9m.exe
          Source: FJRUb5lb9m.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
          Source: classification engineClassification label: mal84.troj.evad.winEXE@3/2@0/0
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeCode function: 0_2_0106A06A GetLastError,FormatMessageW,0_2_0106A06A
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeCode function: 0_2_010581CB AdjustTokenPrivileges,CloseHandle,0_2_010581CB
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeCode function: 0_2_010587E1 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_010587E1
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeCode function: 0_2_0106B333 SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_0106B333
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeCode function: 0_2_0107EE0D CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_0107EE0D
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeCode function: 0_2_0106C397 CoInitialize,CoCreateInstance,CoUninitialize,0_2_0106C397
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeCode function: 0_2_01004E89 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_01004E89
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeFile created: C:\Users\user\AppData\Local\Temp\aut3BFA.tmpJump to behavior
          Source: FJRUb5lb9m.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: FJRUb5lb9m.exeReversingLabs: Detection: 65%
          Source: FJRUb5lb9m.exeVirustotal: Detection: 51%
          Source: unknownProcess created: C:\Users\user\Desktop\FJRUb5lb9m.exe "C:\Users\user\Desktop\FJRUb5lb9m.exe"
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\FJRUb5lb9m.exe"
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\FJRUb5lb9m.exe"Jump to behavior
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeSection loaded: wsock32.dllJump to behavior
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeSection loaded: winmm.dllJump to behavior
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeSection loaded: mpr.dllJump to behavior
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeSection loaded: wininet.dllJump to behavior
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeSection loaded: ntmarta.dllJump to behavior
          Source: FJRUb5lb9m.exeStatic file information: File size 1213440 > 1048576
          Source: FJRUb5lb9m.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
          Source: FJRUb5lb9m.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
          Source: FJRUb5lb9m.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
          Source: FJRUb5lb9m.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
          Source: FJRUb5lb9m.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
          Source: FJRUb5lb9m.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
          Source: FJRUb5lb9m.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
          Source: Binary string: wntdll.pdbUGP source: FJRUb5lb9m.exe, 00000000.00000003.1361828125.0000000003D40000.00000004.00001000.00020000.00000000.sdmp, FJRUb5lb9m.exe, 00000000.00000003.1361540015.0000000003EE0000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1499116420.0000000002E00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1491513974.0000000000A00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1543331375.0000000000B9E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1543331375.0000000000A00000.00000040.00001000.00020000.00000000.sdmp
          Source: Binary string: wntdll.pdb source: FJRUb5lb9m.exe, 00000000.00000003.1361828125.0000000003D40000.00000004.00001000.00020000.00000000.sdmp, FJRUb5lb9m.exe, 00000000.00000003.1361540015.0000000003EE0000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000002.00000003.1499116420.0000000002E00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1491513974.0000000000A00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1543331375.0000000000B9E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1543331375.0000000000A00000.00000040.00001000.00020000.00000000.sdmp
          Source: FJRUb5lb9m.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
          Source: FJRUb5lb9m.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
          Source: FJRUb5lb9m.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
          Source: FJRUb5lb9m.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
          Source: FJRUb5lb9m.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeCode function: 0_2_01004B37 LoadLibraryA,GetProcAddress,0_2_01004B37
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeCode function: 0_2_01028945 push ecx; ret 0_2_01028958
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0041504A push edx; retf 2_2_0041504D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040B05D push 7EE3812Dh; retf 2_2_0040B062
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0041502C push esp; ret 2_2_0041503C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00403830 push eax; ret 2_2_00403832
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040D99E push eax; retf 2_2_0040D9A1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040DB46 pushad ; iretd 2_2_0040DB6B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0041F352 push 0000000Bh; ret 2_2_0041F354
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0041FBD2 push FFFFFFB9h; ret 2_2_0041FBDD
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040DC21 push eax; retf 2_2_0040DC22
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0041ACC2 pushad ; iretd 2_2_0041ACCB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00422CD7 push es; ret 2_2_00422CEA
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004147C3 push eax; ret 2_2_00414852
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A0225F pushad ; ret 2_2_00A027F9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A027FA pushad ; ret 2_2_00A027F9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A0283D push eax; iretd 2_2_00A02858
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A309AD push ecx; mov dword ptr [esp], ecx2_2_00A309B6
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A01366 push eax; iretd 2_2_00A01369
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeCode function: 0_2_010048D7 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_010048D7
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeCode function: 0_2_01085376 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_01085376
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeCode function: 0_2_01023187 EncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_01023187
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

          Malware Analysis System Evasion

          barindex
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeAPI/Special instruction interceptor: Address: 15B213C
          Source: FJRUb5lb9m.exe, 00000000.00000003.1354270985.00000000015FA000.00000004.00000020.00020000.00000000.sdmp, FJRUb5lb9m.exe, 00000000.00000002.1367189933.0000000001666000.00000004.00000020.00020000.00000000.sdmp, FJRUb5lb9m.exe, 00000000.00000003.1354377801.0000000001666000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PROCMON.EXES
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A7096E rdtsc 2_2_00A7096E
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-103164
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeAPI coverage: 4.7 %
          Source: C:\Windows\SysWOW64\svchost.exeAPI coverage: 0.6 %
          Source: C:\Windows\SysWOW64\svchost.exe TID: 3664Thread sleep time: -30000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeCode function: 0_2_0106445A GetFileAttributesW,FindFirstFileW,FindClose,0_2_0106445A
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeCode function: 0_2_0106C75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_0106C75C
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeCode function: 0_2_0106C6D1 FindFirstFileW,FindClose,0_2_0106C6D1
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeCode function: 0_2_0106EF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0106EF95
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeCode function: 0_2_0106F0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0106F0F2
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeCode function: 0_2_0106F3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0106F3F3
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeCode function: 0_2_010637EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_010637EF
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeCode function: 0_2_01063B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_01063B12
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeCode function: 0_2_0106BCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0106BCBC
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeCode function: 0_2_010049A0 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_010049A0
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeAPI call chain: ExitProcess graph end nodegraph_0-101822
          Source: C:\Windows\SysWOW64\svchost.exeProcess information queried: ProcessInformationJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeProcess queried: DebugPortJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A7096E rdtsc 2_2_00A7096E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00417E63 LdrLoadDll,2_2_00417E63
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeCode function: 0_2_01073F09 BlockInput,0_2_01073F09
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeCode function: 0_2_01003B3A GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_01003B3A
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeCode function: 0_2_01035A7C EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_01035A7C
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeCode function: 0_2_01004B37 LoadLibraryA,GetProcAddress,0_2_01004B37
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeCode function: 0_2_015B23A8 mov eax, dword ptr fs:[00000030h]0_2_015B23A8
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeCode function: 0_2_015B2408 mov eax, dword ptr fs:[00000030h]0_2_015B2408
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeCode function: 0_2_015B0D38 mov eax, dword ptr fs:[00000030h]0_2_015B0D38
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A280A0 mov eax, dword ptr fs:[00000030h]2_2_00A280A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AC80A8 mov eax, dword ptr fs:[00000030h]2_2_00AC80A8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AF60B8 mov eax, dword ptr fs:[00000030h]2_2_00AF60B8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AF60B8 mov ecx, dword ptr fs:[00000030h]2_2_00AF60B8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A3208A mov eax, dword ptr fs:[00000030h]2_2_00A3208A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A2A0E3 mov ecx, dword ptr fs:[00000030h]2_2_00A2A0E3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A380E9 mov eax, dword ptr fs:[00000030h]2_2_00A380E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AB60E0 mov eax, dword ptr fs:[00000030h]2_2_00AB60E0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A2C0F0 mov eax, dword ptr fs:[00000030h]2_2_00A2C0F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A720F0 mov ecx, dword ptr fs:[00000030h]2_2_00A720F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AB20DE mov eax, dword ptr fs:[00000030h]2_2_00AB20DE
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A2A020 mov eax, dword ptr fs:[00000030h]2_2_00A2A020
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A2C020 mov eax, dword ptr fs:[00000030h]2_2_00A2C020
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AC6030 mov eax, dword ptr fs:[00000030h]2_2_00AC6030
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AB4000 mov ecx, dword ptr fs:[00000030h]2_2_00AB4000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AD2000 mov eax, dword ptr fs:[00000030h]2_2_00AD2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AD2000 mov eax, dword ptr fs:[00000030h]2_2_00AD2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AD2000 mov eax, dword ptr fs:[00000030h]2_2_00AD2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AD2000 mov eax, dword ptr fs:[00000030h]2_2_00AD2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AD2000 mov eax, dword ptr fs:[00000030h]2_2_00AD2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AD2000 mov eax, dword ptr fs:[00000030h]2_2_00AD2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AD2000 mov eax, dword ptr fs:[00000030h]2_2_00AD2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AD2000 mov eax, dword ptr fs:[00000030h]2_2_00AD2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A4E016 mov eax, dword ptr fs:[00000030h]2_2_00A4E016
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A4E016 mov eax, dword ptr fs:[00000030h]2_2_00A4E016
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A4E016 mov eax, dword ptr fs:[00000030h]2_2_00A4E016
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A4E016 mov eax, dword ptr fs:[00000030h]2_2_00A4E016
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A5C073 mov eax, dword ptr fs:[00000030h]2_2_00A5C073
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A32050 mov eax, dword ptr fs:[00000030h]2_2_00A32050
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AB6050 mov eax, dword ptr fs:[00000030h]2_2_00AB6050
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A70185 mov eax, dword ptr fs:[00000030h]2_2_00A70185
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AEC188 mov eax, dword ptr fs:[00000030h]2_2_00AEC188
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AEC188 mov eax, dword ptr fs:[00000030h]2_2_00AEC188
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AD4180 mov eax, dword ptr fs:[00000030h]2_2_00AD4180
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AD4180 mov eax, dword ptr fs:[00000030h]2_2_00AD4180
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AB019F mov eax, dword ptr fs:[00000030h]2_2_00AB019F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AB019F mov eax, dword ptr fs:[00000030h]2_2_00AB019F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AB019F mov eax, dword ptr fs:[00000030h]2_2_00AB019F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AB019F mov eax, dword ptr fs:[00000030h]2_2_00AB019F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A2A197 mov eax, dword ptr fs:[00000030h]2_2_00A2A197
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A2A197 mov eax, dword ptr fs:[00000030h]2_2_00A2A197
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A2A197 mov eax, dword ptr fs:[00000030h]2_2_00A2A197
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00B061E5 mov eax, dword ptr fs:[00000030h]2_2_00B061E5
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A601F8 mov eax, dword ptr fs:[00000030h]2_2_00A601F8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AF61C3 mov eax, dword ptr fs:[00000030h]2_2_00AF61C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AF61C3 mov eax, dword ptr fs:[00000030h]2_2_00AF61C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AAE1D0 mov eax, dword ptr fs:[00000030h]2_2_00AAE1D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AAE1D0 mov eax, dword ptr fs:[00000030h]2_2_00AAE1D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AAE1D0 mov ecx, dword ptr fs:[00000030h]2_2_00AAE1D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AAE1D0 mov eax, dword ptr fs:[00000030h]2_2_00AAE1D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AAE1D0 mov eax, dword ptr fs:[00000030h]2_2_00AAE1D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A60124 mov eax, dword ptr fs:[00000030h]2_2_00A60124
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00ADE10E mov eax, dword ptr fs:[00000030h]2_2_00ADE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00ADE10E mov ecx, dword ptr fs:[00000030h]2_2_00ADE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00ADE10E mov eax, dword ptr fs:[00000030h]2_2_00ADE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00ADE10E mov eax, dword ptr fs:[00000030h]2_2_00ADE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00ADE10E mov ecx, dword ptr fs:[00000030h]2_2_00ADE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00ADE10E mov eax, dword ptr fs:[00000030h]2_2_00ADE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00ADE10E mov eax, dword ptr fs:[00000030h]2_2_00ADE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00ADE10E mov ecx, dword ptr fs:[00000030h]2_2_00ADE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00ADE10E mov eax, dword ptr fs:[00000030h]2_2_00ADE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00ADE10E mov ecx, dword ptr fs:[00000030h]2_2_00ADE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00ADA118 mov ecx, dword ptr fs:[00000030h]2_2_00ADA118
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00ADA118 mov eax, dword ptr fs:[00000030h]2_2_00ADA118
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00ADA118 mov eax, dword ptr fs:[00000030h]2_2_00ADA118
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00ADA118 mov eax, dword ptr fs:[00000030h]2_2_00ADA118
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AF0115 mov eax, dword ptr fs:[00000030h]2_2_00AF0115
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00B04164 mov eax, dword ptr fs:[00000030h]2_2_00B04164
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00B04164 mov eax, dword ptr fs:[00000030h]2_2_00B04164
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AC4144 mov eax, dword ptr fs:[00000030h]2_2_00AC4144
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AC4144 mov eax, dword ptr fs:[00000030h]2_2_00AC4144
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AC4144 mov ecx, dword ptr fs:[00000030h]2_2_00AC4144
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AC4144 mov eax, dword ptr fs:[00000030h]2_2_00AC4144
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AC4144 mov eax, dword ptr fs:[00000030h]2_2_00AC4144
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A2C156 mov eax, dword ptr fs:[00000030h]2_2_00A2C156
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AC8158 mov eax, dword ptr fs:[00000030h]2_2_00AC8158
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A36154 mov eax, dword ptr fs:[00000030h]2_2_00A36154
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A36154 mov eax, dword ptr fs:[00000030h]2_2_00A36154
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A402A0 mov eax, dword ptr fs:[00000030h]2_2_00A402A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A402A0 mov eax, dword ptr fs:[00000030h]2_2_00A402A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AC62A0 mov eax, dword ptr fs:[00000030h]2_2_00AC62A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AC62A0 mov ecx, dword ptr fs:[00000030h]2_2_00AC62A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AC62A0 mov eax, dword ptr fs:[00000030h]2_2_00AC62A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AC62A0 mov eax, dword ptr fs:[00000030h]2_2_00AC62A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AC62A0 mov eax, dword ptr fs:[00000030h]2_2_00AC62A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AC62A0 mov eax, dword ptr fs:[00000030h]2_2_00AC62A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A6E284 mov eax, dword ptr fs:[00000030h]2_2_00A6E284
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A6E284 mov eax, dword ptr fs:[00000030h]2_2_00A6E284
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AB0283 mov eax, dword ptr fs:[00000030h]2_2_00AB0283
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AB0283 mov eax, dword ptr fs:[00000030h]2_2_00AB0283
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AB0283 mov eax, dword ptr fs:[00000030h]2_2_00AB0283
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A402E1 mov eax, dword ptr fs:[00000030h]2_2_00A402E1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A402E1 mov eax, dword ptr fs:[00000030h]2_2_00A402E1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A402E1 mov eax, dword ptr fs:[00000030h]2_2_00A402E1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A3A2C3 mov eax, dword ptr fs:[00000030h]2_2_00A3A2C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A3A2C3 mov eax, dword ptr fs:[00000030h]2_2_00A3A2C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A3A2C3 mov eax, dword ptr fs:[00000030h]2_2_00A3A2C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A3A2C3 mov eax, dword ptr fs:[00000030h]2_2_00A3A2C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A3A2C3 mov eax, dword ptr fs:[00000030h]2_2_00A3A2C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00B062D6 mov eax, dword ptr fs:[00000030h]2_2_00B062D6
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A2823B mov eax, dword ptr fs:[00000030h]2_2_00A2823B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A34260 mov eax, dword ptr fs:[00000030h]2_2_00A34260
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A34260 mov eax, dword ptr fs:[00000030h]2_2_00A34260
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A34260 mov eax, dword ptr fs:[00000030h]2_2_00A34260
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A2826B mov eax, dword ptr fs:[00000030h]2_2_00A2826B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AE0274 mov eax, dword ptr fs:[00000030h]2_2_00AE0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AE0274 mov eax, dword ptr fs:[00000030h]2_2_00AE0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AE0274 mov eax, dword ptr fs:[00000030h]2_2_00AE0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AE0274 mov eax, dword ptr fs:[00000030h]2_2_00AE0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AE0274 mov eax, dword ptr fs:[00000030h]2_2_00AE0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AE0274 mov eax, dword ptr fs:[00000030h]2_2_00AE0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AE0274 mov eax, dword ptr fs:[00000030h]2_2_00AE0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AE0274 mov eax, dword ptr fs:[00000030h]2_2_00AE0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AE0274 mov eax, dword ptr fs:[00000030h]2_2_00AE0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AE0274 mov eax, dword ptr fs:[00000030h]2_2_00AE0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AE0274 mov eax, dword ptr fs:[00000030h]2_2_00AE0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AE0274 mov eax, dword ptr fs:[00000030h]2_2_00AE0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AB8243 mov eax, dword ptr fs:[00000030h]2_2_00AB8243
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AB8243 mov ecx, dword ptr fs:[00000030h]2_2_00AB8243
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00B0625D mov eax, dword ptr fs:[00000030h]2_2_00B0625D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A2A250 mov eax, dword ptr fs:[00000030h]2_2_00A2A250
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A36259 mov eax, dword ptr fs:[00000030h]2_2_00A36259
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AEA250 mov eax, dword ptr fs:[00000030h]2_2_00AEA250
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AEA250 mov eax, dword ptr fs:[00000030h]2_2_00AEA250
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A2E388 mov eax, dword ptr fs:[00000030h]2_2_00A2E388
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A2E388 mov eax, dword ptr fs:[00000030h]2_2_00A2E388
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A2E388 mov eax, dword ptr fs:[00000030h]2_2_00A2E388
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A5438F mov eax, dword ptr fs:[00000030h]2_2_00A5438F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A5438F mov eax, dword ptr fs:[00000030h]2_2_00A5438F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A28397 mov eax, dword ptr fs:[00000030h]2_2_00A28397
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A28397 mov eax, dword ptr fs:[00000030h]2_2_00A28397
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A28397 mov eax, dword ptr fs:[00000030h]2_2_00A28397
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A403E9 mov eax, dword ptr fs:[00000030h]2_2_00A403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A403E9 mov eax, dword ptr fs:[00000030h]2_2_00A403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A403E9 mov eax, dword ptr fs:[00000030h]2_2_00A403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A403E9 mov eax, dword ptr fs:[00000030h]2_2_00A403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A403E9 mov eax, dword ptr fs:[00000030h]2_2_00A403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A403E9 mov eax, dword ptr fs:[00000030h]2_2_00A403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A403E9 mov eax, dword ptr fs:[00000030h]2_2_00A403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A403E9 mov eax, dword ptr fs:[00000030h]2_2_00A403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A4E3F0 mov eax, dword ptr fs:[00000030h]2_2_00A4E3F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A4E3F0 mov eax, dword ptr fs:[00000030h]2_2_00A4E3F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A4E3F0 mov eax, dword ptr fs:[00000030h]2_2_00A4E3F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A663FF mov eax, dword ptr fs:[00000030h]2_2_00A663FF
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AEC3CD mov eax, dword ptr fs:[00000030h]2_2_00AEC3CD
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A3A3C0 mov eax, dword ptr fs:[00000030h]2_2_00A3A3C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A3A3C0 mov eax, dword ptr fs:[00000030h]2_2_00A3A3C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A3A3C0 mov eax, dword ptr fs:[00000030h]2_2_00A3A3C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A3A3C0 mov eax, dword ptr fs:[00000030h]2_2_00A3A3C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A3A3C0 mov eax, dword ptr fs:[00000030h]2_2_00A3A3C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A3A3C0 mov eax, dword ptr fs:[00000030h]2_2_00A3A3C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A383C0 mov eax, dword ptr fs:[00000030h]2_2_00A383C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A383C0 mov eax, dword ptr fs:[00000030h]2_2_00A383C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A383C0 mov eax, dword ptr fs:[00000030h]2_2_00A383C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A383C0 mov eax, dword ptr fs:[00000030h]2_2_00A383C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AB63C0 mov eax, dword ptr fs:[00000030h]2_2_00AB63C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00ADE3DB mov eax, dword ptr fs:[00000030h]2_2_00ADE3DB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00ADE3DB mov eax, dword ptr fs:[00000030h]2_2_00ADE3DB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00ADE3DB mov ecx, dword ptr fs:[00000030h]2_2_00ADE3DB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00ADE3DB mov eax, dword ptr fs:[00000030h]2_2_00ADE3DB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AD43D4 mov eax, dword ptr fs:[00000030h]2_2_00AD43D4
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AD43D4 mov eax, dword ptr fs:[00000030h]2_2_00AD43D4
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00B08324 mov eax, dword ptr fs:[00000030h]2_2_00B08324
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00B08324 mov ecx, dword ptr fs:[00000030h]2_2_00B08324
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00B08324 mov eax, dword ptr fs:[00000030h]2_2_00B08324
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00B08324 mov eax, dword ptr fs:[00000030h]2_2_00B08324
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A6A30B mov eax, dword ptr fs:[00000030h]2_2_00A6A30B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A6A30B mov eax, dword ptr fs:[00000030h]2_2_00A6A30B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A6A30B mov eax, dword ptr fs:[00000030h]2_2_00A6A30B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A2C310 mov ecx, dword ptr fs:[00000030h]2_2_00A2C310
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A50310 mov ecx, dword ptr fs:[00000030h]2_2_00A50310
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AD437C mov eax, dword ptr fs:[00000030h]2_2_00AD437C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AB2349 mov eax, dword ptr fs:[00000030h]2_2_00AB2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AB2349 mov eax, dword ptr fs:[00000030h]2_2_00AB2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AB2349 mov eax, dword ptr fs:[00000030h]2_2_00AB2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AB2349 mov eax, dword ptr fs:[00000030h]2_2_00AB2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AB2349 mov eax, dword ptr fs:[00000030h]2_2_00AB2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AB2349 mov eax, dword ptr fs:[00000030h]2_2_00AB2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AB2349 mov eax, dword ptr fs:[00000030h]2_2_00AB2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AB2349 mov eax, dword ptr fs:[00000030h]2_2_00AB2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AB2349 mov eax, dword ptr fs:[00000030h]2_2_00AB2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AB2349 mov eax, dword ptr fs:[00000030h]2_2_00AB2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AB2349 mov eax, dword ptr fs:[00000030h]2_2_00AB2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AB2349 mov eax, dword ptr fs:[00000030h]2_2_00AB2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AB2349 mov eax, dword ptr fs:[00000030h]2_2_00AB2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AB2349 mov eax, dword ptr fs:[00000030h]2_2_00AB2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AB2349 mov eax, dword ptr fs:[00000030h]2_2_00AB2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AB035C mov eax, dword ptr fs:[00000030h]2_2_00AB035C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AB035C mov eax, dword ptr fs:[00000030h]2_2_00AB035C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AB035C mov eax, dword ptr fs:[00000030h]2_2_00AB035C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AB035C mov ecx, dword ptr fs:[00000030h]2_2_00AB035C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AB035C mov eax, dword ptr fs:[00000030h]2_2_00AB035C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AB035C mov eax, dword ptr fs:[00000030h]2_2_00AB035C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AFA352 mov eax, dword ptr fs:[00000030h]2_2_00AFA352
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AD8350 mov ecx, dword ptr fs:[00000030h]2_2_00AD8350
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00B0634F mov eax, dword ptr fs:[00000030h]2_2_00B0634F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A364AB mov eax, dword ptr fs:[00000030h]2_2_00A364AB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A644B0 mov ecx, dword ptr fs:[00000030h]2_2_00A644B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00ABA4B0 mov eax, dword ptr fs:[00000030h]2_2_00ABA4B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AEA49A mov eax, dword ptr fs:[00000030h]2_2_00AEA49A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A304E5 mov ecx, dword ptr fs:[00000030h]2_2_00A304E5
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A2E420 mov eax, dword ptr fs:[00000030h]2_2_00A2E420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A2E420 mov eax, dword ptr fs:[00000030h]2_2_00A2E420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A2E420 mov eax, dword ptr fs:[00000030h]2_2_00A2E420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A2C427 mov eax, dword ptr fs:[00000030h]2_2_00A2C427
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AB6420 mov eax, dword ptr fs:[00000030h]2_2_00AB6420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AB6420 mov eax, dword ptr fs:[00000030h]2_2_00AB6420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AB6420 mov eax, dword ptr fs:[00000030h]2_2_00AB6420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AB6420 mov eax, dword ptr fs:[00000030h]2_2_00AB6420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AB6420 mov eax, dword ptr fs:[00000030h]2_2_00AB6420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AB6420 mov eax, dword ptr fs:[00000030h]2_2_00AB6420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AB6420 mov eax, dword ptr fs:[00000030h]2_2_00AB6420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A6A430 mov eax, dword ptr fs:[00000030h]2_2_00A6A430
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A68402 mov eax, dword ptr fs:[00000030h]2_2_00A68402
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A68402 mov eax, dword ptr fs:[00000030h]2_2_00A68402
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A68402 mov eax, dword ptr fs:[00000030h]2_2_00A68402
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00ABC460 mov ecx, dword ptr fs:[00000030h]2_2_00ABC460
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A5A470 mov eax, dword ptr fs:[00000030h]2_2_00A5A470
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A5A470 mov eax, dword ptr fs:[00000030h]2_2_00A5A470
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A5A470 mov eax, dword ptr fs:[00000030h]2_2_00A5A470
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A6E443 mov eax, dword ptr fs:[00000030h]2_2_00A6E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A6E443 mov eax, dword ptr fs:[00000030h]2_2_00A6E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A6E443 mov eax, dword ptr fs:[00000030h]2_2_00A6E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A6E443 mov eax, dword ptr fs:[00000030h]2_2_00A6E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A6E443 mov eax, dword ptr fs:[00000030h]2_2_00A6E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A6E443 mov eax, dword ptr fs:[00000030h]2_2_00A6E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A6E443 mov eax, dword ptr fs:[00000030h]2_2_00A6E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A6E443 mov eax, dword ptr fs:[00000030h]2_2_00A6E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AEA456 mov eax, dword ptr fs:[00000030h]2_2_00AEA456
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A2645D mov eax, dword ptr fs:[00000030h]2_2_00A2645D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A5245A mov eax, dword ptr fs:[00000030h]2_2_00A5245A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AB05A7 mov eax, dword ptr fs:[00000030h]2_2_00AB05A7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AB05A7 mov eax, dword ptr fs:[00000030h]2_2_00AB05A7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AB05A7 mov eax, dword ptr fs:[00000030h]2_2_00AB05A7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A545B1 mov eax, dword ptr fs:[00000030h]2_2_00A545B1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A545B1 mov eax, dword ptr fs:[00000030h]2_2_00A545B1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A32582 mov eax, dword ptr fs:[00000030h]2_2_00A32582
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A32582 mov ecx, dword ptr fs:[00000030h]2_2_00A32582
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A64588 mov eax, dword ptr fs:[00000030h]2_2_00A64588
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A6E59C mov eax, dword ptr fs:[00000030h]2_2_00A6E59C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A5E5E7 mov eax, dword ptr fs:[00000030h]2_2_00A5E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A5E5E7 mov eax, dword ptr fs:[00000030h]2_2_00A5E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A5E5E7 mov eax, dword ptr fs:[00000030h]2_2_00A5E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A5E5E7 mov eax, dword ptr fs:[00000030h]2_2_00A5E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A5E5E7 mov eax, dword ptr fs:[00000030h]2_2_00A5E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A5E5E7 mov eax, dword ptr fs:[00000030h]2_2_00A5E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A5E5E7 mov eax, dword ptr fs:[00000030h]2_2_00A5E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A5E5E7 mov eax, dword ptr fs:[00000030h]2_2_00A5E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A325E0 mov eax, dword ptr fs:[00000030h]2_2_00A325E0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A6C5ED mov eax, dword ptr fs:[00000030h]2_2_00A6C5ED
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A6C5ED mov eax, dword ptr fs:[00000030h]2_2_00A6C5ED
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A6E5CF mov eax, dword ptr fs:[00000030h]2_2_00A6E5CF
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A6E5CF mov eax, dword ptr fs:[00000030h]2_2_00A6E5CF
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A365D0 mov eax, dword ptr fs:[00000030h]2_2_00A365D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A6A5D0 mov eax, dword ptr fs:[00000030h]2_2_00A6A5D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A6A5D0 mov eax, dword ptr fs:[00000030h]2_2_00A6A5D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A40535 mov eax, dword ptr fs:[00000030h]2_2_00A40535
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A40535 mov eax, dword ptr fs:[00000030h]2_2_00A40535
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A40535 mov eax, dword ptr fs:[00000030h]2_2_00A40535
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A40535 mov eax, dword ptr fs:[00000030h]2_2_00A40535
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A40535 mov eax, dword ptr fs:[00000030h]2_2_00A40535
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A40535 mov eax, dword ptr fs:[00000030h]2_2_00A40535
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A5E53E mov eax, dword ptr fs:[00000030h]2_2_00A5E53E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A5E53E mov eax, dword ptr fs:[00000030h]2_2_00A5E53E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A5E53E mov eax, dword ptr fs:[00000030h]2_2_00A5E53E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A5E53E mov eax, dword ptr fs:[00000030h]2_2_00A5E53E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A5E53E mov eax, dword ptr fs:[00000030h]2_2_00A5E53E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AC6500 mov eax, dword ptr fs:[00000030h]2_2_00AC6500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00B04500 mov eax, dword ptr fs:[00000030h]2_2_00B04500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00B04500 mov eax, dword ptr fs:[00000030h]2_2_00B04500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00B04500 mov eax, dword ptr fs:[00000030h]2_2_00B04500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00B04500 mov eax, dword ptr fs:[00000030h]2_2_00B04500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00B04500 mov eax, dword ptr fs:[00000030h]2_2_00B04500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00B04500 mov eax, dword ptr fs:[00000030h]2_2_00B04500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00B04500 mov eax, dword ptr fs:[00000030h]2_2_00B04500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A6656A mov eax, dword ptr fs:[00000030h]2_2_00A6656A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A6656A mov eax, dword ptr fs:[00000030h]2_2_00A6656A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A6656A mov eax, dword ptr fs:[00000030h]2_2_00A6656A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A38550 mov eax, dword ptr fs:[00000030h]2_2_00A38550
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A38550 mov eax, dword ptr fs:[00000030h]2_2_00A38550
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A6C6A6 mov eax, dword ptr fs:[00000030h]2_2_00A6C6A6
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A666B0 mov eax, dword ptr fs:[00000030h]2_2_00A666B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A34690 mov eax, dword ptr fs:[00000030h]2_2_00A34690
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A34690 mov eax, dword ptr fs:[00000030h]2_2_00A34690
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AAE6F2 mov eax, dword ptr fs:[00000030h]2_2_00AAE6F2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AAE6F2 mov eax, dword ptr fs:[00000030h]2_2_00AAE6F2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AAE6F2 mov eax, dword ptr fs:[00000030h]2_2_00AAE6F2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AAE6F2 mov eax, dword ptr fs:[00000030h]2_2_00AAE6F2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AB06F1 mov eax, dword ptr fs:[00000030h]2_2_00AB06F1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AB06F1 mov eax, dword ptr fs:[00000030h]2_2_00AB06F1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A6A6C7 mov ebx, dword ptr fs:[00000030h]2_2_00A6A6C7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A6A6C7 mov eax, dword ptr fs:[00000030h]2_2_00A6A6C7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A4E627 mov eax, dword ptr fs:[00000030h]2_2_00A4E627
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A66620 mov eax, dword ptr fs:[00000030h]2_2_00A66620
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A68620 mov eax, dword ptr fs:[00000030h]2_2_00A68620
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A3262C mov eax, dword ptr fs:[00000030h]2_2_00A3262C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AAE609 mov eax, dword ptr fs:[00000030h]2_2_00AAE609
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A4260B mov eax, dword ptr fs:[00000030h]2_2_00A4260B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A4260B mov eax, dword ptr fs:[00000030h]2_2_00A4260B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A4260B mov eax, dword ptr fs:[00000030h]2_2_00A4260B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A4260B mov eax, dword ptr fs:[00000030h]2_2_00A4260B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A4260B mov eax, dword ptr fs:[00000030h]2_2_00A4260B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A4260B mov eax, dword ptr fs:[00000030h]2_2_00A4260B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A4260B mov eax, dword ptr fs:[00000030h]2_2_00A4260B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A72619 mov eax, dword ptr fs:[00000030h]2_2_00A72619
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AF866E mov eax, dword ptr fs:[00000030h]2_2_00AF866E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AF866E mov eax, dword ptr fs:[00000030h]2_2_00AF866E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A6A660 mov eax, dword ptr fs:[00000030h]2_2_00A6A660
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A6A660 mov eax, dword ptr fs:[00000030h]2_2_00A6A660
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A62674 mov eax, dword ptr fs:[00000030h]2_2_00A62674
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A4C640 mov eax, dword ptr fs:[00000030h]2_2_00A4C640
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A307AF mov eax, dword ptr fs:[00000030h]2_2_00A307AF
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AE47A0 mov eax, dword ptr fs:[00000030h]2_2_00AE47A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AD678E mov eax, dword ptr fs:[00000030h]2_2_00AD678E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A527ED mov eax, dword ptr fs:[00000030h]2_2_00A527ED
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A527ED mov eax, dword ptr fs:[00000030h]2_2_00A527ED
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A527ED mov eax, dword ptr fs:[00000030h]2_2_00A527ED
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00ABE7E1 mov eax, dword ptr fs:[00000030h]2_2_00ABE7E1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A347FB mov eax, dword ptr fs:[00000030h]2_2_00A347FB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A347FB mov eax, dword ptr fs:[00000030h]2_2_00A347FB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A3C7C0 mov eax, dword ptr fs:[00000030h]2_2_00A3C7C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AB07C3 mov eax, dword ptr fs:[00000030h]2_2_00AB07C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A6C720 mov eax, dword ptr fs:[00000030h]2_2_00A6C720
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A6C720 mov eax, dword ptr fs:[00000030h]2_2_00A6C720
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A6273C mov eax, dword ptr fs:[00000030h]2_2_00A6273C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A6273C mov ecx, dword ptr fs:[00000030h]2_2_00A6273C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A6273C mov eax, dword ptr fs:[00000030h]2_2_00A6273C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AAC730 mov eax, dword ptr fs:[00000030h]2_2_00AAC730
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A6C700 mov eax, dword ptr fs:[00000030h]2_2_00A6C700
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A30710 mov eax, dword ptr fs:[00000030h]2_2_00A30710
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A60710 mov eax, dword ptr fs:[00000030h]2_2_00A60710
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A38770 mov eax, dword ptr fs:[00000030h]2_2_00A38770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A40770 mov eax, dword ptr fs:[00000030h]2_2_00A40770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A40770 mov eax, dword ptr fs:[00000030h]2_2_00A40770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A40770 mov eax, dword ptr fs:[00000030h]2_2_00A40770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A40770 mov eax, dword ptr fs:[00000030h]2_2_00A40770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A40770 mov eax, dword ptr fs:[00000030h]2_2_00A40770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A40770 mov eax, dword ptr fs:[00000030h]2_2_00A40770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A40770 mov eax, dword ptr fs:[00000030h]2_2_00A40770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A40770 mov eax, dword ptr fs:[00000030h]2_2_00A40770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A40770 mov eax, dword ptr fs:[00000030h]2_2_00A40770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A40770 mov eax, dword ptr fs:[00000030h]2_2_00A40770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A40770 mov eax, dword ptr fs:[00000030h]2_2_00A40770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A40770 mov eax, dword ptr fs:[00000030h]2_2_00A40770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A6674D mov esi, dword ptr fs:[00000030h]2_2_00A6674D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A6674D mov eax, dword ptr fs:[00000030h]2_2_00A6674D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A6674D mov eax, dword ptr fs:[00000030h]2_2_00A6674D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A30750 mov eax, dword ptr fs:[00000030h]2_2_00A30750
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00ABE75D mov eax, dword ptr fs:[00000030h]2_2_00ABE75D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A72750 mov eax, dword ptr fs:[00000030h]2_2_00A72750
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A72750 mov eax, dword ptr fs:[00000030h]2_2_00A72750
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AB4755 mov eax, dword ptr fs:[00000030h]2_2_00AB4755
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A30887 mov eax, dword ptr fs:[00000030h]2_2_00A30887
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00ABC89D mov eax, dword ptr fs:[00000030h]2_2_00ABC89D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AFA8E4 mov eax, dword ptr fs:[00000030h]2_2_00AFA8E4
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A6C8F9 mov eax, dword ptr fs:[00000030h]2_2_00A6C8F9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A6C8F9 mov eax, dword ptr fs:[00000030h]2_2_00A6C8F9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A5E8C0 mov eax, dword ptr fs:[00000030h]2_2_00A5E8C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00B008C0 mov eax, dword ptr fs:[00000030h]2_2_00B008C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A52835 mov eax, dword ptr fs:[00000030h]2_2_00A52835
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A52835 mov eax, dword ptr fs:[00000030h]2_2_00A52835
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A52835 mov eax, dword ptr fs:[00000030h]2_2_00A52835
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A52835 mov ecx, dword ptr fs:[00000030h]2_2_00A52835
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A52835 mov eax, dword ptr fs:[00000030h]2_2_00A52835
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A52835 mov eax, dword ptr fs:[00000030h]2_2_00A52835
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A6A830 mov eax, dword ptr fs:[00000030h]2_2_00A6A830
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AD483A mov eax, dword ptr fs:[00000030h]2_2_00AD483A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AD483A mov eax, dword ptr fs:[00000030h]2_2_00AD483A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00ABC810 mov eax, dword ptr fs:[00000030h]2_2_00ABC810
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00ABE872 mov eax, dword ptr fs:[00000030h]2_2_00ABE872
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00ABE872 mov eax, dword ptr fs:[00000030h]2_2_00ABE872
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AC6870 mov eax, dword ptr fs:[00000030h]2_2_00AC6870
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AC6870 mov eax, dword ptr fs:[00000030h]2_2_00AC6870
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A42840 mov ecx, dword ptr fs:[00000030h]2_2_00A42840
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A60854 mov eax, dword ptr fs:[00000030h]2_2_00A60854
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A34859 mov eax, dword ptr fs:[00000030h]2_2_00A34859
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A34859 mov eax, dword ptr fs:[00000030h]2_2_00A34859
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A429A0 mov eax, dword ptr fs:[00000030h]2_2_00A429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A429A0 mov eax, dword ptr fs:[00000030h]2_2_00A429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A429A0 mov eax, dword ptr fs:[00000030h]2_2_00A429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A429A0 mov eax, dword ptr fs:[00000030h]2_2_00A429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A429A0 mov eax, dword ptr fs:[00000030h]2_2_00A429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A429A0 mov eax, dword ptr fs:[00000030h]2_2_00A429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A429A0 mov eax, dword ptr fs:[00000030h]2_2_00A429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A429A0 mov eax, dword ptr fs:[00000030h]2_2_00A429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A429A0 mov eax, dword ptr fs:[00000030h]2_2_00A429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A429A0 mov eax, dword ptr fs:[00000030h]2_2_00A429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A429A0 mov eax, dword ptr fs:[00000030h]2_2_00A429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A429A0 mov eax, dword ptr fs:[00000030h]2_2_00A429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A429A0 mov eax, dword ptr fs:[00000030h]2_2_00A429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A309AD mov eax, dword ptr fs:[00000030h]2_2_00A309AD
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A309AD mov eax, dword ptr fs:[00000030h]2_2_00A309AD
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AB89B3 mov esi, dword ptr fs:[00000030h]2_2_00AB89B3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AB89B3 mov eax, dword ptr fs:[00000030h]2_2_00AB89B3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AB89B3 mov eax, dword ptr fs:[00000030h]2_2_00AB89B3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00ABE9E0 mov eax, dword ptr fs:[00000030h]2_2_00ABE9E0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A629F9 mov eax, dword ptr fs:[00000030h]2_2_00A629F9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A629F9 mov eax, dword ptr fs:[00000030h]2_2_00A629F9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AC69C0 mov eax, dword ptr fs:[00000030h]2_2_00AC69C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A3A9D0 mov eax, dword ptr fs:[00000030h]2_2_00A3A9D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A3A9D0 mov eax, dword ptr fs:[00000030h]2_2_00A3A9D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A3A9D0 mov eax, dword ptr fs:[00000030h]2_2_00A3A9D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A3A9D0 mov eax, dword ptr fs:[00000030h]2_2_00A3A9D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A3A9D0 mov eax, dword ptr fs:[00000030h]2_2_00A3A9D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A3A9D0 mov eax, dword ptr fs:[00000030h]2_2_00A3A9D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A649D0 mov eax, dword ptr fs:[00000030h]2_2_00A649D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AFA9D3 mov eax, dword ptr fs:[00000030h]2_2_00AFA9D3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AB892A mov eax, dword ptr fs:[00000030h]2_2_00AB892A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AC892B mov eax, dword ptr fs:[00000030h]2_2_00AC892B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AAE908 mov eax, dword ptr fs:[00000030h]2_2_00AAE908
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AAE908 mov eax, dword ptr fs:[00000030h]2_2_00AAE908
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00ABC912 mov eax, dword ptr fs:[00000030h]2_2_00ABC912
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A28918 mov eax, dword ptr fs:[00000030h]2_2_00A28918
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A28918 mov eax, dword ptr fs:[00000030h]2_2_00A28918
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A56962 mov eax, dword ptr fs:[00000030h]2_2_00A56962
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A56962 mov eax, dword ptr fs:[00000030h]2_2_00A56962
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A56962 mov eax, dword ptr fs:[00000030h]2_2_00A56962
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A7096E mov eax, dword ptr fs:[00000030h]2_2_00A7096E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A7096E mov edx, dword ptr fs:[00000030h]2_2_00A7096E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A7096E mov eax, dword ptr fs:[00000030h]2_2_00A7096E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AD4978 mov eax, dword ptr fs:[00000030h]2_2_00AD4978
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AD4978 mov eax, dword ptr fs:[00000030h]2_2_00AD4978
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00ABC97C mov eax, dword ptr fs:[00000030h]2_2_00ABC97C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AB0946 mov eax, dword ptr fs:[00000030h]2_2_00AB0946
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00B04940 mov eax, dword ptr fs:[00000030h]2_2_00B04940
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A38AA0 mov eax, dword ptr fs:[00000030h]2_2_00A38AA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A38AA0 mov eax, dword ptr fs:[00000030h]2_2_00A38AA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A86AA4 mov eax, dword ptr fs:[00000030h]2_2_00A86AA4
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A3EA80 mov eax, dword ptr fs:[00000030h]2_2_00A3EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A3EA80 mov eax, dword ptr fs:[00000030h]2_2_00A3EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A3EA80 mov eax, dword ptr fs:[00000030h]2_2_00A3EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A3EA80 mov eax, dword ptr fs:[00000030h]2_2_00A3EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A3EA80 mov eax, dword ptr fs:[00000030h]2_2_00A3EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A3EA80 mov eax, dword ptr fs:[00000030h]2_2_00A3EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A3EA80 mov eax, dword ptr fs:[00000030h]2_2_00A3EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A3EA80 mov eax, dword ptr fs:[00000030h]2_2_00A3EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A3EA80 mov eax, dword ptr fs:[00000030h]2_2_00A3EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00B04A80 mov eax, dword ptr fs:[00000030h]2_2_00B04A80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A68A90 mov edx, dword ptr fs:[00000030h]2_2_00A68A90
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A6AAEE mov eax, dword ptr fs:[00000030h]2_2_00A6AAEE
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A6AAEE mov eax, dword ptr fs:[00000030h]2_2_00A6AAEE
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A86ACC mov eax, dword ptr fs:[00000030h]2_2_00A86ACC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A86ACC mov eax, dword ptr fs:[00000030h]2_2_00A86ACC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A86ACC mov eax, dword ptr fs:[00000030h]2_2_00A86ACC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A30AD0 mov eax, dword ptr fs:[00000030h]2_2_00A30AD0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A64AD0 mov eax, dword ptr fs:[00000030h]2_2_00A64AD0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A64AD0 mov eax, dword ptr fs:[00000030h]2_2_00A64AD0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A6CA24 mov eax, dword ptr fs:[00000030h]2_2_00A6CA24
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A5EA2E mov eax, dword ptr fs:[00000030h]2_2_00A5EA2E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A54A35 mov eax, dword ptr fs:[00000030h]2_2_00A54A35
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A54A35 mov eax, dword ptr fs:[00000030h]2_2_00A54A35
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A6CA38 mov eax, dword ptr fs:[00000030h]2_2_00A6CA38
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00ABCA11 mov eax, dword ptr fs:[00000030h]2_2_00ABCA11
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A6CA6F mov eax, dword ptr fs:[00000030h]2_2_00A6CA6F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A6CA6F mov eax, dword ptr fs:[00000030h]2_2_00A6CA6F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A6CA6F mov eax, dword ptr fs:[00000030h]2_2_00A6CA6F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00ADEA60 mov eax, dword ptr fs:[00000030h]2_2_00ADEA60
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AACA72 mov eax, dword ptr fs:[00000030h]2_2_00AACA72
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AACA72 mov eax, dword ptr fs:[00000030h]2_2_00AACA72
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A36A50 mov eax, dword ptr fs:[00000030h]2_2_00A36A50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A36A50 mov eax, dword ptr fs:[00000030h]2_2_00A36A50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A36A50 mov eax, dword ptr fs:[00000030h]2_2_00A36A50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A36A50 mov eax, dword ptr fs:[00000030h]2_2_00A36A50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A36A50 mov eax, dword ptr fs:[00000030h]2_2_00A36A50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A36A50 mov eax, dword ptr fs:[00000030h]2_2_00A36A50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A36A50 mov eax, dword ptr fs:[00000030h]2_2_00A36A50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A40A5B mov eax, dword ptr fs:[00000030h]2_2_00A40A5B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A40A5B mov eax, dword ptr fs:[00000030h]2_2_00A40A5B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A40BBE mov eax, dword ptr fs:[00000030h]2_2_00A40BBE
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A40BBE mov eax, dword ptr fs:[00000030h]2_2_00A40BBE
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AE4BB0 mov eax, dword ptr fs:[00000030h]2_2_00AE4BB0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AE4BB0 mov eax, dword ptr fs:[00000030h]2_2_00AE4BB0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A38BF0 mov eax, dword ptr fs:[00000030h]2_2_00A38BF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A38BF0 mov eax, dword ptr fs:[00000030h]2_2_00A38BF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A38BF0 mov eax, dword ptr fs:[00000030h]2_2_00A38BF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A5EBFC mov eax, dword ptr fs:[00000030h]2_2_00A5EBFC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00ABCBF0 mov eax, dword ptr fs:[00000030h]2_2_00ABCBF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A50BCB mov eax, dword ptr fs:[00000030h]2_2_00A50BCB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A50BCB mov eax, dword ptr fs:[00000030h]2_2_00A50BCB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A50BCB mov eax, dword ptr fs:[00000030h]2_2_00A50BCB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A30BCD mov eax, dword ptr fs:[00000030h]2_2_00A30BCD
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A30BCD mov eax, dword ptr fs:[00000030h]2_2_00A30BCD
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A30BCD mov eax, dword ptr fs:[00000030h]2_2_00A30BCD
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00ADEBD0 mov eax, dword ptr fs:[00000030h]2_2_00ADEBD0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A5EB20 mov eax, dword ptr fs:[00000030h]2_2_00A5EB20
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A5EB20 mov eax, dword ptr fs:[00000030h]2_2_00A5EB20
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AF8B28 mov eax, dword ptr fs:[00000030h]2_2_00AF8B28
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AF8B28 mov eax, dword ptr fs:[00000030h]2_2_00AF8B28
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00B04B00 mov eax, dword ptr fs:[00000030h]2_2_00B04B00
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AAEB1D mov eax, dword ptr fs:[00000030h]2_2_00AAEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AAEB1D mov eax, dword ptr fs:[00000030h]2_2_00AAEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AAEB1D mov eax, dword ptr fs:[00000030h]2_2_00AAEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AAEB1D mov eax, dword ptr fs:[00000030h]2_2_00AAEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AAEB1D mov eax, dword ptr fs:[00000030h]2_2_00AAEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AAEB1D mov eax, dword ptr fs:[00000030h]2_2_00AAEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AAEB1D mov eax, dword ptr fs:[00000030h]2_2_00AAEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AAEB1D mov eax, dword ptr fs:[00000030h]2_2_00AAEB1D
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeCode function: 0_2_0105810A GetTokenInformation,GetLastError,GetProcessHeap,HeapAlloc,GetTokenInformation,0_2_0105810A
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeCode function: 0_2_0102A124 SetUnhandledExceptionFilter,0_2_0102A124
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeCode function: 0_2_0102A155 SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0102A155

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeSection loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and writeJump to behavior
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeMemory written: C:\Windows\SysWOW64\svchost.exe base: 229008Jump to behavior
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeCode function: 0_2_010587B1 LogonUserW,0_2_010587B1
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeCode function: 0_2_01003B3A GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_01003B3A
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeCode function: 0_2_010048D7 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_010048D7
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeCode function: 0_2_01064C27 mouse_event,0_2_01064C27
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\FJRUb5lb9m.exe"Jump to behavior
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeCode function: 0_2_01057CAF GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_01057CAF
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeCode function: 0_2_0105874B AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_0105874B
          Source: FJRUb5lb9m.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
          Source: FJRUb5lb9m.exeBinary or memory string: Shell_TrayWnd
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeCode function: 0_2_0102862B cpuid 0_2_0102862B
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeCode function: 0_2_01034E87 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_01034E87
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeCode function: 0_2_01041E06 GetUserNameW,0_2_01041E06
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeCode function: 0_2_01033F3A __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_01033F3A
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeCode function: 0_2_010049A0 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_010049A0

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000002.00000002.1542995143.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.1543024692.0000000000520000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: FJRUb5lb9m.exeBinary or memory string: WIN_81
          Source: FJRUb5lb9m.exeBinary or memory string: WIN_XP
          Source: FJRUb5lb9m.exeBinary or memory string: WIN_XPe
          Source: FJRUb5lb9m.exeBinary or memory string: WIN_VISTA
          Source: FJRUb5lb9m.exeBinary or memory string: WIN_7
          Source: FJRUb5lb9m.exeBinary or memory string: WIN_8
          Source: FJRUb5lb9m.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_10WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 14, 0USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000002.00000002.1542995143.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.1543024692.0000000000520000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeCode function: 0_2_01076283 socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,0_2_01076283
          Source: C:\Users\user\Desktop\FJRUb5lb9m.exeCode function: 0_2_01076747 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_01076747
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire Infrastructure2
          Valid Accounts
          2
          Native API
          2
          Valid Accounts
          2
          Valid Accounts
          2
          Valid Accounts
          21
          Input Capture
          2
          System Time Discovery
          Remote Services21
          Input Capture
          1
          Encrypted Channel
          Exfiltration Over Other Network Medium1
          System Shutdown/Reboot
          CredentialsDomainsDefault AccountsScheduled Task/Job1
          DLL Side-Loading
          1
          Exploitation for Privilege Escalation
          1
          Disable or Modify Tools
          LSASS Memory25
          Security Software Discovery
          Remote Desktop Protocol1
          Archive Collected Data
          1
          Ingress Tool Transfer
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)21
          Access Token Manipulation
          2
          Virtualization/Sandbox Evasion
          Security Account Manager2
          Virtualization/Sandbox Evasion
          SMB/Windows Admin Shares3
          Clipboard Data
          SteganographyAutomated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook212
          Process Injection
          21
          Access Token Manipulation
          NTDS3
          Process Discovery
          Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script1
          DLL Side-Loading
          212
          Process Injection
          LSA Secrets1
          Application Window Discovery
          SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
          Deobfuscate/Decode Files or Information
          Cached Domain Credentials1
          Account Discovery
          VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
          DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
          Obfuscated Files or Information
          DCSync1
          System Owner/User Discovery
          Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
          Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
          DLL Side-Loading
          Proc Filesystem1
          File and Directory Discovery
          Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
          Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow115
          System Information Discovery
          Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          FJRUb5lb9m.exe66%ReversingLabsWin32.Trojan.AutoitInject
          FJRUb5lb9m.exe51%VirustotalBrowse
          FJRUb5lb9m.exe100%Joe Sandbox ML
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          NameIPActiveMaliciousAntivirus DetectionReputation
          s-part-0017.t-0009.t-msedge.net
          13.107.246.45
          truefalse
            high
            No contacted IP infos
            Joe Sandbox version:42.0.0 Malachite
            Analysis ID:1588680
            Start date and time:2025-01-11 04:05:21 +01:00
            Joe Sandbox product:CloudBasic
            Overall analysis duration:0h 5m 27s
            Hypervisor based Inspection enabled:false
            Report type:full
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
            Number of analysed new started processes analysed:6
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Sample name:FJRUb5lb9m.exe
            renamed because original name is a hash value
            Original Sample Name:dd0cbee3fccd6992b6441f30f51b452caaa7cfc79edd13204fa4099a19421525.exe
            Detection:MAL
            Classification:mal84.troj.evad.winEXE@3/2@0/0
            EGA Information:
            • Successful, ratio: 100%
            HCA Information:
            • Successful, ratio: 98%
            • Number of executed functions: 50
            • Number of non-executed functions: 281
            Cookbook Comments:
            • Found application associated with file extension: .exe
            • Stop behavior analysis, all processes terminated
            • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, SIHClient.exe, conhost.exe
            • Excluded IPs from analysis (whitelisted): 13.107.246.45, 52.149.20.212
            • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, otelrules.azureedge.net, otelrules.afd.azureedge.net, azureedge-t-prod.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
            • Not all processes where analyzed, report is missing behavior information
            • Report size exceeded maximum capacity and may have missing disassembly code.
            TimeTypeDescription
            22:06:29API Interceptor3x Sleep call for process: svchost.exe modified
            No context
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            s-part-0017.t-0009.t-msedge.net5hD3Yjf7xD.exeGet hashmaliciousAgentTeslaBrowse
            • 13.107.246.45
            02Eh1ah35H.exeGet hashmaliciousGuLoaderBrowse
            • 13.107.246.45
            AJ5zYYsisA.exeGet hashmaliciousUnknownBrowse
            • 13.107.246.45
            suBpo1g13Q.exeGet hashmaliciousFormBookBrowse
            • 13.107.246.45
            1297823757234143258.jsGet hashmaliciousStrela DownloaderBrowse
            • 13.107.246.45
            4N4nldx1wW.exeGet hashmaliciousFormBookBrowse
            • 13.107.246.45
            1487427797195518826.jsGet hashmaliciousStrela DownloaderBrowse
            • 13.107.246.45
            5by4QM3v89.exeGet hashmaliciousFormBookBrowse
            • 13.107.246.45
            uEuTtkxAqq.exeGet hashmaliciousAgentTeslaBrowse
            • 13.107.246.45
            23754232101540928500.jsGet hashmaliciousStrela DownloaderBrowse
            • 13.107.246.45
            No context
            No context
            No context
            Process:C:\Users\user\Desktop\FJRUb5lb9m.exe
            File Type:data
            Category:dropped
            Size (bytes):289280
            Entropy (8bit):7.990800531329619
            Encrypted:true
            SSDEEP:3072:3j4TmGjDgIUePbMztfFEIO53Mporam3QL/cy844YmP0vkR4ogy8IHRO6DQKK7Bw2:T4TmG5UUbMEIOtskQmYom0OdKUw/v2
            MD5:30112D177834BDE1902FCB7D97AA6232
            SHA1:5DE37A27EA03262F03A1D7683F1C74B0F3AA7B26
            SHA-256:D309AE8A3B5DB190CA5704FA9A93541B2152DF97E302E59E41A8A94D48731364
            SHA-512:419AA1662D38B982E95F135C5CAB3D570392E8B10153A4CF629A7D9AAAC0C4C4BE468D236A2BE0F8140A78B7BF4BFD1B443B3C3C2B771BC181E86762250EF072
            Malicious:false
            Reputation:low
            Preview:...Y@LICTSOD..ZY.YCLICPS.DZYZYUYCLICPSODZYZYUYCLICPSODZYZYUY.LIC^L.JZ.S.t.B..b.;&7z)(62+"!i 1=!+.y8<u+6"i*>s...y761<mADItSODZYZY,XJ.t#7.r$=.g92.Y..j3(.@..i9$.S...s$=..061~,..PSODZYZY..CL.BQS...ZYUYCLIC.SMEQXQYU.GLICPSODZY:JUYC\ICP#KDZY.YUICLIAPSIDZYZYUYELICPSODZ)^YU[CLICPSMD..ZYEYC\ICPS_DZIZYUYCLYCPSODZYZYUYCLICPSODZYZYUYCLICPSODZYZYUYCLICPSODZYZYUYCLICPSODZYZYUYCLICPSODZYZYUYCLICPSODZYZYUYCLICPSODZYZYUYCLICPSODZYZYUYCLICPSODt-?!!YCL}.TSOTZYZ.QYC\ICPSODZYZYUYCLiCP3ODZYZYUYCLICPSODZYZYUYCLICPSODZYZYUYCLICPSODZYZYUYCLICPSODZYZYUYCLICPSODZYZYUYCLICPSODZYZYUYCLICPSODZYZYUYCLICPSODZYZYUYCLICPSODZYZYUYCLICPSODZYZYUYCLICPSODZYZYUYCLICPSODZYZYUYCLICPSODZYZYUYCLICPSODZYZYUYCLICPSODZYZYUYCLICPSODZYZYUYCLICPSODZYZYUYCLICPSODZYZYUYCLICPSODZYZYUYCLICPSODZYZYUYCLICPSODZYZYUYCLICPSODZYZYUYCLICPSODZYZYUYCLICPSODZYZYUYCLICPSODZYZYUYCLICPSODZYZYUYCLICPSODZYZYUYCLICPSODZYZYUYCLICPSODZYZYUYCLICPSODZYZYUYCLICPSODZYZYUYCLICPSODZYZYUYCLICPSODZYZYUYCLICPSODZYZYUYCLICPSODZYZYUYCLICPSODZYZYUYCLICPSODZYZYUYCL
            Process:C:\Users\user\Desktop\FJRUb5lb9m.exe
            File Type:data
            Category:dropped
            Size (bytes):289280
            Entropy (8bit):7.990800531329619
            Encrypted:true
            SSDEEP:3072:3j4TmGjDgIUePbMztfFEIO53Mporam3QL/cy844YmP0vkR4ogy8IHRO6DQKK7Bw2:T4TmG5UUbMEIOtskQmYom0OdKUw/v2
            MD5:30112D177834BDE1902FCB7D97AA6232
            SHA1:5DE37A27EA03262F03A1D7683F1C74B0F3AA7B26
            SHA-256:D309AE8A3B5DB190CA5704FA9A93541B2152DF97E302E59E41A8A94D48731364
            SHA-512:419AA1662D38B982E95F135C5CAB3D570392E8B10153A4CF629A7D9AAAC0C4C4BE468D236A2BE0F8140A78B7BF4BFD1B443B3C3C2B771BC181E86762250EF072
            Malicious:false
            Reputation:low
            Preview:...Y@LICTSOD..ZY.YCLICPS.DZYZYUYCLICPSODZYZYUYCLICPSODZYZYUY.LIC^L.JZ.S.t.B..b.;&7z)(62+"!i 1=!+.y8<u+6"i*>s...y761<mADItSODZYZY,XJ.t#7.r$=.g92.Y..j3(.@..i9$.S...s$=..061~,..PSODZYZY..CL.BQS...ZYUYCLIC.SMEQXQYU.GLICPSODZY:JUYC\ICP#KDZY.YUICLIAPSIDZYZYUYELICPSODZ)^YU[CLICPSMD..ZYEYC\ICPS_DZIZYUYCLYCPSODZYZYUYCLICPSODZYZYUYCLICPSODZYZYUYCLICPSODZYZYUYCLICPSODZYZYUYCLICPSODZYZYUYCLICPSODZYZYUYCLICPSODZYZYUYCLICPSODZYZYUYCLICPSODt-?!!YCL}.TSOTZYZ.QYC\ICPSODZYZYUYCLiCP3ODZYZYUYCLICPSODZYZYUYCLICPSODZYZYUYCLICPSODZYZYUYCLICPSODZYZYUYCLICPSODZYZYUYCLICPSODZYZYUYCLICPSODZYZYUYCLICPSODZYZYUYCLICPSODZYZYUYCLICPSODZYZYUYCLICPSODZYZYUYCLICPSODZYZYUYCLICPSODZYZYUYCLICPSODZYZYUYCLICPSODZYZYUYCLICPSODZYZYUYCLICPSODZYZYUYCLICPSODZYZYUYCLICPSODZYZYUYCLICPSODZYZYUYCLICPSODZYZYUYCLICPSODZYZYUYCLICPSODZYZYUYCLICPSODZYZYUYCLICPSODZYZYUYCLICPSODZYZYUYCLICPSODZYZYUYCLICPSODZYZYUYCLICPSODZYZYUYCLICPSODZYZYUYCLICPSODZYZYUYCLICPSODZYZYUYCLICPSODZYZYUYCLICPSODZYZYUYCLICPSODZYZYUYCLICPSODZYZYUYCLICPSODZYZYUYCL
            File type:PE32 executable (GUI) Intel 80386, for MS Windows
            Entropy (8bit):7.194956018253899
            TrID:
            • Win32 Executable (generic) a (10002005/4) 99.96%
            • Generic Win/DOS Executable (2004/3) 0.02%
            • DOS Executable Generic (2002/1) 0.02%
            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
            File name:FJRUb5lb9m.exe
            File size:1'213'440 bytes
            MD5:896cef1e1ce8fb012437f05a81195d27
            SHA1:b825b626e64342dd5c3162ccd3df9c8c7c593f7b
            SHA256:dd0cbee3fccd6992b6441f30f51b452caaa7cfc79edd13204fa4099a19421525
            SHA512:9f8f0033db162205c57ddb90a5c53130b52bef8bd096db853a3cfc72be43b50a69757fede9925b7c74195b9bf8f678b5e95f71421508add14e7f18417ea50c3b
            SSDEEP:24576:Ou6J33O0c+JY5UZ+XC0kGso6FaYfSmkgvy+/tT7/odUWY:Au0c++OCvkGs9FaY4gxtHAZY
            TLSH:3F45CE2273DDC360CB669173BF6AB7016EBF7C214630B95B2F880D7DA950162162D7A3
            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......6...r}..r}..r}..4,".p}......s}.../..A}.../#..}.../".G}..{.@.{}..{.P.W}..r}..R.....)."}......s}.../..s}..r}T.s}......s}..Richr}.
            Icon Hash:aaf3e3e3938382a0
            Entrypoint:0x427dcd
            Entrypoint Section:.text
            Digitally signed:false
            Imagebase:0x400000
            Subsystem:windows gui
            Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
            DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
            Time Stamp:0x674FE556 [Wed Dec 4 05:15:02 2024 UTC]
            TLS Callbacks:
            CLR (.Net) Version:
            OS Version Major:5
            OS Version Minor:1
            File Version Major:5
            File Version Minor:1
            Subsystem Version Major:5
            Subsystem Version Minor:1
            Import Hash:afcdf79be1557326c854b6e20cb900a7
            Instruction
            call 00007F423114525Ah
            jmp 00007F4231138024h
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            push edi
            push esi
            mov esi, dword ptr [esp+10h]
            mov ecx, dword ptr [esp+14h]
            mov edi, dword ptr [esp+0Ch]
            mov eax, ecx
            mov edx, ecx
            add eax, esi
            cmp edi, esi
            jbe 00007F42311381AAh
            cmp edi, eax
            jc 00007F423113850Eh
            bt dword ptr [004C31FCh], 01h
            jnc 00007F42311381A9h
            rep movsb
            jmp 00007F42311384BCh
            cmp ecx, 00000080h
            jc 00007F4231138374h
            mov eax, edi
            xor eax, esi
            test eax, 0000000Fh
            jne 00007F42311381B0h
            bt dword ptr [004BE324h], 01h
            jc 00007F4231138680h
            bt dword ptr [004C31FCh], 00000000h
            jnc 00007F423113834Dh
            test edi, 00000003h
            jne 00007F423113835Eh
            test esi, 00000003h
            jne 00007F423113833Dh
            bt edi, 02h
            jnc 00007F42311381AFh
            mov eax, dword ptr [esi]
            sub ecx, 04h
            lea esi, dword ptr [esi+04h]
            mov dword ptr [edi], eax
            lea edi, dword ptr [edi+04h]
            bt edi, 03h
            jnc 00007F42311381B3h
            movq xmm1, qword ptr [esi]
            sub ecx, 08h
            lea esi, dword ptr [esi+08h]
            movq qword ptr [edi], xmm1
            lea edi, dword ptr [edi+08h]
            test esi, 00000007h
            je 00007F4231138205h
            bt esi, 03h
            jnc 00007F4231138258h
            Programming Language:
            • [ASM] VS2013 build 21005
            • [ C ] VS2013 build 21005
            • [C++] VS2013 build 21005
            • [ C ] VS2008 SP1 build 30729
            • [IMP] VS2008 SP1 build 30729
            • [ASM] VS2013 UPD4 build 31101
            • [RES] VS2013 build 21005
            • [LNK] VS2013 UPD4 build 31101
            NameVirtual AddressVirtual Size Is in Section
            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IMPORT0xba44c0x17c.rdata
            IMAGE_DIRECTORY_ENTRY_RESOURCE0xc70000x5fa18.rsrc
            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
            IMAGE_DIRECTORY_ENTRY_BASERELOC0x1270000x711c.reloc
            IMAGE_DIRECTORY_ENTRY_DEBUG0x92bc00x1c.rdata
            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xa48700x40.rdata
            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IAT0x8f0000x884.rdata
            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
            .text0x10000x8dcc40x8de00d28a820a1d9ff26cda02d12b888ba4b4False0.5728679102422908data6.676118058520316IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            .rdata0x8f0000x2e10e0x2e20079b14b254506b0dbc8cd0ad67fb70ad9False0.33535526761517614OpenPGP Public Key5.76010872795207IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .data0xbe0000x8f740x52009f9d6f746f1a415a63de45f8b7983d33False0.1017530487804878data1.198745897703538IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
            .rsrc0xc70000x5fa180x5fc0083af89597ebb36ca72d38df17f12d3beFalse0.9305289246083551data7.902264540181182IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .reloc0x1270000x711c0x72006fcae3cbbf6bfbabf5ec5bbe7cf612c3False0.7650767543859649data6.779031650454199IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
            NameRVASizeTypeLanguageCountryZLIB Complexity
            RT_ICON0xc75a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
            RT_ICON0xc76d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
            RT_ICON0xc77f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
            RT_ICON0xc79200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
            RT_ICON0xc7c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
            RT_ICON0xc7d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
            RT_ICON0xc8bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
            RT_ICON0xc94800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
            RT_ICON0xc99e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
            RT_ICON0xcbf900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
            RT_ICON0xcd0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
            RT_MENU0xcd4a00x50dataEnglishGreat Britain0.9
            RT_STRING0xcd4f00x594dataEnglishGreat Britain0.3333333333333333
            RT_STRING0xcda840x68adataEnglishGreat Britain0.2747909199522103
            RT_STRING0xce1100x490dataEnglishGreat Britain0.3715753424657534
            RT_STRING0xce5a00x5fcdataEnglishGreat Britain0.3087467362924282
            RT_STRING0xceb9c0x65cdataEnglishGreat Britain0.34336609336609336
            RT_STRING0xcf1f80x466dataEnglishGreat Britain0.3605683836589698
            RT_STRING0xcf6600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
            RT_RCDATA0xcf7b80x56cdfdata1.0003262541801317
            RT_GROUP_ICON0x1264980x76dataEnglishGreat Britain0.6610169491525424
            RT_GROUP_ICON0x1265100x14dataEnglishGreat Britain1.25
            RT_GROUP_ICON0x1265240x14dataEnglishGreat Britain1.15
            RT_GROUP_ICON0x1265380x14dataEnglishGreat Britain1.25
            RT_VERSION0x12654c0xdcdataEnglishGreat Britain0.6181818181818182
            RT_MANIFEST0x1266280x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
            DLLImport
            WSOCK32.dllWSACleanup, socket, inet_ntoa, setsockopt, ntohs, recvfrom, ioctlsocket, htons, WSAStartup, __WSAFDIsSet, select, accept, listen, bind, closesocket, WSAGetLastError, recv, sendto, send, inet_addr, gethostbyname, gethostname, connect
            VERSION.dllGetFileVersionInfoW, GetFileVersionInfoSizeW, VerQueryValueW
            WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
            COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
            MPR.dllWNetUseConnectionW, WNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W
            WININET.dllInternetQueryDataAvailable, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetConnectW
            PSAPI.DLLGetProcessMemoryInfo
            IPHLPAPI.DLLIcmpCreateFile, IcmpCloseHandle, IcmpSendEcho
            USERENV.dllDestroyEnvironmentBlock, UnloadUserProfile, CreateEnvironmentBlock, LoadUserProfileW
            UxTheme.dllIsThemeActive
            KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, SetCurrentDirectoryW, GetLongPathNameW, GetShortPathNameW, DeleteFileW, FindNextFileW, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, GetLocalTime, CompareStringW, GetCurrentProcess, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, LoadLibraryW, VirtualAlloc, IsDebuggerPresent, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, GetCurrentThread, CloseHandle, GetFullPathNameW, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetCommandLineW, IsProcessorFeaturePresent, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetStartupInfoW, GetStringTypeW, SetStdHandle, GetFileType, GetConsoleCP, GetConsoleMode, RtlUnwind, ReadConsoleW, GetTimeZoneInformation, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetEnvironmentStringsW, FreeEnvironmentStringsW, WriteConsoleW, FindClose, SetEnvironmentVariableA
            USER32.dllAdjustWindowRectEx, CopyImage, SetWindowPos, GetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, SetRect, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, MonitorFromRect, keybd_event, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, DispatchMessageW, TranslateMessage, PeekMessageW, UnregisterHotKey, CheckMenuRadioItem, CharLowerBuffW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, SystemParametersInfoW, LoadImageW, GetClassNameW
            GDI32.dllStrokePath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, GetDeviceCaps, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, LineTo, AngleArc, MoveToEx, Ellipse, DeleteDC, GetPixel, CreateDCW, GetStockObject, GetTextFaceW, CreateFontW, SetTextColor, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, StrokeAndFillPath
            COMDLG32.dllGetOpenFileNameW, GetSaveFileNameW
            ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, RegCreateKeyExW, FreeSid, GetTokenInformation, GetSecurityDescriptorDacl, GetAclInformation, AddAce, SetSecurityDescriptorDacl, GetUserNameW, InitiateSystemShutdownExW
            SHELL32.dllDragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
            ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoSetProxyBlanket, CoCreateInstanceEx, CoInitializeSecurity
            OLEAUT32.dllLoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, RegisterTypeLib, CreateStdDispatch, DispCallFunc, VariantChangeType, SysStringLen, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, VariantCopy, VariantClear, OleLoadPicture, QueryPathOfRegTypeLib, RegisterTypeLibForUser, UnRegisterTypeLibForUser, UnRegisterTypeLib, CreateDispTypeInfo, SysAllocString, VariantInit
            Language of compilation systemCountry where language is spokenMap
            EnglishGreat Britain
            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
            Jan 11, 2025 04:06:09.462251902 CET1.1.1.1192.168.2.90x6699No error (0)shed.dual-low.s-part-0017.t-0009.t-msedge.nets-part-0017.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
            Jan 11, 2025 04:06:09.462251902 CET1.1.1.1192.168.2.90x6699No error (0)s-part-0017.t-0009.t-msedge.net13.107.246.45A (IP address)IN (0x0001)false

            Click to jump to process

            Click to jump to process

            Click to dive into process behavior distribution

            Click to jump to process

            Target ID:0
            Start time:22:06:13
            Start date:10/01/2025
            Path:C:\Users\user\Desktop\FJRUb5lb9m.exe
            Wow64 process (32bit):true
            Commandline:"C:\Users\user\Desktop\FJRUb5lb9m.exe"
            Imagebase:0x1000000
            File size:1'213'440 bytes
            MD5 hash:896CEF1E1CE8FB012437F05A81195D27
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:low
            Has exited:true

            Target ID:2
            Start time:22:06:14
            Start date:10/01/2025
            Path:C:\Windows\SysWOW64\svchost.exe
            Wow64 process (32bit):true
            Commandline:"C:\Users\user\Desktop\FJRUb5lb9m.exe"
            Imagebase:0xd60000
            File size:46'504 bytes
            MD5 hash:1ED18311E3DA35942DB37D15FA40CC5B
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Yara matches:
            • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000002.00000002.1542995143.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
            • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000002.00000002.1543024692.0000000000520000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
            Reputation:high
            Has exited:true

            Reset < >

              Execution Graph

              Execution Coverage:3.7%
              Dynamic/Decrypted Code Coverage:1.5%
              Signature Coverage:8.8%
              Total number of Nodes:2000
              Total number of Limit Nodes:58
              execution_graph 101638 15b1278 101652 15aeec8 101638->101652 101640 15b1376 101655 15b1168 101640->101655 101658 15b23a8 GetPEB 101652->101658 101654 15af553 101654->101640 101656 15b1171 Sleep 101655->101656 101657 15b117f 101656->101657 101659 15b23d2 101658->101659 101659->101654 101660 1003633 101661 100366a 101660->101661 101662 10036e7 101661->101662 101663 1003688 101661->101663 101664 10036e5 101661->101664 101666 10036ed 101662->101666 101667 103d0cc 101662->101667 101668 1003695 101663->101668 101669 100374b PostQuitMessage 101663->101669 101665 10036ca DefWindowProcW 101664->101665 101675 10036d8 101665->101675 101670 10036f2 101666->101670 101671 1003715 SetTimer RegisterWindowMessageW 101666->101671 101709 1011070 10 API calls Mailbox 101667->101709 101673 10036a0 101668->101673 101674 103d154 101668->101674 101669->101675 101676 10036f9 KillTimer 101670->101676 101677 103d06f 101670->101677 101671->101675 101679 100373e CreatePopupMenu 101671->101679 101680 1003755 101673->101680 101681 10036a8 101673->101681 101725 1062527 71 API calls _memset 101674->101725 101705 100443a Shell_NotifyIconW _memset 101676->101705 101689 103d074 101677->101689 101690 103d0a8 MoveWindow 101677->101690 101678 103d0f3 101710 1011093 331 API calls Mailbox 101678->101710 101679->101675 101707 10044a0 64 API calls _memset 101680->101707 101685 10036b3 101681->101685 101686 103d139 101681->101686 101694 10036be 101685->101694 101695 103d124 101685->101695 101686->101665 101724 1057c36 59 API calls Mailbox 101686->101724 101687 103d166 101687->101665 101687->101675 101691 103d097 SetFocus 101689->101691 101692 103d078 101689->101692 101690->101675 101691->101675 101692->101694 101697 103d081 101692->101697 101693 100370c 101706 1003114 DeleteObject DestroyWindow Mailbox 101693->101706 101694->101665 101711 100443a Shell_NotifyIconW _memset 101694->101711 101723 1062d36 81 API calls _memset 101695->101723 101696 1003764 101696->101675 101708 1011070 10 API calls Mailbox 101697->101708 101703 103d118 101712 100434a 101703->101712 101705->101693 101706->101675 101707->101696 101708->101675 101709->101678 101710->101694 101711->101703 101713 1004375 _memset 101712->101713 101726 1004182 101713->101726 101715 10043fa 101718 1004430 Shell_NotifyIconW 101715->101718 101719 1004414 Shell_NotifyIconW 101715->101719 101720 1004422 101718->101720 101719->101720 101730 100407c 101720->101730 101722 1004429 101722->101664 101723->101696 101724->101664 101725->101687 101727 103d423 101726->101727 101728 1004196 101726->101728 101727->101728 101729 103d42c DestroyIcon 101727->101729 101728->101715 101752 1062f94 62 API calls _W_store_winword 101728->101752 101729->101728 101731 1004098 101730->101731 101751 100416f Mailbox 101730->101751 101753 1007a16 101731->101753 101734 10040b3 101758 1007bcc 101734->101758 101735 103d3c8 LoadStringW 101738 103d3e2 101735->101738 101737 10040c8 101737->101738 101739 10040d9 101737->101739 101740 1007b2e 59 API calls 101738->101740 101741 10040e3 101739->101741 101742 1004174 101739->101742 101745 103d3ec 101740->101745 101767 1007b2e 101741->101767 101776 1008047 101742->101776 101748 10040ed _memset _wcscpy 101745->101748 101780 1007cab 101745->101780 101747 103d40e 101750 1007cab 59 API calls 101747->101750 101749 1004155 Shell_NotifyIconW 101748->101749 101749->101751 101750->101748 101751->101722 101752->101715 101787 1020db6 101753->101787 101755 1007a3b 101797 1008029 101755->101797 101759 1007c45 101758->101759 101760 1007bd8 __wsetenvp 101758->101760 101832 1007d2c 101759->101832 101762 1007c13 101760->101762 101763 1007bee 101760->101763 101764 1008029 59 API calls 101762->101764 101828 1007f27 101763->101828 101766 1007bf6 _memmove 101764->101766 101766->101737 101768 1007b40 101767->101768 101769 103ec6b 101767->101769 101840 1007a51 101768->101840 101846 1057bdb 59 API calls _memmove 101769->101846 101772 103ec75 101774 1008047 59 API calls 101772->101774 101773 1007b4c 101773->101748 101775 103ec7d Mailbox 101774->101775 101777 1008052 101776->101777 101778 100805a 101776->101778 101847 1007f77 59 API calls 2 library calls 101777->101847 101778->101748 101781 103ed4a 101780->101781 101782 1007cbf 101780->101782 101784 1008029 59 API calls 101781->101784 101848 1007c50 101782->101848 101786 103ed55 __wsetenvp _memmove 101784->101786 101785 1007cca 101785->101747 101790 1020dbe 101787->101790 101789 1020dd8 101789->101755 101790->101789 101792 1020ddc std::exception::exception 101790->101792 101800 102571c 101790->101800 101817 10233a1 DecodePointer 101790->101817 101818 102859b RaiseException 101792->101818 101794 1020e06 101819 10284d1 58 API calls _free 101794->101819 101796 1020e18 101796->101755 101798 1020db6 Mailbox 59 API calls 101797->101798 101799 10040a6 101798->101799 101799->101734 101799->101735 101801 1025797 101800->101801 101814 1025728 101800->101814 101826 10233a1 DecodePointer 101801->101826 101803 102579d 101827 1028b28 58 API calls __getptd_noexit 101803->101827 101804 1025733 101804->101814 101820 102a16b 58 API calls 2 library calls 101804->101820 101821 102a1c8 58 API calls 8 library calls 101804->101821 101822 102309f GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 101804->101822 101807 102575b RtlAllocateHeap 101808 102578f 101807->101808 101807->101814 101808->101790 101810 1025783 101824 1028b28 58 API calls __getptd_noexit 101810->101824 101814->101804 101814->101807 101814->101810 101815 1025781 101814->101815 101823 10233a1 DecodePointer 101814->101823 101825 1028b28 58 API calls __getptd_noexit 101815->101825 101817->101790 101818->101794 101819->101796 101820->101804 101821->101804 101823->101814 101824->101815 101825->101808 101826->101803 101827->101808 101829 1007f3f 101828->101829 101831 1007f39 101828->101831 101830 1020db6 Mailbox 59 API calls 101829->101830 101830->101831 101831->101766 101833 1007d3a 101832->101833 101835 1007d43 _memmove 101832->101835 101833->101835 101836 1007e4f 101833->101836 101835->101766 101837 1007e62 101836->101837 101839 1007e5f _memmove 101836->101839 101838 1020db6 Mailbox 59 API calls 101837->101838 101838->101839 101839->101835 101841 1007a5f 101840->101841 101842 1007a85 _memmove 101840->101842 101841->101842 101843 1020db6 Mailbox 59 API calls 101841->101843 101842->101773 101844 1007ad4 101843->101844 101845 1020db6 Mailbox 59 API calls 101844->101845 101845->101842 101846->101772 101847->101778 101849 1007c5f __wsetenvp 101848->101849 101850 1008029 59 API calls 101849->101850 101851 1007c70 _memmove 101849->101851 101852 103ed07 _memmove 101850->101852 101851->101785 101853 103fe27 101866 101f944 101853->101866 101855 103fe3d 101856 103fe53 101855->101856 101857 103febe 101855->101857 101955 1009e5d 60 API calls 101856->101955 101875 100fce0 101857->101875 101859 103fe92 101861 104089c 101859->101861 101863 103fe9a 101859->101863 101957 1069e4a 89 API calls 4 library calls 101861->101957 101956 106834f 59 API calls Mailbox 101863->101956 101865 103feb2 Mailbox 101865->101865 101867 101f950 101866->101867 101868 101f962 101866->101868 101958 1009d3c 60 API calls Mailbox 101867->101958 101870 101f991 101868->101870 101871 101f968 101868->101871 101959 1009d3c 60 API calls Mailbox 101870->101959 101873 1020db6 Mailbox 59 API calls 101871->101873 101874 101f95a 101873->101874 101874->101855 101960 1008180 101875->101960 101877 100fd3d 101879 104472d 101877->101879 101938 10106f6 101877->101938 101965 100f234 101877->101965 102083 1069e4a 89 API calls 4 library calls 101879->102083 101882 1044742 101883 104488d 101883->101882 101890 100fe4c 101883->101890 102089 107a2d9 85 API calls Mailbox 101883->102089 101884 100fe3e 101884->101883 101884->101890 102087 10566ec 59 API calls 2 library calls 101884->102087 101885 1010517 101895 1020db6 Mailbox 59 API calls 101885->101895 101886 1044b53 101886->101882 102104 1069e4a 89 API calls 4 library calls 101886->102104 101888 1020db6 59 API calls Mailbox 101918 100fdd3 101888->101918 101890->101886 101896 10448f9 101890->101896 101969 100837c 101890->101969 101891 10447d7 101891->101882 102085 1069e4a 89 API calls 4 library calls 101891->102085 101892 1044848 102088 10560ef 59 API calls 2 library calls 101892->102088 101905 1010545 _memmove 101895->101905 101906 1044917 101896->101906 102091 10085c0 59 API calls Mailbox 101896->102091 101899 1044755 101899->101891 102084 100f6a3 331 API calls 101899->102084 101901 100fea4 101911 1044ad6 101901->101911 101912 100ff32 101901->101912 101931 1010179 Mailbox _memmove 101901->101931 101902 104486b 101907 1009ea0 331 API calls 101902->101907 101903 10448b2 Mailbox 101903->101890 102090 10566ec 59 API calls 2 library calls 101903->102090 101913 1020db6 Mailbox 59 API calls 101905->101913 101909 1044928 101906->101909 102092 10085c0 59 API calls Mailbox 101906->102092 101907->101883 101909->101931 102093 10560ab 59 API calls Mailbox 101909->102093 102102 1069ae7 60 API calls 101911->102102 101915 1020db6 Mailbox 59 API calls 101912->101915 101940 1010106 _memmove 101913->101940 101919 100ff39 101915->101919 101918->101882 101918->101884 101918->101885 101918->101888 101918->101899 101918->101905 101926 104480c 101918->101926 102057 1009ea0 101918->102057 101919->101938 101976 10109d0 101919->101976 101921 1009ea0 331 API calls 101923 1044a87 101921->101923 101923->101882 102097 10084c0 101923->102097 101925 100ffb2 101925->101905 101933 100ffe6 101925->101933 101925->101938 102086 1069e4a 89 API calls 4 library calls 101926->102086 101930 1044ab2 102101 1069e4a 89 API calls 4 library calls 101930->102101 101931->101930 101931->101938 101941 1010398 101931->101941 101942 1020db6 59 API calls Mailbox 101931->101942 101948 1044a1c 101931->101948 101953 1044a4d 101931->101953 102055 1008740 68 API calls __cinit 101931->102055 102056 1008660 68 API calls 101931->102056 102094 1065937 68 API calls 101931->102094 102095 10089b3 69 API calls Mailbox 101931->102095 102096 1009d3c 60 API calls Mailbox 101931->102096 101936 1008047 59 API calls 101933->101936 101939 1010007 101933->101939 101936->101939 102082 1069e4a 89 API calls 4 library calls 101938->102082 101939->101938 101943 1044b24 101939->101943 101946 101004c 101939->101946 101940->101931 101954 1010162 101940->101954 102081 1009c90 59 API calls Mailbox 101940->102081 101941->101865 101942->101931 102103 1009d3c 60 API calls Mailbox 101943->102103 101945 10100d8 102053 1009d3c 60 API calls Mailbox 101945->102053 101946->101886 101946->101938 101946->101945 101951 1020db6 Mailbox 59 API calls 101948->101951 101949 10100eb 101949->101938 102054 10082df 59 API calls Mailbox 101949->102054 101951->101953 101953->101921 101954->101865 101955->101859 101956->101865 101957->101865 101958->101874 101959->101874 101961 100818f 101960->101961 101964 10081aa 101960->101964 101962 1007e4f 59 API calls 101961->101962 101963 1008197 CharUpperBuffW 101962->101963 101963->101964 101964->101877 101966 100f251 101965->101966 101968 100f272 101966->101968 102105 1069e4a 89 API calls 4 library calls 101966->102105 101968->101918 101970 100838d 101969->101970 101971 103edbd 101969->101971 101972 1020db6 Mailbox 59 API calls 101970->101972 101973 1008394 101972->101973 101974 10083b5 101973->101974 102106 1008634 59 API calls Mailbox 101973->102106 101974->101896 101974->101901 101977 1044cc3 101976->101977 101988 10109f5 101976->101988 102168 1069e4a 89 API calls 4 library calls 101977->102168 101979 1010cfa 101979->101925 101981 1010ee4 101981->101979 101983 1010ef1 101981->101983 102166 1011093 331 API calls Mailbox 101983->102166 101984 1010a4b PeekMessageW 102052 1010a05 Mailbox 101984->102052 101986 1010ef8 LockWindowUpdate DestroyWindow GetMessageW 101986->101979 101990 1010f2a 101986->101990 101988->102052 102169 1009e5d 60 API calls 101988->102169 102170 1056349 331 API calls 101988->102170 101989 1044e81 Sleep 101989->102052 101993 1045c58 TranslateMessage DispatchMessageW GetMessageW 101990->101993 101991 1010ce4 101991->101979 102165 1011070 10 API calls Mailbox 101991->102165 101993->101993 101994 1045c88 101993->101994 101994->101979 101995 1010e43 PeekMessageW 101995->102052 101996 1010ea5 TranslateMessage DispatchMessageW 101996->101995 101997 1044d50 TranslateAcceleratorW 101997->101995 101997->102052 101999 1020db6 59 API calls Mailbox 101999->102052 102000 1010d13 timeGetTime 102000->102052 102001 104581f WaitForSingleObject 102003 104583c GetExitCodeProcess CloseHandle 102001->102003 102001->102052 102035 1010f95 102003->102035 102004 1010e5f Sleep 102037 1010e70 Mailbox 102004->102037 102005 1008047 59 API calls 102005->102052 102007 1045af8 Sleep 102007->102037 102008 100b73c 304 API calls 102008->102052 102010 102049f timeGetTime 102010->102037 102011 1010f4e timeGetTime 102167 1009e5d 60 API calls 102011->102167 102014 1045b8f GetExitCodeProcess 102016 1045ba5 WaitForSingleObject 102014->102016 102017 1045bbb CloseHandle 102014->102017 102016->102017 102016->102052 102017->102037 102020 1085f25 110 API calls 102020->102037 102021 100b7dd 109 API calls 102021->102037 102022 1009e5d 60 API calls 102022->102052 102023 1045874 102023->102035 102024 1045c17 Sleep 102024->102052 102025 1045078 Sleep 102025->102052 102033 100fce0 304 API calls 102033->102052 102035->101925 102037->102010 102037->102014 102037->102020 102037->102021 102037->102023 102037->102024 102037->102025 102037->102035 102037->102052 102195 1007667 102037->102195 102200 1062408 60 API calls 102037->102200 102201 1009e5d 60 API calls 102037->102201 102202 1007de1 102037->102202 102206 10089b3 69 API calls Mailbox 102037->102206 102207 100b73c 331 API calls 102037->102207 102208 10564da 60 API calls 102037->102208 102209 1065244 QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 102037->102209 102210 1063c55 66 API calls Mailbox 102037->102210 102038 1069e4a 89 API calls 102038->102052 102040 10084c0 69 API calls 102040->102052 102041 1009c90 59 API calls Mailbox 102041->102052 102042 1009ea0 304 API calls 102042->102052 102044 10089b3 69 API calls 102044->102052 102045 105617e 59 API calls Mailbox 102045->102052 102046 10455d5 VariantClear 102046->102052 102047 104566b VariantClear 102047->102052 102048 1008cd4 59 API calls Mailbox 102048->102052 102049 1045419 VariantClear 102049->102052 102050 1056e8f 59 API calls 102050->102052 102051 1007de1 59 API calls 102051->102052 102052->101984 102052->101989 102052->101991 102052->101995 102052->101996 102052->101997 102052->101999 102052->102000 102052->102001 102052->102004 102052->102005 102052->102007 102052->102008 102052->102011 102052->102022 102052->102033 102052->102035 102052->102037 102052->102038 102052->102040 102052->102041 102052->102042 102052->102044 102052->102045 102052->102046 102052->102047 102052->102048 102052->102049 102052->102050 102052->102051 102107 100e420 102052->102107 102114 100e6a0 102052->102114 102145 100f460 102052->102145 102164 10031ce IsDialogMessageW GetClassLongW 102052->102164 102171 1086018 59 API calls 102052->102171 102172 1069a15 59 API calls Mailbox 102052->102172 102173 105d4f2 59 API calls 102052->102173 102174 1009837 102052->102174 102192 10560ef 59 API calls 2 library calls 102052->102192 102193 1008401 59 API calls 102052->102193 102194 10082df 59 API calls Mailbox 102052->102194 102053->101949 102054->101940 102055->101931 102056->101931 102058 1009ebf 102057->102058 102076 1009eed Mailbox 102057->102076 102060 1020db6 Mailbox 59 API calls 102058->102060 102059 1022d40 67 API calls __cinit 102059->102076 102060->102076 102061 100b475 102062 1008047 59 API calls 102061->102062 102075 100a057 102062->102075 102063 1056e8f 59 API calls 102063->102076 102064 100b47a 102065 1040055 102064->102065 102080 10409e5 102064->102080 103282 1069e4a 89 API calls 4 library calls 102065->103282 102066 1007667 59 API calls 102066->102076 102070 1040064 102070->101918 102071 1020db6 59 API calls Mailbox 102071->102076 102072 1008047 59 API calls 102072->102076 102075->101918 102076->102059 102076->102061 102076->102063 102076->102064 102076->102065 102076->102066 102076->102071 102076->102072 102076->102075 102077 10409d6 102076->102077 102079 100a55a 102076->102079 103280 100c8c0 331 API calls 2 library calls 102076->103280 103281 100b900 60 API calls Mailbox 102076->103281 103284 1069e4a 89 API calls 4 library calls 102077->103284 103283 1069e4a 89 API calls 4 library calls 102079->103283 103285 1069e4a 89 API calls 4 library calls 102080->103285 102081->101940 102082->101879 102083->101882 102084->101891 102085->101882 102086->101882 102087->101892 102088->101902 102089->101903 102090->101903 102091->101906 102092->101909 102093->101931 102094->101931 102095->101931 102096->101931 102098 10084cb 102097->102098 102099 10084f2 102098->102099 103286 10089b3 69 API calls Mailbox 102098->103286 102099->101930 102101->101882 102102->101933 102103->101886 102104->101882 102105->101968 102106->101974 102108 100e451 102107->102108 102109 100e43d 102107->102109 102212 1069e4a 89 API calls 4 library calls 102108->102212 102211 100df00 331 API calls 2 library calls 102109->102211 102111 100e448 102111->102052 102113 1043aa4 102113->102113 102115 100e6d5 102114->102115 102116 1043aa9 102115->102116 102117 100e73f 102115->102117 102127 100e799 102115->102127 102118 1009ea0 331 API calls 102116->102118 102122 1007667 59 API calls 102117->102122 102117->102127 102119 1043abe 102118->102119 102144 100e970 Mailbox 102119->102144 102214 1069e4a 89 API calls 4 library calls 102119->102214 102120 1007667 59 API calls 102120->102127 102123 1043b04 102122->102123 102215 1022d40 102123->102215 102124 1022d40 __cinit 67 API calls 102124->102127 102125 1043b26 102125->102052 102127->102120 102127->102124 102127->102125 102130 100e95a 102127->102130 102127->102144 102128 10084c0 69 API calls 102128->102144 102129 1009ea0 331 API calls 102129->102144 102130->102144 102218 1069e4a 89 API calls 4 library calls 102130->102218 102132 1008d40 59 API calls 102132->102144 102134 1069e4a 89 API calls 102134->102144 102141 1043e25 102141->102052 102142 100f195 102222 1069e4a 89 API calls 4 library calls 102142->102222 102143 100ea78 102143->102052 102144->102128 102144->102129 102144->102132 102144->102134 102144->102142 102144->102143 102213 1007f77 59 API calls 2 library calls 102144->102213 102219 1056e8f 59 API calls 102144->102219 102220 107c5c3 331 API calls 102144->102220 102221 107b53c 331 API calls Mailbox 102144->102221 102223 1009c90 59 API calls Mailbox 102144->102223 102224 10793c6 331 API calls Mailbox 102144->102224 102146 100f650 102145->102146 102147 100f4ba 102145->102147 102150 1007de1 59 API calls 102146->102150 102148 100f4c6 102147->102148 102149 104441e 102147->102149 102401 100f290 331 API calls 2 library calls 102148->102401 102403 107bc6b 102149->102403 102153 100f58c Mailbox 102150->102153 102303 1004e4a 102153->102303 102309 1063c37 102153->102309 102312 106cb7a 102153->102312 102392 107445a 102153->102392 102154 100f4fd 102154->102153 102155 100f630 102154->102155 102156 104442c 102154->102156 102155->102052 102156->102155 102443 1069e4a 89 API calls 4 library calls 102156->102443 102159 100f5e3 102159->102155 102402 1009c90 59 API calls Mailbox 102159->102402 102164->102052 102165->101981 102166->101986 102167->102052 102168->101988 102169->101988 102170->101988 102171->102052 102172->102052 102173->102052 102175 1009851 102174->102175 102176 100984b 102174->102176 102177 103f5d3 __i64tow 102175->102177 102178 1009899 102175->102178 102179 1009857 __itow 102175->102179 102183 103f4da 102175->102183 102176->102052 103278 1023698 83 API calls 4 library calls 102178->103278 102181 1020db6 Mailbox 59 API calls 102179->102181 102184 1009871 102181->102184 102185 103f552 Mailbox _wcscpy 102183->102185 102186 1020db6 Mailbox 59 API calls 102183->102186 102184->102176 102187 1007de1 59 API calls 102184->102187 103279 1023698 83 API calls 4 library calls 102185->103279 102188 103f51f 102186->102188 102187->102176 102189 1020db6 Mailbox 59 API calls 102188->102189 102190 103f545 102189->102190 102190->102185 102191 1007de1 59 API calls 102190->102191 102191->102185 102192->102052 102193->102052 102194->102052 102196 1020db6 Mailbox 59 API calls 102195->102196 102197 1007688 102196->102197 102198 1020db6 Mailbox 59 API calls 102197->102198 102199 1007696 102198->102199 102199->102037 102200->102037 102201->102037 102203 1007df0 __wsetenvp _memmove 102202->102203 102204 1020db6 Mailbox 59 API calls 102203->102204 102205 1007e2e 102204->102205 102205->102037 102206->102037 102207->102037 102208->102037 102209->102037 102210->102037 102211->102111 102212->102113 102213->102144 102214->102144 102225 1022c44 102215->102225 102217 1022d4b 102217->102127 102218->102144 102219->102144 102220->102144 102221->102144 102222->102141 102223->102144 102224->102144 102226 1022c50 __wfsopen 102225->102226 102233 1023217 102226->102233 102232 1022c77 __wfsopen 102232->102217 102250 1029c0b 102233->102250 102235 1022c59 102236 1022c88 DecodePointer DecodePointer 102235->102236 102237 1022c65 102236->102237 102238 1022cb5 102236->102238 102247 1022c82 102237->102247 102238->102237 102296 10287a4 59 API calls 2 library calls 102238->102296 102240 1022d18 EncodePointer EncodePointer 102240->102237 102241 1022cc7 102241->102240 102243 1022cec 102241->102243 102297 1028864 61 API calls 2 library calls 102241->102297 102243->102237 102245 1022d06 EncodePointer 102243->102245 102298 1028864 61 API calls 2 library calls 102243->102298 102245->102240 102246 1022d00 102246->102237 102246->102245 102299 1023220 102247->102299 102251 1029c2f EnterCriticalSection 102250->102251 102252 1029c1c 102250->102252 102251->102235 102257 1029c93 102252->102257 102254 1029c22 102254->102251 102281 10230b5 58 API calls 3 library calls 102254->102281 102258 1029c9f __wfsopen 102257->102258 102259 1029cc0 102258->102259 102260 1029ca8 102258->102260 102268 1029ce1 __wfsopen 102259->102268 102285 102881d 58 API calls 2 library calls 102259->102285 102282 102a16b 58 API calls 2 library calls 102260->102282 102262 1029cad 102283 102a1c8 58 API calls 8 library calls 102262->102283 102265 1029cd5 102266 1029ceb 102265->102266 102267 1029cdc 102265->102267 102271 1029c0b __lock 58 API calls 102266->102271 102286 1028b28 58 API calls __getptd_noexit 102267->102286 102268->102254 102269 1029cb4 102284 102309f GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 102269->102284 102273 1029cf2 102271->102273 102275 1029d17 102273->102275 102276 1029cff 102273->102276 102288 1022d55 102275->102288 102287 1029e2b InitializeCriticalSectionAndSpinCount 102276->102287 102279 1029d0b 102294 1029d33 LeaveCriticalSection _doexit 102279->102294 102282->102262 102283->102269 102285->102265 102286->102268 102287->102279 102289 1022d87 __dosmaperr 102288->102289 102290 1022d5e RtlFreeHeap 102288->102290 102289->102279 102290->102289 102291 1022d73 102290->102291 102295 1028b28 58 API calls __getptd_noexit 102291->102295 102293 1022d79 GetLastError 102293->102289 102294->102268 102295->102293 102296->102241 102297->102243 102298->102246 102302 1029d75 LeaveCriticalSection 102299->102302 102301 1022c87 102301->102232 102302->102301 102304 1004e54 102303->102304 102305 1004e5b 102303->102305 102444 10253a6 102304->102444 102307 1004e6a 102305->102307 102308 1004e7b FreeLibrary 102305->102308 102307->102159 102308->102307 102714 106445a GetFileAttributesW 102309->102714 102313 1007667 59 API calls 102312->102313 102314 106cbaf 102313->102314 102315 1007667 59 API calls 102314->102315 102316 106cbb8 102315->102316 102317 106cbcc 102316->102317 102905 1009b3c 102316->102905 102319 1009837 84 API calls 102317->102319 102320 106cbe9 102319->102320 102321 106ccea 102320->102321 102322 106cc0b 102320->102322 102333 106cd1a Mailbox 102320->102333 102718 1004ddd 102321->102718 102323 1009837 84 API calls 102322->102323 102325 106cc17 102323->102325 102328 1008047 59 API calls 102325->102328 102327 106cd16 102330 1007667 59 API calls 102327->102330 102327->102333 102331 106cc23 102328->102331 102329 1004ddd 136 API calls 102329->102327 102332 106cd4b 102330->102332 102335 106cc37 102331->102335 102336 106cc69 102331->102336 102334 1007667 59 API calls 102332->102334 102333->102159 102337 106cd54 102334->102337 102338 1008047 59 API calls 102335->102338 102339 1009837 84 API calls 102336->102339 102340 1007667 59 API calls 102337->102340 102341 106cc47 102338->102341 102342 106cc76 102339->102342 102343 106cd5d 102340->102343 102344 1007cab 59 API calls 102341->102344 102345 1008047 59 API calls 102342->102345 102346 1007667 59 API calls 102343->102346 102348 106cc51 102344->102348 102349 106cc82 102345->102349 102347 106cd66 102346->102347 102350 1009837 84 API calls 102347->102350 102351 1009837 84 API calls 102348->102351 102909 1064a31 GetFileAttributesW 102349->102909 102354 106cd73 102350->102354 102355 106cc5d 102351->102355 102353 106cc8b 102358 10079f2 59 API calls 102353->102358 102361 106cc9e 102353->102361 102742 100459b 102354->102742 102357 1007b2e 59 API calls 102355->102357 102357->102336 102358->102361 102359 106cd8e 102793 10079f2 102359->102793 102360 1009837 84 API calls 102363 106cccb 102360->102363 102361->102360 102367 106cca4 102361->102367 102910 10637ef 75 API calls Mailbox 102363->102910 102366 106cdd1 102369 1008047 59 API calls 102366->102369 102367->102333 102368 10079f2 59 API calls 102371 106cdae 102368->102371 102370 106cddf 102369->102370 102372 1007b2e 59 API calls 102370->102372 102371->102366 102374 1007bcc 59 API calls 102371->102374 102373 106cded 102372->102373 102375 1007b2e 59 API calls 102373->102375 102376 106cdc3 102374->102376 102377 106cdfb 102375->102377 102378 1007bcc 59 API calls 102376->102378 102379 1007b2e 59 API calls 102377->102379 102378->102366 102380 106ce09 102379->102380 102381 1009837 84 API calls 102380->102381 102382 106ce15 102381->102382 102796 1064071 102382->102796 102384 106ce26 102385 1063c37 3 API calls 102384->102385 102386 106ce30 102385->102386 102387 1009837 84 API calls 102386->102387 102390 106ce61 102386->102390 102388 106ce4e 102387->102388 102850 1069155 102388->102850 102391 1004e4a 84 API calls 102390->102391 102391->102333 102393 1009837 84 API calls 102392->102393 102394 1074494 102393->102394 103230 1006240 102394->103230 102396 10744a4 102397 10744c9 102396->102397 102398 1009ea0 331 API calls 102396->102398 102400 10744cd 102397->102400 103255 1009a98 59 API calls Mailbox 102397->103255 102398->102397 102400->102159 102401->102154 102402->102159 102404 107bc96 102403->102404 102405 107bcb0 102403->102405 103270 1069e4a 89 API calls 4 library calls 102404->103270 103271 107a213 59 API calls Mailbox 102405->103271 102408 107bcbb 102409 1009ea0 330 API calls 102408->102409 102410 107bd1c 102409->102410 102411 107bdae 102410->102411 102412 107bd5d 102410->102412 102436 107bca8 Mailbox 102410->102436 102413 107be04 102411->102413 102415 107bdb4 102411->102415 103272 10672df 59 API calls Mailbox 102412->103272 102414 1009837 84 API calls 102413->102414 102413->102436 102416 107be16 102414->102416 103273 106791a 59 API calls 102415->103273 102420 1007e4f 59 API calls 102416->102420 102418 107bdd7 103274 1005d41 59 API calls Mailbox 102418->103274 102423 107be3a CharUpperBuffW 102420->102423 102422 107bd8d 102425 100f460 330 API calls 102422->102425 102426 107be54 102423->102426 102424 107bddf Mailbox 102429 100fce0 330 API calls 102424->102429 102425->102436 102427 107bea7 102426->102427 102428 107be5b 102426->102428 102430 1009837 84 API calls 102427->102430 103275 10672df 59 API calls Mailbox 102428->103275 102429->102436 102431 107beaf 102430->102431 103276 1009e5d 60 API calls 102431->103276 102434 107be89 102435 100f460 330 API calls 102434->102435 102435->102436 102436->102156 102437 107beb9 102437->102436 102438 1009837 84 API calls 102437->102438 102439 107bed4 102438->102439 103277 1005d41 59 API calls Mailbox 102439->103277 102441 107bee4 102442 100fce0 330 API calls 102441->102442 102442->102436 102443->102155 102445 10253b2 __wfsopen 102444->102445 102446 10253c6 102445->102446 102447 10253de 102445->102447 102479 1028b28 58 API calls __getptd_noexit 102446->102479 102453 10253d6 __wfsopen 102447->102453 102457 1026c11 102447->102457 102449 10253cb 102480 1028db6 9 API calls __gmtime64_s 102449->102480 102453->102305 102458 1026c43 EnterCriticalSection 102457->102458 102459 1026c21 102457->102459 102460 10253f0 102458->102460 102459->102458 102461 1026c29 102459->102461 102463 102533a 102460->102463 102462 1029c0b __lock 58 API calls 102461->102462 102462->102460 102464 1025349 102463->102464 102465 102535d 102463->102465 102525 1028b28 58 API calls __getptd_noexit 102464->102525 102472 1025359 102465->102472 102482 1024a3d 102465->102482 102467 102534e 102526 1028db6 9 API calls __gmtime64_s 102467->102526 102481 1025415 LeaveCriticalSection LeaveCriticalSection _fprintf 102472->102481 102475 1025377 102499 1030a02 102475->102499 102477 102537d 102477->102472 102478 1022d55 _free 58 API calls 102477->102478 102478->102472 102479->102449 102480->102453 102481->102453 102483 1024a50 102482->102483 102484 1024a74 102482->102484 102483->102484 102485 10246e6 __fputwc_nolock 58 API calls 102483->102485 102488 1030b77 102484->102488 102486 1024a6d 102485->102486 102527 102d886 102486->102527 102489 1025371 102488->102489 102490 1030b84 102488->102490 102492 10246e6 102489->102492 102490->102489 102491 1022d55 _free 58 API calls 102490->102491 102491->102489 102493 10246f0 102492->102493 102494 1024705 102492->102494 102669 1028b28 58 API calls __getptd_noexit 102493->102669 102494->102475 102496 10246f5 102670 1028db6 9 API calls __gmtime64_s 102496->102670 102498 1024700 102498->102475 102500 1030a0e __wfsopen 102499->102500 102501 1030a32 102500->102501 102502 1030a1b 102500->102502 102503 1030abd 102501->102503 102506 1030a42 102501->102506 102686 1028af4 58 API calls __getptd_noexit 102502->102686 102691 1028af4 58 API calls __getptd_noexit 102503->102691 102505 1030a20 102687 1028b28 58 API calls __getptd_noexit 102505->102687 102509 1030a60 102506->102509 102510 1030a6a 102506->102510 102688 1028af4 58 API calls __getptd_noexit 102509->102688 102513 102d206 ___lock_fhandle 59 API calls 102510->102513 102511 1030a65 102692 1028b28 58 API calls __getptd_noexit 102511->102692 102515 1030a70 102513->102515 102517 1030a83 102515->102517 102518 1030a8e 102515->102518 102516 1030ac9 102693 1028db6 9 API calls __gmtime64_s 102516->102693 102671 1030add 102517->102671 102689 1028b28 58 API calls __getptd_noexit 102518->102689 102522 1030a27 __wfsopen 102522->102477 102523 1030a89 102690 1030ab5 LeaveCriticalSection __unlock_fhandle 102523->102690 102525->102467 102526->102472 102528 102d892 __wfsopen 102527->102528 102529 102d8b6 102528->102529 102530 102d89f 102528->102530 102531 102d955 102529->102531 102534 102d8ca 102529->102534 102628 1028af4 58 API calls __getptd_noexit 102530->102628 102634 1028af4 58 API calls __getptd_noexit 102531->102634 102533 102d8a4 102629 1028b28 58 API calls __getptd_noexit 102533->102629 102537 102d8f2 102534->102537 102538 102d8e8 102534->102538 102555 102d206 102537->102555 102630 1028af4 58 API calls __getptd_noexit 102538->102630 102539 102d8ed 102635 1028b28 58 API calls __getptd_noexit 102539->102635 102542 102d8f8 102544 102d90b 102542->102544 102545 102d91e 102542->102545 102564 102d975 102544->102564 102631 1028b28 58 API calls __getptd_noexit 102545->102631 102546 102d961 102636 1028db6 9 API calls __gmtime64_s 102546->102636 102548 102d8ab __wfsopen 102548->102484 102551 102d923 102632 1028af4 58 API calls __getptd_noexit 102551->102632 102552 102d917 102633 102d94d LeaveCriticalSection __unlock_fhandle 102552->102633 102556 102d212 __wfsopen 102555->102556 102557 102d261 EnterCriticalSection 102556->102557 102558 1029c0b __lock 58 API calls 102556->102558 102559 102d287 __wfsopen 102557->102559 102560 102d237 102558->102560 102559->102542 102561 102d24f 102560->102561 102637 1029e2b InitializeCriticalSectionAndSpinCount 102560->102637 102638 102d28b LeaveCriticalSection _doexit 102561->102638 102565 102d982 __write_nolock 102564->102565 102566 102d9e0 102565->102566 102567 102d9c1 102565->102567 102593 102d9b6 102565->102593 102570 102da38 102566->102570 102571 102da1c 102566->102571 102648 1028af4 58 API calls __getptd_noexit 102567->102648 102575 102da51 102570->102575 102654 10318c1 60 API calls 3 library calls 102570->102654 102651 1028af4 58 API calls __getptd_noexit 102571->102651 102572 102e1d6 102572->102552 102573 102d9c6 102649 1028b28 58 API calls __getptd_noexit 102573->102649 102639 1035c6b 102575->102639 102577 102da21 102652 1028b28 58 API calls __getptd_noexit 102577->102652 102579 102d9cd 102650 1028db6 9 API calls __gmtime64_s 102579->102650 102583 102da5f 102584 102ddb8 102583->102584 102655 10299ac 58 API calls 2 library calls 102583->102655 102586 102ddd6 102584->102586 102587 102e14b WriteFile 102584->102587 102585 102da28 102653 1028db6 9 API calls __gmtime64_s 102585->102653 102590 102defa 102586->102590 102595 102ddec 102586->102595 102591 102ddab GetLastError 102587->102591 102621 102dd78 102587->102621 102606 102dfef 102590->102606 102608 102df05 102590->102608 102591->102621 102592 102da8b GetConsoleMode 102592->102584 102594 102daca 102592->102594 102662 102c5f6 102593->102662 102594->102584 102597 102dada GetConsoleCP 102594->102597 102596 102e184 102595->102596 102598 102de5b WriteFile 102595->102598 102596->102593 102660 1028b28 58 API calls __getptd_noexit 102596->102660 102597->102596 102624 102db09 102597->102624 102598->102591 102601 102de98 102598->102601 102600 102ded8 102603 102dee3 102600->102603 102604 102e17b 102600->102604 102601->102595 102607 102debc 102601->102607 102602 102e1b2 102661 1028af4 58 API calls __getptd_noexit 102602->102661 102657 1028b28 58 API calls __getptd_noexit 102603->102657 102659 1028b07 58 API calls 3 library calls 102604->102659 102605 102e064 WideCharToMultiByte 102605->102591 102619 102e0ab 102605->102619 102606->102596 102606->102605 102607->102621 102608->102596 102609 102df6a WriteFile 102608->102609 102609->102591 102611 102dfb9 102609->102611 102611->102607 102611->102608 102611->102621 102614 102dee8 102658 1028af4 58 API calls __getptd_noexit 102614->102658 102615 102e0b3 WriteFile 102618 102e106 GetLastError 102615->102618 102615->102619 102618->102619 102619->102606 102619->102607 102619->102615 102619->102621 102620 1037a5e WriteConsoleW CreateFileW __putwch_nolock 102626 102dc5f 102620->102626 102621->102593 102621->102596 102621->102600 102622 10362ba 60 API calls __write_nolock 102622->102624 102623 102dbf2 WideCharToMultiByte 102623->102621 102625 102dc2d WriteFile 102623->102625 102624->102621 102624->102622 102624->102623 102624->102626 102656 10235f5 58 API calls __isleadbyte_l 102624->102656 102625->102591 102625->102626 102626->102591 102626->102620 102626->102621 102626->102624 102627 102dc87 WriteFile 102626->102627 102627->102591 102627->102626 102628->102533 102629->102548 102630->102539 102631->102551 102632->102552 102633->102548 102634->102539 102635->102546 102636->102548 102637->102561 102638->102557 102640 1035c83 102639->102640 102641 1035c76 102639->102641 102643 1028b28 ___libm_error_support 58 API calls 102640->102643 102645 1035c8f 102640->102645 102642 1028b28 ___libm_error_support 58 API calls 102641->102642 102644 1035c7b 102642->102644 102646 1035cb0 102643->102646 102644->102583 102645->102583 102647 1028db6 __gmtime64_s 9 API calls 102646->102647 102647->102644 102648->102573 102649->102579 102650->102593 102651->102577 102652->102585 102653->102593 102654->102575 102655->102592 102656->102624 102657->102614 102658->102593 102659->102593 102660->102602 102661->102593 102663 102c600 IsProcessorFeaturePresent 102662->102663 102664 102c5fe 102662->102664 102666 103590a 102663->102666 102664->102572 102667 10358b9 ___raise_securityfailure 5 API calls 102666->102667 102668 10359ed 102667->102668 102668->102572 102669->102496 102670->102498 102694 102d4c3 102671->102694 102673 1030b41 102707 102d43d 59 API calls 2 library calls 102673->102707 102674 1030aeb 102674->102673 102676 1030b1f 102674->102676 102677 102d4c3 __close_nolock 58 API calls 102674->102677 102676->102673 102678 102d4c3 __close_nolock 58 API calls 102676->102678 102680 1030b16 102677->102680 102681 1030b2b CloseHandle 102678->102681 102679 1030b49 102682 1030b6b 102679->102682 102708 1028b07 58 API calls 3 library calls 102679->102708 102683 102d4c3 __close_nolock 58 API calls 102680->102683 102681->102673 102684 1030b37 GetLastError 102681->102684 102682->102523 102683->102676 102684->102673 102686->102505 102687->102522 102688->102511 102689->102523 102690->102522 102691->102511 102692->102516 102693->102522 102695 102d4e3 102694->102695 102696 102d4ce 102694->102696 102700 102d508 102695->102700 102711 1028af4 58 API calls __getptd_noexit 102695->102711 102709 1028af4 58 API calls __getptd_noexit 102696->102709 102699 102d4d3 102710 1028b28 58 API calls __getptd_noexit 102699->102710 102700->102674 102701 102d512 102712 1028b28 58 API calls __getptd_noexit 102701->102712 102704 102d4db 102704->102674 102705 102d51a 102713 1028db6 9 API calls __gmtime64_s 102705->102713 102707->102679 102708->102682 102709->102699 102710->102704 102711->102701 102712->102705 102713->102704 102715 1063c3e 102714->102715 102716 1064475 FindFirstFileW 102714->102716 102715->102159 102716->102715 102717 106448a FindClose 102716->102717 102717->102715 102911 1004bb5 102718->102911 102723 103d8e6 102725 1004e4a 84 API calls 102723->102725 102724 1004e08 LoadLibraryExW 102921 1004b6a 102724->102921 102727 103d8ed 102725->102727 102729 1004b6a 3 API calls 102727->102729 102731 103d8f5 102729->102731 102947 1004f0b 102731->102947 102732 1004e2f 102732->102731 102733 1004e3b 102732->102733 102734 1004e4a 84 API calls 102733->102734 102736 1004e40 102734->102736 102736->102327 102736->102329 102739 103d91c 102955 1004ec7 102739->102955 102743 1007667 59 API calls 102742->102743 102744 10045b1 102743->102744 102745 1007667 59 API calls 102744->102745 102746 10045b9 102745->102746 102747 1007667 59 API calls 102746->102747 102748 10045c1 102747->102748 102749 1007667 59 API calls 102748->102749 102750 10045c9 102749->102750 102751 103d4d2 102750->102751 102752 10045fd 102750->102752 102753 1008047 59 API calls 102751->102753 102754 100784b 59 API calls 102752->102754 102755 103d4db 102753->102755 102756 100460b 102754->102756 103137 1007d8c 102755->103137 102758 1007d2c 59 API calls 102756->102758 102759 1004615 102758->102759 102760 1004640 102759->102760 102761 100784b 59 API calls 102759->102761 102762 103d4fb 102760->102762 102763 100465f 102760->102763 102779 1004680 102760->102779 102764 1004636 102761->102764 102766 103d5cb 102762->102766 102778 103d5b4 102762->102778 102787 103d532 102762->102787 102768 10079f2 59 API calls 102763->102768 102767 1007d2c 59 API calls 102764->102767 102771 1007bcc 59 API calls 102766->102771 102767->102760 102772 1004669 102768->102772 102769 1004691 102770 10046a3 102769->102770 102773 1008047 59 API calls 102769->102773 102774 1008047 59 API calls 102770->102774 102775 10046b3 102770->102775 102788 103d588 102771->102788 102777 100784b 59 API calls 102772->102777 102772->102779 102773->102770 102774->102775 102776 10046ba 102775->102776 102780 1008047 59 API calls 102775->102780 102781 1008047 59 API calls 102776->102781 102790 10046c1 Mailbox 102776->102790 102777->102779 102778->102766 102783 103d59f 102778->102783 103124 100784b 102779->103124 102780->102776 102781->102790 102782 10079f2 59 API calls 102782->102788 102786 1007bcc 59 API calls 102783->102786 102784 103d590 102785 1007bcc 59 API calls 102784->102785 102785->102788 102786->102788 102787->102784 102791 103d57b 102787->102791 102788->102779 102788->102782 103141 1007924 59 API calls 2 library calls 102788->103141 102790->102359 102792 1007bcc 59 API calls 102791->102792 102792->102788 102794 1007e4f 59 API calls 102793->102794 102795 10079fd 102794->102795 102795->102366 102795->102368 102797 106408d 102796->102797 102798 1064092 102797->102798 102799 10640a0 102797->102799 102800 1008047 59 API calls 102798->102800 102801 1007667 59 API calls 102799->102801 102802 106409b Mailbox 102800->102802 102803 10640a8 102801->102803 102802->102384 102804 1007667 59 API calls 102803->102804 102805 10640b0 102804->102805 102806 1007667 59 API calls 102805->102806 102807 10640bb 102806->102807 102808 1007667 59 API calls 102807->102808 102809 10640c3 102808->102809 102810 1007667 59 API calls 102809->102810 102811 10640cb 102810->102811 102812 1007667 59 API calls 102811->102812 102813 10640d3 102812->102813 102814 1007667 59 API calls 102813->102814 102815 10640db 102814->102815 102816 1007667 59 API calls 102815->102816 102817 10640e3 102816->102817 102818 100459b 59 API calls 102817->102818 102819 10640fa 102818->102819 102820 100459b 59 API calls 102819->102820 102821 1064113 102820->102821 102822 10079f2 59 API calls 102821->102822 102823 106411f 102822->102823 102824 1064132 102823->102824 102825 1007d2c 59 API calls 102823->102825 102826 10079f2 59 API calls 102824->102826 102825->102824 102827 106413b 102826->102827 102828 106414b 102827->102828 102830 1007d2c 59 API calls 102827->102830 102829 1008047 59 API calls 102828->102829 102831 1064157 102829->102831 102830->102828 102832 1007b2e 59 API calls 102831->102832 102833 1064163 102832->102833 103142 1064223 59 API calls 102833->103142 102835 1064172 103143 1064223 59 API calls 102835->103143 102837 1064185 102838 10079f2 59 API calls 102837->102838 102839 106418f 102838->102839 102840 10641a6 102839->102840 102841 1064194 102839->102841 102851 1069162 __write_nolock 102850->102851 102852 1020db6 Mailbox 59 API calls 102851->102852 102853 10691bf 102852->102853 102854 100522e 59 API calls 102853->102854 102855 10691c9 102854->102855 102856 1068f5f GetSystemTimeAsFileTime 102855->102856 102857 10691d4 102856->102857 102858 1004ee5 85 API calls 102857->102858 102859 10691e7 _wcscmp 102858->102859 102860 106920b 102859->102860 102861 10692b8 102859->102861 103161 1069734 102860->103161 102863 1069734 96 API calls 102861->102863 102878 1069284 _wcscat 102863->102878 102866 1004f0b 74 API calls 102868 10692dd 102866->102868 102867 10692c1 102867->102390 102869 1004f0b 74 API calls 102868->102869 102871 10692ed 102869->102871 102870 1069239 _wcscat _wcscpy 103168 10240fb 58 API calls __wsplitpath_helper 102870->103168 102872 1004f0b 74 API calls 102871->102872 102874 1069308 102872->102874 102875 1004f0b 74 API calls 102874->102875 102876 1069318 102875->102876 102877 1004f0b 74 API calls 102876->102877 102879 1069333 102877->102879 102878->102866 102878->102867 102880 1004f0b 74 API calls 102879->102880 102881 1069343 102880->102881 102882 1004f0b 74 API calls 102881->102882 102883 1069353 102882->102883 102884 1004f0b 74 API calls 102883->102884 102885 1069363 102884->102885 103144 10698e3 GetTempPathW GetTempFileNameW 102885->103144 102906 1009b52 102905->102906 102907 1009b4d 102905->102907 102906->102317 102907->102906 103229 102358a 59 API calls 102907->103229 102909->102353 102910->102367 102960 1004c03 102911->102960 102914 1004bdc 102916 1004bf5 102914->102916 102917 1004bec FreeLibrary 102914->102917 102915 1004c03 2 API calls 102915->102914 102918 102525b 102916->102918 102917->102916 102964 1025270 102918->102964 102920 1004dfc 102920->102723 102920->102724 103045 1004c36 102921->103045 102924 1004b8f 102925 1004ba1 FreeLibrary 102924->102925 102926 1004baa 102924->102926 102925->102926 102928 1004c70 102926->102928 102927 1004c36 2 API calls 102927->102924 102929 1020db6 Mailbox 59 API calls 102928->102929 102930 1004c85 102929->102930 103049 100522e 102930->103049 102932 1004c91 _memmove 102933 1004ccc 102932->102933 102935 1004dc1 102932->102935 102936 1004d89 102932->102936 102934 1004ec7 69 API calls 102933->102934 102944 1004cd5 102934->102944 103063 106991b 95 API calls 102935->103063 103052 1004e89 CreateStreamOnHGlobal 102936->103052 102939 1004f0b 74 API calls 102939->102944 102941 1004d69 102941->102732 102942 103d8a7 102943 1004ee5 85 API calls 102942->102943 102945 103d8bb 102943->102945 102944->102939 102944->102941 102944->102942 103058 1004ee5 102944->103058 102946 1004f0b 74 API calls 102945->102946 102946->102941 102948 1004f1d 102947->102948 102949 103d9cd 102947->102949 103081 10255e2 102948->103081 102952 1069109 103101 1068f5f 102952->103101 102954 106911f 102954->102739 102956 103d990 102955->102956 102957 1004ed6 102955->102957 103106 1025c60 102957->103106 102959 1004ede 102961 1004bd0 102960->102961 102962 1004c0c LoadLibraryA 102960->102962 102961->102914 102961->102915 102962->102961 102963 1004c1d GetProcAddress 102962->102963 102963->102961 102965 102527c __wfsopen 102964->102965 102966 102528f 102965->102966 102968 10252c0 102965->102968 103013 1028b28 58 API calls __getptd_noexit 102966->103013 102983 10304e8 102968->102983 102969 1025294 103014 1028db6 9 API calls __gmtime64_s 102969->103014 102972 10252c5 102973 10252db 102972->102973 102974 10252ce 102972->102974 102976 1025305 102973->102976 102977 10252e5 102973->102977 103015 1028b28 58 API calls __getptd_noexit 102974->103015 102998 1030607 102976->102998 103016 1028b28 58 API calls __getptd_noexit 102977->103016 102978 102529f __wfsopen @_EH4_CallFilterFunc@8 102978->102920 102984 10304f4 __wfsopen 102983->102984 102985 1029c0b __lock 58 API calls 102984->102985 102995 1030502 102985->102995 102986 1030576 103018 10305fe 102986->103018 102987 103057d 103023 102881d 58 API calls 2 library calls 102987->103023 102990 10305f3 __wfsopen 102990->102972 102991 1030584 102991->102986 103024 1029e2b InitializeCriticalSectionAndSpinCount 102991->103024 102993 1029c93 __mtinitlocknum 58 API calls 102993->102995 102995->102986 102995->102987 102995->102993 103021 1026c50 59 API calls __lock 102995->103021 103022 1026cba LeaveCriticalSection LeaveCriticalSection _doexit 102995->103022 102996 10305aa EnterCriticalSection 102996->102986 103006 1030627 __wopenfile 102998->103006 102999 1030641 103029 1028b28 58 API calls __getptd_noexit 102999->103029 103001 1030646 103030 1028db6 9 API calls __gmtime64_s 103001->103030 103003 1025310 103017 1025332 LeaveCriticalSection LeaveCriticalSection _fprintf 103003->103017 103004 103085f 103026 10385a1 103004->103026 103006->102999 103012 10307fc 103006->103012 103031 10237cb 60 API calls 3 library calls 103006->103031 103008 10307f5 103008->103012 103032 10237cb 60 API calls 3 library calls 103008->103032 103010 1030814 103010->103012 103033 10237cb 60 API calls 3 library calls 103010->103033 103012->102999 103012->103004 103013->102969 103014->102978 103015->102978 103016->102978 103017->102978 103025 1029d75 LeaveCriticalSection 103018->103025 103020 1030605 103020->102990 103021->102995 103022->102995 103023->102991 103024->102996 103025->103020 103034 1037d85 103026->103034 103028 10385ba 103028->103003 103029->103001 103030->103003 103031->103008 103032->103010 103033->103012 103035 1037d91 __wfsopen 103034->103035 103036 1037da7 103035->103036 103039 1037ddd 103035->103039 103037 1028b28 ___libm_error_support 58 API calls 103036->103037 103038 1037dac 103037->103038 103040 1028db6 __gmtime64_s 9 API calls 103038->103040 103041 1037e4e __wsopen_nolock 109 API calls 103039->103041 103044 1037db6 __wfsopen 103040->103044 103042 1037df9 103041->103042 103043 1037e22 __wsopen_helper LeaveCriticalSection 103042->103043 103043->103044 103044->103028 103046 1004b83 103045->103046 103047 1004c3f LoadLibraryA 103045->103047 103046->102924 103046->102927 103047->103046 103048 1004c50 GetProcAddress 103047->103048 103048->103046 103050 1020db6 Mailbox 59 API calls 103049->103050 103051 1005240 103050->103051 103051->102932 103053 1004ea3 FindResourceExW 103052->103053 103057 1004ec0 103052->103057 103054 103d933 LoadResource 103053->103054 103053->103057 103055 103d948 SizeofResource 103054->103055 103054->103057 103056 103d95c LockResource 103055->103056 103055->103057 103056->103057 103057->102933 103059 1004ef4 103058->103059 103060 103d9ab 103058->103060 103064 102584d 103059->103064 103062 1004f02 103062->102944 103063->102933 103068 1025859 __wfsopen 103064->103068 103065 102586b 103077 1028b28 58 API calls __getptd_noexit 103065->103077 103067 1025891 103070 1026c11 __lock_file 59 API calls 103067->103070 103068->103065 103068->103067 103069 1025870 103078 1028db6 9 API calls __gmtime64_s 103069->103078 103072 1025897 103070->103072 103079 10257be 83 API calls 5 library calls 103072->103079 103073 102587b __wfsopen 103073->103062 103075 10258a6 103080 10258c8 LeaveCriticalSection LeaveCriticalSection _fprintf 103075->103080 103077->103069 103078->103073 103079->103075 103080->103073 103084 10255fd 103081->103084 103083 1004f2e 103083->102952 103085 1025609 __wfsopen 103084->103085 103086 102561f _memset 103085->103086 103087 102564c 103085->103087 103089 1025644 __wfsopen 103085->103089 103097 1028b28 58 API calls __getptd_noexit 103086->103097 103088 1026c11 __lock_file 59 API calls 103087->103088 103090 1025652 103088->103090 103089->103083 103099 102541d 72 API calls 7 library calls 103090->103099 103093 1025639 103098 1028db6 9 API calls __gmtime64_s 103093->103098 103094 1025668 103100 1025686 LeaveCriticalSection LeaveCriticalSection _fprintf 103094->103100 103097->103093 103098->103089 103099->103094 103100->103089 103104 102520a GetSystemTimeAsFileTime 103101->103104 103103 1068f6e 103103->102954 103105 1025238 __aulldiv 103104->103105 103105->103103 103107 1025c6c __wfsopen 103106->103107 103108 1025c93 103107->103108 103109 1025c7e 103107->103109 103110 1026c11 __lock_file 59 API calls 103108->103110 103120 1028b28 58 API calls __getptd_noexit 103109->103120 103112 1025c99 103110->103112 103122 10258d0 67 API calls 7 library calls 103112->103122 103113 1025c83 103121 1028db6 9 API calls __gmtime64_s 103113->103121 103116 1025ca4 103123 1025cc4 LeaveCriticalSection LeaveCriticalSection _fprintf 103116->103123 103118 1025cb6 103119 1025c8e __wfsopen 103118->103119 103119->102959 103120->103113 103121->103119 103122->103116 103123->103118 103125 10078b7 103124->103125 103126 100785a 103124->103126 103127 1007d2c 59 API calls 103125->103127 103126->103125 103128 1007865 103126->103128 103134 1007888 _memmove 103127->103134 103129 1007880 103128->103129 103130 103eb09 103128->103130 103132 1007f27 59 API calls 103129->103132 103131 1008029 59 API calls 103130->103131 103133 103eb13 103131->103133 103132->103134 103135 1020db6 Mailbox 59 API calls 103133->103135 103134->102769 103136 103eb33 103135->103136 103138 1007da6 103137->103138 103140 1007d99 103137->103140 103139 1020db6 Mailbox 59 API calls 103138->103139 103139->103140 103140->102760 103141->102788 103142->102835 103143->102837 103166 1069748 __tzset_nolock _wcscmp 103161->103166 103162 1069210 103162->102867 103167 10240fb 58 API calls __wsplitpath_helper 103162->103167 103163 1004f0b 74 API calls 103163->103166 103164 1069109 GetSystemTimeAsFileTime 103164->103166 103165 1004ee5 85 API calls 103165->103166 103166->103162 103166->103163 103166->103164 103166->103165 103167->102870 103168->102878 103229->102906 103231 1007a16 59 API calls 103230->103231 103248 1006265 103231->103248 103232 100646a 103258 100750f 103232->103258 103234 1006484 Mailbox 103234->102396 103237 103dff6 103268 105f8aa 91 API calls 4 library calls 103237->103268 103238 100750f 59 API calls 103238->103248 103242 1007d8c 59 API calls 103242->103248 103243 103e004 103244 100750f 59 API calls 103243->103244 103245 103e01a 103244->103245 103245->103234 103246 1006799 _memmove 103269 105f8aa 91 API calls 4 library calls 103246->103269 103247 103df92 103249 1008029 59 API calls 103247->103249 103248->103232 103248->103237 103248->103238 103248->103242 103248->103246 103248->103247 103252 1007e4f 59 API calls 103248->103252 103256 1005f6c 60 API calls 103248->103256 103257 1005d41 59 API calls Mailbox 103248->103257 103266 1005e72 60 API calls 103248->103266 103267 1007924 59 API calls 2 library calls 103248->103267 103250 103df9d 103249->103250 103254 1020db6 Mailbox 59 API calls 103250->103254 103253 100643b CharUpperBuffW 103252->103253 103253->103248 103254->103246 103255->102400 103256->103248 103257->103248 103259 10075af 103258->103259 103262 1007522 _memmove 103258->103262 103261 1020db6 Mailbox 59 API calls 103259->103261 103260 1020db6 Mailbox 59 API calls 103263 1007529 103260->103263 103261->103262 103262->103260 103264 1020db6 Mailbox 59 API calls 103263->103264 103265 1007552 103263->103265 103264->103265 103265->103234 103266->103248 103267->103248 103268->103243 103269->103234 103270->102436 103271->102408 103272->102422 103273->102418 103274->102424 103275->102434 103276->102437 103277->102441 103278->102179 103279->102177 103280->102076 103281->102076 103282->102070 103283->102075 103284->102080 103285->102075 103286->102099 103287 1027c56 103288 1027c62 __wfsopen 103287->103288 103324 1029e08 GetStartupInfoW 103288->103324 103290 1027c67 103326 1028b7c GetProcessHeap 103290->103326 103292 1027cbf 103293 1027cca 103292->103293 103409 1027da6 58 API calls 3 library calls 103292->103409 103327 1029ae6 103293->103327 103296 1027cd0 103297 1027cdb __RTC_Initialize 103296->103297 103410 1027da6 58 API calls 3 library calls 103296->103410 103348 102d5d2 103297->103348 103300 1027cea 103301 1027cf6 GetCommandLineW 103300->103301 103411 1027da6 58 API calls 3 library calls 103300->103411 103367 1034f23 GetEnvironmentStringsW 103301->103367 103304 1027cf5 103304->103301 103307 1027d10 103308 1027d1b 103307->103308 103412 10230b5 58 API calls 3 library calls 103307->103412 103377 1034d58 103308->103377 103311 1027d21 103312 1027d2c 103311->103312 103413 10230b5 58 API calls 3 library calls 103311->103413 103391 10230ef 103312->103391 103315 1027d34 103316 1027d3f __wwincmdln 103315->103316 103414 10230b5 58 API calls 3 library calls 103315->103414 103397 10047d0 103316->103397 103319 1027d53 103320 1027d62 103319->103320 103415 1023358 58 API calls _doexit 103319->103415 103416 10230e0 58 API calls _doexit 103320->103416 103323 1027d67 __wfsopen 103325 1029e1e 103324->103325 103325->103290 103326->103292 103417 1023187 36 API calls 2 library calls 103327->103417 103329 1029aeb 103418 1029d3c InitializeCriticalSectionAndSpinCount __mtinitlocknum 103329->103418 103331 1029af0 103332 1029af4 103331->103332 103420 1029d8a TlsAlloc 103331->103420 103419 1029b5c 61 API calls 2 library calls 103332->103419 103335 1029af9 103335->103296 103336 1029b06 103336->103332 103337 1029b11 103336->103337 103421 10287d5 103337->103421 103340 1029b53 103429 1029b5c 61 API calls 2 library calls 103340->103429 103343 1029b32 103343->103340 103345 1029b38 103343->103345 103344 1029b58 103344->103296 103428 1029a33 58 API calls 4 library calls 103345->103428 103347 1029b40 GetCurrentThreadId 103347->103296 103349 102d5de __wfsopen 103348->103349 103350 1029c0b __lock 58 API calls 103349->103350 103351 102d5e5 103350->103351 103352 10287d5 __calloc_crt 58 API calls 103351->103352 103353 102d5f6 103352->103353 103354 102d661 GetStartupInfoW 103353->103354 103355 102d601 __wfsopen @_EH4_CallFilterFunc@8 103353->103355 103361 102d7a5 103354->103361 103362 102d676 103354->103362 103355->103300 103356 102d86d 103443 102d87d LeaveCriticalSection _doexit 103356->103443 103358 10287d5 __calloc_crt 58 API calls 103358->103362 103359 102d7f2 GetStdHandle 103359->103361 103360 102d805 GetFileType 103360->103361 103361->103356 103361->103359 103361->103360 103442 1029e2b InitializeCriticalSectionAndSpinCount 103361->103442 103362->103358 103362->103361 103363 102d6c4 103362->103363 103363->103361 103364 102d6f8 GetFileType 103363->103364 103441 1029e2b InitializeCriticalSectionAndSpinCount 103363->103441 103364->103363 103368 1027d06 103367->103368 103369 1034f34 103367->103369 103373 1034b1b GetModuleFileNameW 103368->103373 103444 102881d 58 API calls 2 library calls 103369->103444 103371 1034f5a _memmove 103372 1034f70 FreeEnvironmentStringsW 103371->103372 103372->103368 103374 1034b4f _wparse_cmdline 103373->103374 103376 1034b8f _wparse_cmdline 103374->103376 103445 102881d 58 API calls 2 library calls 103374->103445 103376->103307 103378 1034d71 __wsetenvp 103377->103378 103382 1034d69 103377->103382 103379 10287d5 __calloc_crt 58 API calls 103378->103379 103387 1034d9a __wsetenvp 103379->103387 103380 1034df1 103381 1022d55 _free 58 API calls 103380->103381 103381->103382 103382->103311 103383 10287d5 __calloc_crt 58 API calls 103383->103387 103384 1034e16 103385 1022d55 _free 58 API calls 103384->103385 103385->103382 103387->103380 103387->103382 103387->103383 103387->103384 103388 1034e2d 103387->103388 103446 1034607 58 API calls 2 library calls 103387->103446 103447 1028dc6 IsProcessorFeaturePresent 103388->103447 103390 1034e39 103390->103311 103392 10230fb __IsNonwritableInCurrentImage 103391->103392 103462 102a4d1 103392->103462 103394 1023119 __initterm_e 103395 1022d40 __cinit 67 API calls 103394->103395 103396 1023138 _doexit __IsNonwritableInCurrentImage 103394->103396 103395->103396 103396->103315 103398 10047ea 103397->103398 103408 1004889 103397->103408 103399 1004824 IsThemeActive 103398->103399 103465 102336c 103399->103465 103403 1004850 103477 10048fd SystemParametersInfoW SystemParametersInfoW 103403->103477 103405 100485c 103478 1003b3a 103405->103478 103407 1004864 SystemParametersInfoW 103407->103408 103408->103319 103409->103293 103410->103297 103411->103304 103415->103320 103416->103323 103417->103329 103418->103331 103419->103335 103420->103336 103423 10287dc 103421->103423 103424 1028817 103423->103424 103426 10287fa 103423->103426 103430 10351f6 103423->103430 103424->103340 103427 1029de6 TlsSetValue 103424->103427 103426->103423 103426->103424 103438 102a132 Sleep 103426->103438 103427->103343 103428->103347 103429->103344 103431 1035201 103430->103431 103435 103521c 103430->103435 103432 103520d 103431->103432 103431->103435 103439 1028b28 58 API calls __getptd_noexit 103432->103439 103433 103522c RtlAllocateHeap 103433->103435 103436 1035212 103433->103436 103435->103433 103435->103436 103440 10233a1 DecodePointer 103435->103440 103436->103423 103438->103426 103439->103436 103440->103435 103441->103363 103442->103361 103443->103355 103444->103371 103445->103376 103446->103387 103448 1028dd1 103447->103448 103453 1028c59 103448->103453 103452 1028dec 103452->103390 103454 1028c73 _memset __call_reportfault 103453->103454 103455 1028c93 IsDebuggerPresent 103454->103455 103461 102a155 SetUnhandledExceptionFilter UnhandledExceptionFilter 103455->103461 103457 102c5f6 setSBUpLow 6 API calls 103459 1028d7a 103457->103459 103458 1028d57 __call_reportfault 103458->103457 103460 102a140 GetCurrentProcess TerminateProcess 103459->103460 103460->103452 103461->103458 103463 102a4d4 EncodePointer 103462->103463 103463->103463 103464 102a4ee 103463->103464 103464->103394 103466 1029c0b __lock 58 API calls 103465->103466 103467 1023377 DecodePointer EncodePointer 103466->103467 103530 1029d75 LeaveCriticalSection 103467->103530 103469 1004849 103470 10233d4 103469->103470 103471 10233f8 103470->103471 103472 10233de 103470->103472 103471->103403 103472->103471 103531 1028b28 58 API calls __getptd_noexit 103472->103531 103474 10233e8 103532 1028db6 9 API calls __gmtime64_s 103474->103532 103476 10233f3 103476->103403 103477->103405 103479 1003b47 __write_nolock 103478->103479 103480 1007667 59 API calls 103479->103480 103481 1003b51 GetCurrentDirectoryW 103480->103481 103533 1003766 103481->103533 103483 1003b7a IsDebuggerPresent 103484 103d272 MessageBoxA 103483->103484 103485 1003b88 103483->103485 103487 103d28c 103484->103487 103485->103487 103488 1003ba5 103485->103488 103517 1003c61 103485->103517 103486 1003c68 SetCurrentDirectoryW 103491 1003c75 Mailbox 103486->103491 103655 1007213 59 API calls Mailbox 103487->103655 103614 1007285 103488->103614 103491->103407 103492 103d29c 103497 103d2b2 SetCurrentDirectoryW 103492->103497 103497->103491 103517->103486 103530->103469 103531->103474 103532->103476 103534 1007667 59 API calls 103533->103534 103535 100377c 103534->103535 103664 1003d31 103535->103664 103537 100379a 103538 1004706 61 API calls 103537->103538 103539 10037ae 103538->103539 103540 1007de1 59 API calls 103539->103540 103541 10037bb 103540->103541 103542 1004ddd 136 API calls 103541->103542 103543 10037d4 103542->103543 103544 103d173 103543->103544 103545 10037dc Mailbox 103543->103545 103717 106955b 103544->103717 103548 1008047 59 API calls 103545->103548 103550 10037ef 103548->103550 103549 1022d55 _free 58 API calls 103552 103d19f 103549->103552 103678 100928a 103550->103678 103551 1004e4a 84 API calls 103554 103d192 103551->103554 103555 1004e4a 84 API calls 103552->103555 103554->103549 103557 103d1a8 103555->103557 103561 1003ed0 59 API calls 103557->103561 103558 1007de1 59 API calls 103559 1003808 103558->103559 103560 10084c0 69 API calls 103559->103560 103562 100381a Mailbox 103560->103562 103563 103d1c3 103561->103563 103564 1007de1 59 API calls 103562->103564 103565 1003ed0 59 API calls 103563->103565 103566 1003840 103564->103566 103567 103d1df 103565->103567 103568 10084c0 69 API calls 103566->103568 103569 1004706 61 API calls 103567->103569 103570 100384f Mailbox 103568->103570 103571 103d204 103569->103571 103574 1007667 59 API calls 103570->103574 103572 1003ed0 59 API calls 103571->103572 103573 103d210 103572->103573 103575 1008047 59 API calls 103573->103575 103576 100386d 103574->103576 103577 103d21e 103575->103577 103681 1003ed0 103576->103681 103579 1003ed0 59 API calls 103577->103579 103581 103d22d 103579->103581 103587 1008047 59 API calls 103581->103587 103583 1003887 103583->103557 103584 1003891 103583->103584 103585 1022efd _W_store_winword 60 API calls 103584->103585 103586 100389c 103585->103586 103586->103563 103588 10038a6 103586->103588 103589 103d24f 103587->103589 103590 1022efd _W_store_winword 60 API calls 103588->103590 103591 1003ed0 59 API calls 103589->103591 103592 10038b1 103590->103592 103593 103d25c 103591->103593 103592->103567 103594 10038bb 103592->103594 103593->103593 103595 1022efd _W_store_winword 60 API calls 103594->103595 103596 10038c6 103595->103596 103596->103581 103597 1003907 103596->103597 103599 1003ed0 59 API calls 103596->103599 103597->103581 103598 1003914 103597->103598 103697 10092ce 103598->103697 103600 10038ea 103599->103600 103602 1008047 59 API calls 103600->103602 103604 10038f8 103602->103604 103606 1003ed0 59 API calls 103604->103606 103606->103597 103609 100928a 59 API calls 103611 100394f 103609->103611 103610 1008ee0 60 API calls 103610->103611 103611->103609 103611->103610 103612 1003ed0 59 API calls 103611->103612 103613 1003995 Mailbox 103611->103613 103612->103611 103613->103483 103615 1007292 __write_nolock 103614->103615 103616 103ea22 _memset 103615->103616 103617 10072ab 103615->103617 103620 103ea3e GetOpenFileNameW 103616->103620 103773 1004750 103617->103773 103622 103ea8d 103620->103622 103623 1007bcc 59 API calls 103622->103623 103625 103eaa2 103623->103625 103625->103625 103627 10072c9 103801 100686a 103627->103801 103655->103492 103665 1003d3e __write_nolock 103664->103665 103666 1007bcc 59 API calls 103665->103666 103671 1003ea4 Mailbox 103665->103671 103668 1003d70 103666->103668 103667 10079f2 59 API calls 103667->103668 103668->103667 103676 1003da6 Mailbox 103668->103676 103669 10079f2 59 API calls 103669->103676 103670 1003e77 103670->103671 103672 1007de1 59 API calls 103670->103672 103671->103537 103674 1003e98 103672->103674 103673 1007de1 59 API calls 103673->103676 103675 1003f74 59 API calls 103674->103675 103675->103671 103676->103669 103676->103670 103676->103671 103676->103673 103752 1003f74 103676->103752 103679 1020db6 Mailbox 59 API calls 103678->103679 103680 10037fb 103679->103680 103680->103558 103682 1003ef3 103681->103682 103683 1003eda 103681->103683 103684 1007bcc 59 API calls 103682->103684 103685 1008047 59 API calls 103683->103685 103686 1003879 103684->103686 103685->103686 103687 1022efd 103686->103687 103688 1022f09 103687->103688 103689 1022f7e 103687->103689 103696 1022f2e 103688->103696 103758 1028b28 58 API calls __getptd_noexit 103688->103758 103760 1022f90 60 API calls 4 library calls 103689->103760 103692 1022f8b 103692->103583 103693 1022f15 103759 1028db6 9 API calls __gmtime64_s 103693->103759 103695 1022f20 103695->103583 103696->103583 103698 10092d6 103697->103698 103699 1020db6 Mailbox 59 API calls 103698->103699 103700 10092e4 103699->103700 103701 1003924 103700->103701 103761 10091fc 59 API calls Mailbox 103700->103761 103703 1009050 103701->103703 103762 1009160 103703->103762 103705 100905f 103706 1020db6 Mailbox 59 API calls 103705->103706 103707 1003932 103705->103707 103706->103707 103708 1008ee0 103707->103708 103709 103f17c 103708->103709 103711 1008ef7 103708->103711 103709->103711 103772 1008bdb 59 API calls Mailbox 103709->103772 103712 1008fff 103711->103712 103713 1009040 103711->103713 103714 1008ff8 103711->103714 103712->103611 103771 1009d3c 60 API calls Mailbox 103713->103771 103716 1020db6 Mailbox 59 API calls 103714->103716 103716->103712 103718 1004ee5 85 API calls 103717->103718 103719 10695ca 103718->103719 103720 1069734 96 API calls 103719->103720 103721 10695dc 103720->103721 103722 1004f0b 74 API calls 103721->103722 103750 103d186 103721->103750 103723 10695f7 103722->103723 103724 1004f0b 74 API calls 103723->103724 103725 1069607 103724->103725 103726 1004f0b 74 API calls 103725->103726 103727 1069622 103726->103727 103728 1004f0b 74 API calls 103727->103728 103729 106963d 103728->103729 103730 1004ee5 85 API calls 103729->103730 103731 1069654 103730->103731 103732 102571c __crtCompareStringA_stat 58 API calls 103731->103732 103733 106965b 103732->103733 103734 102571c __crtCompareStringA_stat 58 API calls 103733->103734 103735 1069665 103734->103735 103736 1004f0b 74 API calls 103735->103736 103737 1069679 103736->103737 103738 1069109 GetSystemTimeAsFileTime 103737->103738 103739 106968c 103738->103739 103740 10696b6 103739->103740 103741 10696a1 103739->103741 103742 10696bc 103740->103742 103743 106971b 103740->103743 103744 1022d55 _free 58 API calls 103741->103744 103745 1068b06 116 API calls 103742->103745 103746 1022d55 _free 58 API calls 103743->103746 103747 10696a7 103744->103747 103749 1069713 103745->103749 103746->103750 103748 1022d55 _free 58 API calls 103747->103748 103748->103750 103751 1022d55 _free 58 API calls 103749->103751 103750->103551 103750->103554 103751->103750 103753 1003f82 103752->103753 103757 1003fa4 _memmove 103752->103757 103755 1020db6 Mailbox 59 API calls 103753->103755 103754 1020db6 Mailbox 59 API calls 103756 1003fb8 103754->103756 103755->103757 103756->103676 103757->103754 103758->103693 103759->103695 103760->103692 103761->103701 103763 1009169 Mailbox 103762->103763 103764 103f19f 103763->103764 103769 1009173 103763->103769 103765 1020db6 Mailbox 59 API calls 103764->103765 103767 103f1ab 103765->103767 103766 100917a 103766->103705 103769->103766 103770 1009c90 59 API calls Mailbox 103769->103770 103770->103769 103771->103712 103772->103711 103835 1031940 103773->103835 103776 1004799 103779 1007d8c 59 API calls 103776->103779 103777 100477c 103778 1007bcc 59 API calls 103777->103778 103780 1004788 103778->103780 103779->103780 103837 1007726 103780->103837 103783 1020791 103784 1031940 __write_nolock 103783->103784 103785 102079e GetLongPathNameW 103784->103785 103786 1007bcc 59 API calls 103785->103786 103787 10072bd 103786->103787 103788 100700b 103787->103788 103789 1007667 59 API calls 103788->103789 103790 100701d 103789->103790 103791 1004750 60 API calls 103790->103791 103792 1007028 103791->103792 103793 1007033 103792->103793 103794 103e885 103792->103794 103795 1003f74 59 API calls 103793->103795 103799 103e89f 103794->103799 103847 1007908 61 API calls 103794->103847 103797 100703f 103795->103797 103841 10034c2 103797->103841 103800 1007052 Mailbox 103800->103627 103802 1004ddd 136 API calls 103801->103802 103803 100688f 103802->103803 103804 103e031 103803->103804 103805 1004ddd 136 API calls 103803->103805 103806 106955b 122 API calls 103804->103806 103807 10068a3 103805->103807 103807->103804 103836 100475d GetFullPathNameW 103835->103836 103836->103776 103836->103777 103838 1007734 103837->103838 103839 1007d2c 59 API calls 103838->103839 103840 1004794 103839->103840 103840->103783 103842 10034d4 103841->103842 103846 10034f3 _memmove 103841->103846 103845 1020db6 Mailbox 59 API calls 103842->103845 103843 1020db6 Mailbox 59 API calls 103844 100350a 103843->103844 103844->103800 103845->103846 103846->103843 103847->103794 104001 1001055 104006 1002649 104001->104006 104004 1022d40 __cinit 67 API calls 104005 1001064 104004->104005 104007 1007667 59 API calls 104006->104007 104008 10026b7 104007->104008 104013 1003582 104008->104013 104010 1002754 104012 100105a 104010->104012 104016 1003416 59 API calls 2 library calls 104010->104016 104012->104004 104017 10035b0 104013->104017 104016->104010 104018 10035bd 104017->104018 104019 10035a1 104017->104019 104018->104019 104020 10035c4 RegOpenKeyExW 104018->104020 104019->104010 104020->104019 104021 10035de RegQueryValueExW 104020->104021 104022 1003614 RegCloseKey 104021->104022 104023 10035ff 104021->104023 104022->104019 104023->104022 104024 1001016 104029 1004974 104024->104029 104027 1022d40 __cinit 67 API calls 104028 1001025 104027->104028 104030 1020db6 Mailbox 59 API calls 104029->104030 104031 100497c 104030->104031 104032 100101b 104031->104032 104036 1004936 104031->104036 104032->104027 104037 1004951 104036->104037 104038 100493f 104036->104038 104040 10049a0 104037->104040 104039 1022d40 __cinit 67 API calls 104038->104039 104039->104037 104041 1007667 59 API calls 104040->104041 104042 10049b8 GetVersionExW 104041->104042 104043 1007bcc 59 API calls 104042->104043 104044 10049fb 104043->104044 104045 1007d2c 59 API calls 104044->104045 104050 1004a28 104044->104050 104046 1004a1c 104045->104046 104047 1007726 59 API calls 104046->104047 104047->104050 104048 1004a93 GetCurrentProcess IsWow64Process 104049 1004aac 104048->104049 104052 1004ac2 104049->104052 104053 1004b2b GetSystemInfo 104049->104053 104050->104048 104051 103d864 104050->104051 104064 1004b37 104052->104064 104054 1004af8 104053->104054 104054->104032 104057 1004ad4 104060 1004b37 2 API calls 104057->104060 104058 1004b1f GetSystemInfo 104059 1004ae9 104058->104059 104059->104054 104062 1004aef FreeLibrary 104059->104062 104061 1004adc GetNativeSystemInfo 104060->104061 104061->104059 104062->104054 104065 1004ad0 104064->104065 104066 1004b40 LoadLibraryA 104064->104066 104065->104057 104065->104058 104066->104065 104067 1004b51 GetProcAddress 104066->104067 104067->104065 104068 1001066 104073 100f76f 104068->104073 104070 100106c 104071 1022d40 __cinit 67 API calls 104070->104071 104072 1001076 104071->104072 104074 100f790 104073->104074 104106 101ff03 104074->104106 104078 100f7d7 104079 1007667 59 API calls 104078->104079 104080 100f7e1 104079->104080 104081 1007667 59 API calls 104080->104081 104082 100f7eb 104081->104082 104083 1007667 59 API calls 104082->104083 104084 100f7f5 104083->104084 104085 1007667 59 API calls 104084->104085 104086 100f833 104085->104086 104087 1007667 59 API calls 104086->104087 104088 100f8fe 104087->104088 104116 1015f87 104088->104116 104092 100f930 104093 1007667 59 API calls 104092->104093 104094 100f93a 104093->104094 104144 101fd9e 104094->104144 104096 100f981 104097 100f991 GetStdHandle 104096->104097 104098 100f9dd 104097->104098 104099 10445ab 104097->104099 104100 100f9e5 OleInitialize 104098->104100 104099->104098 104101 10445b4 104099->104101 104100->104070 104151 1066b38 64 API calls Mailbox 104101->104151 104103 10445bb 104152 1067207 CreateThread 104103->104152 104105 10445c7 CloseHandle 104105->104100 104153 101ffdc 104106->104153 104109 101ffdc 59 API calls 104110 101ff45 104109->104110 104111 1007667 59 API calls 104110->104111 104112 101ff51 104111->104112 104113 1007bcc 59 API calls 104112->104113 104114 100f796 104113->104114 104115 1020162 6 API calls 104114->104115 104115->104078 104117 1007667 59 API calls 104116->104117 104118 1015f97 104117->104118 104119 1007667 59 API calls 104118->104119 104120 1015f9f 104119->104120 104160 1015a9d 104120->104160 104123 1015a9d 59 API calls 104124 1015faf 104123->104124 104125 1007667 59 API calls 104124->104125 104126 1015fba 104125->104126 104127 1020db6 Mailbox 59 API calls 104126->104127 104128 100f908 104127->104128 104129 10160f9 104128->104129 104130 1016107 104129->104130 104131 1007667 59 API calls 104130->104131 104132 1016112 104131->104132 104133 1007667 59 API calls 104132->104133 104134 101611d 104133->104134 104135 1007667 59 API calls 104134->104135 104136 1016128 104135->104136 104137 1007667 59 API calls 104136->104137 104138 1016133 104137->104138 104139 1015a9d 59 API calls 104138->104139 104140 101613e 104139->104140 104141 1020db6 Mailbox 59 API calls 104140->104141 104142 1016145 RegisterWindowMessageW 104141->104142 104142->104092 104145 105576f 104144->104145 104146 101fdae 104144->104146 104163 1069ae7 60 API calls 104145->104163 104148 1020db6 Mailbox 59 API calls 104146->104148 104150 101fdb6 104148->104150 104149 105577a 104150->104096 104151->104103 104152->104105 104164 10671ed 65 API calls 104152->104164 104154 1007667 59 API calls 104153->104154 104155 101ffe7 104154->104155 104156 1007667 59 API calls 104155->104156 104157 101ffef 104156->104157 104158 1007667 59 API calls 104157->104158 104159 101ff3b 104158->104159 104159->104109 104161 1007667 59 API calls 104160->104161 104162 1015aa5 104161->104162 104162->104123 104163->104149 104165 15b1823 104166 15b1828 104165->104166 104167 15aeec8 GetPEB 104166->104167 104168 15b1834 104167->104168 104169 15b18e8 104168->104169 104170 15b1852 104168->104170 104187 15b2198 9 API calls 104169->104187 104174 15b14f8 104170->104174 104173 15b18cf 104175 15aeec8 GetPEB 104174->104175 104178 15b1597 104175->104178 104177 15b15c8 CreateFileW 104177->104178 104181 15b15d5 104177->104181 104179 15b15f1 VirtualAlloc 104178->104179 104178->104181 104185 15b16f8 CloseHandle 104178->104185 104186 15b1708 VirtualFree 104178->104186 104188 15b2408 GetPEB 104178->104188 104180 15b1612 ReadFile 104179->104180 104179->104181 104180->104181 104182 15b1630 VirtualAlloc 104180->104182 104183 15b17f2 104181->104183 104184 15b17e4 VirtualFree 104181->104184 104182->104178 104182->104181 104183->104173 104184->104183 104185->104178 104186->104178 104187->104173 104189 15b2432 104188->104189 104189->104177 104190 104416f 104194 1055fe6 104190->104194 104192 104417a 104193 1055fe6 85 API calls 104192->104193 104193->104192 104195 1056020 104194->104195 104200 1055ff3 104194->104200 104195->104192 104196 1056022 104206 1009328 84 API calls Mailbox 104196->104206 104198 1056027 104199 1009837 84 API calls 104198->104199 104201 105602e 104199->104201 104200->104195 104200->104196 104200->104198 104203 105601a 104200->104203 104202 1007b2e 59 API calls 104201->104202 104202->104195 104205 10095a0 59 API calls _wcsstr 104203->104205 104205->104195 104206->104198 104207 100e5ab 104210 100d100 104207->104210 104209 100e5b9 104211 100d11d 104210->104211 104239 100d37d 104210->104239 104212 10426e0 104211->104212 104213 1042691 104211->104213 104237 100d144 104211->104237 104254 107a3e6 331 API calls __cinit 104212->104254 104216 1042694 104213->104216 104223 10426af 104213->104223 104217 10426a0 104216->104217 104216->104237 104252 107a9fa 331 API calls 104217->104252 104219 1022d40 __cinit 67 API calls 104219->104237 104221 10428b5 104221->104221 104222 100d54b 104222->104209 104223->104239 104253 107aea2 331 API calls 3 library calls 104223->104253 104224 100d434 104246 1008a52 68 API calls 104224->104246 104228 100d443 104228->104209 104229 10427fc 104258 107a751 89 API calls 104229->104258 104233 10084c0 69 API calls 104233->104237 104237->104219 104237->104222 104237->104224 104237->104229 104237->104233 104237->104239 104241 1009ea0 331 API calls 104237->104241 104242 1008047 59 API calls 104237->104242 104244 1008740 68 API calls __cinit 104237->104244 104245 1008542 68 API calls 104237->104245 104247 100843a 68 API calls 104237->104247 104248 100cf7c 331 API calls 104237->104248 104249 1009dda 59 API calls Mailbox 104237->104249 104250 100cf00 89 API calls 104237->104250 104251 100cd7d 331 API calls 104237->104251 104255 1008a52 68 API calls 104237->104255 104256 1009d3c 60 API calls Mailbox 104237->104256 104257 105678d 60 API calls 104237->104257 104239->104222 104259 1069e4a 89 API calls 4 library calls 104239->104259 104241->104237 104242->104237 104244->104237 104245->104237 104246->104228 104247->104237 104248->104237 104249->104237 104250->104237 104251->104237 104252->104222 104253->104239 104254->104237 104255->104237 104256->104237 104257->104237 104258->104239 104259->104221 104260 100107d 104265 100708b 104260->104265 104262 100108c 104263 1022d40 __cinit 67 API calls 104262->104263 104264 1001096 104263->104264 104266 100709b __write_nolock 104265->104266 104267 1007667 59 API calls 104266->104267 104268 1007151 104267->104268 104269 1004706 61 API calls 104268->104269 104270 100715a 104269->104270 104296 102050b 104270->104296 104273 1007cab 59 API calls 104274 1007173 104273->104274 104275 1003f74 59 API calls 104274->104275 104276 1007182 104275->104276 104277 1007667 59 API calls 104276->104277 104278 100718b 104277->104278 104279 1007d8c 59 API calls 104278->104279 104280 1007194 RegOpenKeyExW 104279->104280 104281 103e8b1 RegQueryValueExW 104280->104281 104285 10071b6 Mailbox 104280->104285 104282 103e943 RegCloseKey 104281->104282 104283 103e8ce 104281->104283 104282->104285 104294 103e955 _wcscat Mailbox __wsetenvp 104282->104294 104284 1020db6 Mailbox 59 API calls 104283->104284 104286 103e8e7 104284->104286 104285->104262 104287 100522e 59 API calls 104286->104287 104288 103e8f2 RegQueryValueExW 104287->104288 104289 103e90f 104288->104289 104291 103e929 104288->104291 104290 1007bcc 59 API calls 104289->104290 104290->104291 104291->104282 104292 1007de1 59 API calls 104292->104294 104293 1003f74 59 API calls 104293->104294 104294->104285 104294->104292 104294->104293 104295 10079f2 59 API calls 104294->104295 104295->104294 104297 1031940 __write_nolock 104296->104297 104298 1020518 GetFullPathNameW 104297->104298 104299 102053a 104298->104299 104300 1007bcc 59 API calls 104299->104300 104301 1007165 104300->104301 104301->104273 104302 103fdfc 104306 100ab30 Mailbox _memmove 104302->104306 104304 105617e Mailbox 59 API calls 104315 100a057 104304->104315 104307 100b525 104306->104307 104306->104315 104321 1009f37 Mailbox 104306->104321 104328 1007de1 59 API calls 104306->104328 104333 107bc6b 331 API calls 104306->104333 104335 100b2b6 104306->104335 104336 1009ea0 331 API calls 104306->104336 104338 104086a 104306->104338 104340 1040878 104306->104340 104342 104085c 104306->104342 104343 100b21c 104306->104343 104345 1020db6 59 API calls Mailbox 104306->104345 104347 1056e8f 59 API calls 104306->104347 104352 108241e 104306->104352 104365 107df23 104306->104365 104368 107df37 104306->104368 104371 107c2e0 104306->104371 104403 1067956 104306->104403 104409 105617e 104306->104409 104414 1009c90 59 API calls Mailbox 104306->104414 104418 107c193 85 API calls 2 library calls 104306->104418 104420 1069e4a 89 API calls 4 library calls 104307->104420 104310 10409e5 104425 1069e4a 89 API calls 4 library calls 104310->104425 104311 1040055 104419 1069e4a 89 API calls 4 library calls 104311->104419 104313 100b475 104323 1008047 59 API calls 104313->104323 104316 100b47a 104316->104310 104316->104311 104318 1040064 104319 1020db6 59 API calls Mailbox 104319->104321 104321->104311 104321->104313 104321->104315 104321->104316 104321->104319 104325 1008047 59 API calls 104321->104325 104326 1007667 59 API calls 104321->104326 104327 1022d40 67 API calls __cinit 104321->104327 104329 1056e8f 59 API calls 104321->104329 104330 10409d6 104321->104330 104332 100a55a 104321->104332 104412 100c8c0 331 API calls 2 library calls 104321->104412 104413 100b900 60 API calls Mailbox 104321->104413 104323->104315 104325->104321 104326->104321 104327->104321 104328->104306 104329->104321 104424 1069e4a 89 API calls 4 library calls 104330->104424 104423 1069e4a 89 API calls 4 library calls 104332->104423 104333->104306 104417 100f6a3 331 API calls 104335->104417 104336->104306 104421 1009c90 59 API calls Mailbox 104338->104421 104422 1069e4a 89 API calls 4 library calls 104340->104422 104342->104304 104342->104315 104415 1009d3c 60 API calls Mailbox 104343->104415 104345->104306 104346 100b22d 104416 1009d3c 60 API calls Mailbox 104346->104416 104347->104306 104353 1009837 84 API calls 104352->104353 104354 1082436 104353->104354 104355 1007667 59 API calls 104354->104355 104356 1082444 104355->104356 104357 1009b3c 59 API calls 104356->104357 104358 108244f 104357->104358 104359 1082479 104358->104359 104361 1009837 84 API calls 104358->104361 104426 1009a3c 59 API calls Mailbox 104359->104426 104363 108246a 104361->104363 104362 1082485 Mailbox 104362->104306 104364 100784b 59 API calls 104363->104364 104364->104359 104427 107cadd 104365->104427 104367 107df33 104367->104306 104369 107cadd 130 API calls 104368->104369 104370 107df47 104369->104370 104370->104306 104372 1007667 59 API calls 104371->104372 104373 107c2f4 104372->104373 104374 1007667 59 API calls 104373->104374 104375 107c2fc 104374->104375 104376 1007667 59 API calls 104375->104376 104377 107c304 104376->104377 104378 1009837 84 API calls 104377->104378 104402 107c312 104378->104402 104379 1007924 59 API calls 104379->104402 104380 1007bcc 59 API calls 104380->104402 104381 107c4fb 104382 107c528 Mailbox 104381->104382 104519 1009a3c 59 API calls Mailbox 104381->104519 104382->104306 104384 107c4e2 104385 1007cab 59 API calls 104384->104385 104387 107c4ef 104385->104387 104386 107c4fd 104388 1007cab 59 API calls 104386->104388 104391 1007b2e 59 API calls 104387->104391 104392 107c50c 104388->104392 104389 1008047 59 API calls 104389->104402 104390 1007e4f 59 API calls 104393 107c3a9 CharUpperBuffW 104390->104393 104391->104381 104394 1007b2e 59 API calls 104392->104394 104517 100843a 68 API calls 104393->104517 104394->104381 104395 1007e4f 59 API calls 104396 107c469 CharUpperBuffW 104395->104396 104518 100c5a7 69 API calls 2 library calls 104396->104518 104399 1009837 84 API calls 104399->104402 104400 1007cab 59 API calls 104400->104402 104401 1007b2e 59 API calls 104401->104402 104402->104379 104402->104380 104402->104381 104402->104382 104402->104384 104402->104386 104402->104389 104402->104390 104402->104395 104402->104399 104402->104400 104402->104401 104404 1067962 104403->104404 104405 1020db6 Mailbox 59 API calls 104404->104405 104406 1067970 104405->104406 104407 106797e 104406->104407 104408 1007667 59 API calls 104406->104408 104407->104306 104408->104407 104520 10560c0 104409->104520 104411 105618c 104411->104306 104412->104321 104413->104321 104414->104306 104415->104346 104416->104335 104417->104307 104418->104306 104419->104318 104420->104342 104421->104342 104422->104342 104423->104315 104424->104310 104425->104315 104426->104362 104428 1009837 84 API calls 104427->104428 104429 107cb1a 104428->104429 104434 107cb61 Mailbox 104429->104434 104465 107d7a5 104429->104465 104431 107cbb2 Mailbox 104431->104434 104438 1009837 84 API calls 104431->104438 104452 107cdb9 104431->104452 104497 107fbce 59 API calls 2 library calls 104431->104497 104498 107cfdf 61 API calls 2 library calls 104431->104498 104432 107cf2e 104504 107d8c8 92 API calls Mailbox 104432->104504 104434->104367 104436 107cf3d 104437 107cdc7 104436->104437 104439 107cf49 104436->104439 104478 107c96e 104437->104478 104438->104431 104439->104434 104444 107ce00 104493 1020c08 104444->104493 104447 107ce33 104450 10092ce 59 API calls 104447->104450 104448 107ce1a 104499 1069e4a 89 API calls 4 library calls 104448->104499 104453 107ce3f 104450->104453 104451 107ce25 GetCurrentProcess TerminateProcess 104451->104447 104452->104432 104452->104437 104454 1009050 59 API calls 104453->104454 104455 107ce55 104454->104455 104464 107ce7c 104455->104464 104500 1008d40 59 API calls Mailbox 104455->104500 104457 107cfa4 104457->104434 104460 107cfb8 FreeLibrary 104457->104460 104458 107ce6b 104501 107d649 107 API calls _free 104458->104501 104460->104434 104464->104457 104502 1008d40 59 API calls Mailbox 104464->104502 104503 1009d3c 60 API calls Mailbox 104464->104503 104505 107d649 107 API calls _free 104464->104505 104466 1007e4f 59 API calls 104465->104466 104467 107d7c0 CharLowerBuffW 104466->104467 104506 105f167 104467->104506 104471 1007667 59 API calls 104472 107d7f9 104471->104472 104473 100784b 59 API calls 104472->104473 104474 107d810 104473->104474 104475 1007d2c 59 API calls 104474->104475 104476 107d81c Mailbox 104475->104476 104477 107d858 Mailbox 104476->104477 104513 107cfdf 61 API calls 2 library calls 104476->104513 104477->104431 104479 107c989 104478->104479 104483 107c9de 104478->104483 104480 1020db6 Mailbox 59 API calls 104479->104480 104482 107c9ab 104480->104482 104481 1020db6 Mailbox 59 API calls 104481->104482 104482->104481 104482->104483 104484 107da50 104483->104484 104485 107dc79 Mailbox 104484->104485 104492 107da73 _strcat _wcscpy __wsetenvp 104484->104492 104485->104444 104486 1009b98 59 API calls 104486->104492 104487 1009b3c 59 API calls 104487->104492 104488 1009be6 59 API calls 104488->104492 104489 1009837 84 API calls 104489->104492 104490 102571c 58 API calls __crtCompareStringA_stat 104490->104492 104492->104485 104492->104486 104492->104487 104492->104488 104492->104489 104492->104490 104516 1065887 61 API calls 2 library calls 104492->104516 104495 1020c1d 104493->104495 104494 1020cb5 VirtualProtect 104496 1020c83 104494->104496 104495->104494 104495->104496 104496->104447 104496->104448 104497->104431 104498->104431 104499->104451 104500->104458 104501->104464 104502->104464 104503->104464 104504->104436 104505->104464 104507 105f192 __wsetenvp 104506->104507 104508 105f1d1 104507->104508 104511 105f1c7 104507->104511 104512 105f278 104507->104512 104508->104471 104508->104476 104511->104508 104514 10078c4 61 API calls 104511->104514 104512->104508 104515 10078c4 61 API calls 104512->104515 104513->104477 104514->104511 104515->104512 104516->104492 104517->104402 104518->104402 104519->104382 104521 10560e8 104520->104521 104522 10560cb 104520->104522 104521->104411 104522->104521 104524 10560ab 59 API calls Mailbox 104522->104524 104524->104522

              Control-flow Graph

              APIs
              • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 01003B68
              • IsDebuggerPresent.KERNEL32 ref: 01003B7A
              • GetFullPathNameW.KERNEL32(00007FFF,?,?,010C52F8,010C52E0,?,?), ref: 01003BEB
                • Part of subcall function 01007BCC: _memmove.LIBCMT ref: 01007C06
                • Part of subcall function 0101092D: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,01003C14,010C52F8,?,?,?), ref: 0101096E
              • SetCurrentDirectoryW.KERNEL32(?), ref: 01003C6F
              • MessageBoxA.USER32(00000000,This is a third-party compiled AutoIt script.,010B7770,00000010), ref: 0103D281
              • SetCurrentDirectoryW.KERNEL32(?,010C52F8,?,?,?), ref: 0103D2B9
              • GetForegroundWindow.USER32(runas,?,?,?,00000001,?,010B4260,010C52F8,?,?,?), ref: 0103D33F
              • ShellExecuteW.SHELL32(00000000,?,?), ref: 0103D346
                • Part of subcall function 01003A46: GetSysColorBrush.USER32(0000000F), ref: 01003A50
                • Part of subcall function 01003A46: LoadCursorW.USER32(00000000,00007F00), ref: 01003A5F
                • Part of subcall function 01003A46: LoadIconW.USER32(00000063), ref: 01003A76
                • Part of subcall function 01003A46: LoadIconW.USER32(000000A4), ref: 01003A88
                • Part of subcall function 01003A46: LoadIconW.USER32(000000A2), ref: 01003A9A
                • Part of subcall function 01003A46: LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 01003AC0
                • Part of subcall function 01003A46: RegisterClassExW.USER32(?), ref: 01003B16
                • Part of subcall function 010039D5: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 01003A03
                • Part of subcall function 010039D5: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 01003A24
                • Part of subcall function 010039D5: ShowWindow.USER32(00000000,?,?), ref: 01003A38
                • Part of subcall function 010039D5: ShowWindow.USER32(00000000,?,?), ref: 01003A41
                • Part of subcall function 0100434A: _memset.LIBCMT ref: 01004370
                • Part of subcall function 0100434A: Shell_NotifyIconW.SHELL32(00000000,?), ref: 01004415
              Strings
              • runas, xrefs: 0103D33A
              • This is a third-party compiled AutoIt script., xrefs: 0103D279
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: LoadWindow$Icon$CurrentDirectory$CreateFullNamePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__memmove_memset
              • String ID: This is a third-party compiled AutoIt script.$runas
              • API String ID: 529118366-3287110873
              • Opcode ID: 900ec422a59c827b77936bb8ac92b1eed2c9dc2e8cf4d7c0086ca44d12a308de
              • Instruction ID: d2746b3336e7a71297e48a14d1481a2340abbda8e2e27582ea4a4484efeff5f7
              • Opcode Fuzzy Hash: 900ec422a59c827b77936bb8ac92b1eed2c9dc2e8cf4d7c0086ca44d12a308de
              • Instruction Fuzzy Hash: 5651F534A0410EAEEF23EBF5DC05DED7BBABB66610F004099F5D1AA1C1CA7A6545CF21

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 996 10049a0-1004a00 call 1007667 GetVersionExW call 1007bcc 1001 1004a06 996->1001 1002 1004b0b-1004b0d 996->1002 1003 1004a09-1004a0e 1001->1003 1004 103d767-103d773 1002->1004 1006 1004b12-1004b13 1003->1006 1007 1004a14 1003->1007 1005 103d774-103d778 1004->1005 1008 103d77b-103d787 1005->1008 1009 103d77a 1005->1009 1010 1004a15-1004a4c call 1007d2c call 1007726 1006->1010 1007->1010 1008->1005 1011 103d789-103d78e 1008->1011 1009->1008 1019 1004a52-1004a53 1010->1019 1020 103d864-103d867 1010->1020 1011->1003 1013 103d794-103d79b 1011->1013 1013->1004 1015 103d79d 1013->1015 1018 103d7a2-103d7a5 1015->1018 1021 1004a93-1004aaa GetCurrentProcess IsWow64Process 1018->1021 1022 103d7ab-103d7c9 1018->1022 1019->1018 1023 1004a59-1004a64 1019->1023 1024 103d880-103d884 1020->1024 1025 103d869 1020->1025 1028 1004aac 1021->1028 1029 1004aaf-1004ac0 1021->1029 1022->1021 1030 103d7cf-103d7d5 1022->1030 1031 103d7ea-103d7f0 1023->1031 1032 1004a6a-1004a6c 1023->1032 1026 103d886-103d88f 1024->1026 1027 103d86f-103d878 1024->1027 1033 103d86c 1025->1033 1026->1033 1036 103d891-103d894 1026->1036 1027->1024 1028->1029 1037 1004ac2-1004ad2 call 1004b37 1029->1037 1038 1004b2b-1004b35 GetSystemInfo 1029->1038 1039 103d7d7-103d7da 1030->1039 1040 103d7df-103d7e5 1030->1040 1034 103d7f2-103d7f5 1031->1034 1035 103d7fa-103d800 1031->1035 1041 1004a72-1004a75 1032->1041 1042 103d805-103d811 1032->1042 1033->1027 1034->1021 1035->1021 1036->1027 1053 1004ad4-1004ae1 call 1004b37 1037->1053 1054 1004b1f-1004b29 GetSystemInfo 1037->1054 1043 1004af8-1004b08 1038->1043 1039->1021 1040->1021 1047 103d831-103d834 1041->1047 1048 1004a7b-1004a8a 1041->1048 1044 103d813-103d816 1042->1044 1045 103d81b-103d821 1042->1045 1044->1021 1045->1021 1047->1021 1050 103d83a-103d84f 1047->1050 1051 1004a90 1048->1051 1052 103d826-103d82c 1048->1052 1055 103d851-103d854 1050->1055 1056 103d859-103d85f 1050->1056 1051->1021 1052->1021 1061 1004ae3-1004ae7 GetNativeSystemInfo 1053->1061 1062 1004b18-1004b1d 1053->1062 1057 1004ae9-1004aed 1054->1057 1055->1021 1056->1021 1057->1043 1060 1004aef-1004af2 FreeLibrary 1057->1060 1060->1043 1061->1057 1062->1061
              APIs
              • GetVersionExW.KERNEL32(?), ref: 010049CD
                • Part of subcall function 01007BCC: _memmove.LIBCMT ref: 01007C06
              • GetCurrentProcess.KERNEL32(?,0108FAEC,00000000,00000000,?), ref: 01004A9A
              • IsWow64Process.KERNEL32(00000000), ref: 01004AA1
              • GetNativeSystemInfo.KERNELBASE(00000000), ref: 01004AE7
              • FreeLibrary.KERNEL32(00000000), ref: 01004AF2
              • GetSystemInfo.KERNEL32(00000000), ref: 01004B23
              • GetSystemInfo.KERNEL32(00000000), ref: 01004B2F
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: InfoSystem$Process$CurrentFreeLibraryNativeVersionWow64_memmove
              • String ID:
              • API String ID: 1986165174-0
              • Opcode ID: 956cf17e5a242dec1f2e809f2e32ac285939912db3198a7d163af356ab36c1bd
              • Instruction ID: e7915ee067b0df9066f2daa2fdd5c685a68cdab59f7d514332ce2c198c718b16
              • Opcode Fuzzy Hash: 956cf17e5a242dec1f2e809f2e32ac285939912db3198a7d163af356ab36c1bd
              • Instruction Fuzzy Hash: 2B91D331949BC1DEDB73DBB884501AEFFF5AF2A200F44499DD1CA93A82D224B548C76D

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1063 1004e89-1004ea1 CreateStreamOnHGlobal 1064 1004ec1-1004ec6 1063->1064 1065 1004ea3-1004eba FindResourceExW 1063->1065 1066 103d933-103d942 LoadResource 1065->1066 1067 1004ec0 1065->1067 1066->1067 1068 103d948-103d956 SizeofResource 1066->1068 1067->1064 1068->1067 1069 103d95c-103d967 LockResource 1068->1069 1069->1067 1070 103d96d-103d98b 1069->1070 1070->1067
              APIs
              • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?,?,?,?,?,01004D8E,?,?,00000000,00000000), ref: 01004E99
              • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,01004D8E,?,?,00000000,00000000), ref: 01004EB0
              • LoadResource.KERNEL32(?,00000000,?,?,01004D8E,?,?,00000000,00000000,?,?,?,?,?,?,01004E2F), ref: 0103D937
              • SizeofResource.KERNEL32(?,00000000,?,?,01004D8E,?,?,00000000,00000000,?,?,?,?,?,?,01004E2F), ref: 0103D94C
              • LockResource.KERNEL32(01004D8E,?,?,01004D8E,?,?,00000000,00000000,?,?,?,?,?,?,01004E2F,00000000), ref: 0103D95F
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
              • String ID: SCRIPT
              • API String ID: 3051347437-3967369404
              • Opcode ID: 2ccf60f6d10466f49279b113aeb51409bc082d44a267f0b6d58e95578f71b371
              • Instruction ID: 882ed2793ca280a3eaa62a7644c2ebc3b60a9e0ed79cc475572c3bb48a52251d
              • Opcode Fuzzy Hash: 2ccf60f6d10466f49279b113aeb51409bc082d44a267f0b6d58e95578f71b371
              • Instruction Fuzzy Hash: C7115E75244701BFE7218B65EC88F6B7BBAEBC5B51F10426CF685C6290DB62EC018664
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: BuffCharUpper
              • String ID:
              • API String ID: 3964851224-0
              • Opcode ID: cebac8415d937cfa145b6a7dbf4d07b5937cfc270d0977e17d52404fc4643c0f
              • Instruction ID: f3897931a6fa467e4c4688ce858d3555bde631aa0e42577e0b23066374db915d
              • Opcode Fuzzy Hash: cebac8415d937cfa145b6a7dbf4d07b5937cfc270d0977e17d52404fc4643c0f
              • Instruction Fuzzy Hash: 5E927BB06083428FD761DF18C480B6ABBE5BF89304F14896DF9CA8B355D775E885CB92
              APIs
              • GetFileAttributesW.KERNELBASE(?,0103E398), ref: 0106446A
              • FindFirstFileW.KERNELBASE(?,?), ref: 0106447B
              • FindClose.KERNEL32(00000000), ref: 0106448B
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: FileFind$AttributesCloseFirst
              • String ID:
              • API String ID: 48322524-0
              • Opcode ID: c17bef41c3379ea9673c7096395dcb8b85a9ad71675296965efff147028eb482
              • Instruction ID: a39d80906400da37a881627a663af0163351226b2f0be68f58f3feb54235ea73
              • Opcode Fuzzy Hash: c17bef41c3379ea9673c7096395dcb8b85a9ad71675296965efff147028eb482
              • Instruction Fuzzy Hash: 7CE026338189026B8220AA3CEC0E8EE779C9F45236F104746F8F5C20C0EFB89900C7D6
              Strings
              • Variable must be of type 'Object'., xrefs: 01043E62
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID:
              • String ID: Variable must be of type 'Object'.
              • API String ID: 0-109567571
              • Opcode ID: af7f7da7a01b1037b0cba60811ece7675c39e59de12c013c1ada64880a0b1295
              • Instruction ID: 57ae2dcf2105e1942edc6deac297940cea4bb2a5be56e6da41b9d8e194d9ee95
              • Opcode Fuzzy Hash: af7f7da7a01b1037b0cba60811ece7675c39e59de12c013c1ada64880a0b1295
              • Instruction Fuzzy Hash: 59A2A474A00216CFEB66CF58C480AAEBBF1FF59314F1484A9D985AB381D735ED42CB91
              APIs
              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 01010A5B
              • timeGetTime.WINMM ref: 01010D16
              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 01010E53
              • Sleep.KERNEL32(0000000A), ref: 01010E61
              • LockWindowUpdate.USER32(00000000,?,?), ref: 01010EFA
              • DestroyWindow.USER32 ref: 01010F06
              • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 01010F20
              • Sleep.KERNEL32(0000000A,?,?), ref: 01044E83
              • TranslateMessage.USER32(?), ref: 01045C60
              • DispatchMessageW.USER32(?), ref: 01045C6E
              • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 01045C82
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: Message$PeekSleepWindow$DestroyDispatchLockTimeTranslateUpdatetime
              • String ID: @COM_EVENTOBJ$@GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE$@TRAY_ID
              • API String ID: 4212290369-3242690629
              • Opcode ID: 3d856b53e0d2c5795157d84f657e5a3c5b7608d60d4ada2e3412f4c0ab326a5c
              • Instruction ID: 3df279bf9cdf35bb21749356ec01b2c6fa72908871945ced0090a1e8578be918
              • Opcode Fuzzy Hash: 3d856b53e0d2c5795157d84f657e5a3c5b7608d60d4ada2e3412f4c0ab326a5c
              • Instruction Fuzzy Hash: B2B28EB06083429FE765DF24C884BAEBBE5BB85304F04496DF5C997295CB75E884CB82

              Control-flow Graph

              APIs
                • Part of subcall function 01068F5F: __time64.LIBCMT ref: 01068F69
                • Part of subcall function 01004EE5: _fseek.LIBCMT ref: 01004EFD
              • __wsplitpath.LIBCMT ref: 01069234
                • Part of subcall function 010240FB: __wsplitpath_helper.LIBCMT ref: 0102413B
              • _wcscpy.LIBCMT ref: 01069247
              • _wcscat.LIBCMT ref: 0106925A
              • __wsplitpath.LIBCMT ref: 0106927F
              • _wcscat.LIBCMT ref: 01069295
              • _wcscat.LIBCMT ref: 010692A8
                • Part of subcall function 01068FA5: _memmove.LIBCMT ref: 01068FDE
                • Part of subcall function 01068FA5: _memmove.LIBCMT ref: 01068FED
              • _wcscmp.LIBCMT ref: 010691EF
                • Part of subcall function 01069734: _wcscmp.LIBCMT ref: 01069824
                • Part of subcall function 01069734: _wcscmp.LIBCMT ref: 01069837
              • DeleteFileW.KERNEL32(?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 01069452
              • _wcsncpy.LIBCMT ref: 010694C5
              • DeleteFileW.KERNEL32(?,?), ref: 010694FB
              • CopyFileW.KERNELBASE(?,?,00000000,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 01069511
              • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 01069522
              • DeleteFileW.KERNELBASE(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 01069534
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: File$Delete$_wcscat_wcscmp$__wsplitpath_memmove$Copy__time64__wsplitpath_helper_fseek_wcscpy_wcsncpy
              • String ID:
              • API String ID: 1500180987-0
              • Opcode ID: c96df52dd2e4ca1fe7e5f67e8b402e3408bb3e44229597ef7c1ff6bdedcb6a9d
              • Instruction ID: 49f259b26d91fe0449e2e5a949ecade7bf4ab24fe058f60e3a5392255f3257e9
              • Opcode Fuzzy Hash: c96df52dd2e4ca1fe7e5f67e8b402e3408bb3e44229597ef7c1ff6bdedcb6a9d
              • Instruction Fuzzy Hash: 05C12DB1D0022AAFDF21DFA5CC84EDEB7BDEF55214F0040AAE649E7150DB309A848F65

              Control-flow Graph

              APIs
              • GetSysColorBrush.USER32(0000000F), ref: 01003074
              • RegisterClassExW.USER32(00000030), ref: 0100309E
              • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 010030AF
              • InitCommonControlsEx.COMCTL32(?), ref: 010030CC
              • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 010030DC
              • LoadIconW.USER32(000000A9), ref: 010030F2
              • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 01003101
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
              • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
              • API String ID: 2914291525-1005189915
              • Opcode ID: 9e00c499a9c1140eee9dc4bf4bdfd2f31f4e6fdd209387bc319e4dce9430ed46
              • Instruction ID: 6e6d401fef22b9000a4d4028d4dfde9ccf319a232bc66a91f02677cd5c0ff908
              • Opcode Fuzzy Hash: 9e00c499a9c1140eee9dc4bf4bdfd2f31f4e6fdd209387bc319e4dce9430ed46
              • Instruction Fuzzy Hash: 253127B594530AEFDB60DFA4D885A9DBBF0FB09320F10411AE5C0EA294D7BA5585CF50

              Control-flow Graph

              APIs
              • GetSysColorBrush.USER32(0000000F), ref: 01003074
              • RegisterClassExW.USER32(00000030), ref: 0100309E
              • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 010030AF
              • InitCommonControlsEx.COMCTL32(?), ref: 010030CC
              • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 010030DC
              • LoadIconW.USER32(000000A9), ref: 010030F2
              • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 01003101
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
              • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
              • API String ID: 2914291525-1005189915
              • Opcode ID: 1f3fc1a6544820b1bc3b2209e3106e7ba9a0dbb6baec4278eeebec5b9aea1bc3
              • Instruction ID: 50cf0bee14b4b0a571d09ffd47c1c180e3ef21430a57d1c918b241a4eb4f72f2
              • Opcode Fuzzy Hash: 1f3fc1a6544820b1bc3b2209e3106e7ba9a0dbb6baec4278eeebec5b9aea1bc3
              • Instruction Fuzzy Hash: EE2127B5A04209AFEB20DFA4E848B8EBBF4FB08700F10411AF591E6284D7BA55488F91

              Control-flow Graph

              APIs
                • Part of subcall function 01004706: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,010C52F8,?,010037AE,?), ref: 01004724
                • Part of subcall function 0102050B: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,01007165), ref: 0102052D
              • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 010071A8
              • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 0103E8C8
              • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 0103E909
              • RegCloseKey.ADVAPI32(?), ref: 0103E947
              • _wcscat.LIBCMT ref: 0103E9A0
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: NameQueryValue$CloseFileFullModuleOpenPath_wcscat
              • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
              • API String ID: 2673923337-2727554177
              • Opcode ID: b349d9312926b613a30f4b91daabb3b7e29a37402c0da58449032c568804176b
              • Instruction ID: a4f395830795ede337fe5f884ea0716ad84b18b6c1c38f6e31011cd2590a376d
              • Opcode Fuzzy Hash: b349d9312926b613a30f4b91daabb3b7e29a37402c0da58449032c568804176b
              • Instruction Fuzzy Hash: 6F719E711083029ED721EF69E8409AFBBE9FF98310F40052EF5C5872A4EB36A549CF52

              Control-flow Graph

              APIs
              • GetSysColorBrush.USER32(0000000F), ref: 01003A50
              • LoadCursorW.USER32(00000000,00007F00), ref: 01003A5F
              • LoadIconW.USER32(00000063), ref: 01003A76
              • LoadIconW.USER32(000000A4), ref: 01003A88
              • LoadIconW.USER32(000000A2), ref: 01003A9A
              • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 01003AC0
              • RegisterClassExW.USER32(?), ref: 01003B16
                • Part of subcall function 01003041: GetSysColorBrush.USER32(0000000F), ref: 01003074
                • Part of subcall function 01003041: RegisterClassExW.USER32(00000030), ref: 0100309E
                • Part of subcall function 01003041: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 010030AF
                • Part of subcall function 01003041: InitCommonControlsEx.COMCTL32(?), ref: 010030CC
                • Part of subcall function 01003041: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 010030DC
                • Part of subcall function 01003041: LoadIconW.USER32(000000A9), ref: 010030F2
                • Part of subcall function 01003041: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 01003101
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
              • String ID: #$0$AutoIt v3
              • API String ID: 423443420-4155596026
              • Opcode ID: e2d2fab62c9d3986fbe7dfb383f858d6bdcc4c358fe4579922e4fad60380a902
              • Instruction ID: 6a37af970a97feca516606e6370a0f3c5e315628f1790dcd27ad7a03f60880f9
              • Opcode Fuzzy Hash: e2d2fab62c9d3986fbe7dfb383f858d6bdcc4c358fe4579922e4fad60380a902
              • Instruction Fuzzy Hash: A7215C74E04305AFFB21DFA4EC09B9D7BF6FB09711F00011AF584AA295D3BA65508F84

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 767 1003633-1003681 769 10036e1-10036e3 767->769 770 1003683-1003686 767->770 769->770 773 10036e5 769->773 771 10036e7 770->771 772 1003688-100368f 770->772 775 10036ed-10036f0 771->775 776 103d0cc-103d0fa call 1011070 call 1011093 771->776 777 1003695-100369a 772->777 778 100374b-1003753 PostQuitMessage 772->778 774 10036ca-10036d2 DefWindowProcW 773->774 785 10036d8-10036de 774->785 779 10036f2-10036f3 775->779 780 1003715-100373c SetTimer RegisterWindowMessageW 775->780 814 103d0ff-103d106 776->814 782 10036a0-10036a2 777->782 783 103d154-103d168 call 1062527 777->783 784 1003711-1003713 778->784 786 10036f9-100370c KillTimer call 100443a call 1003114 779->786 787 103d06f-103d072 779->787 780->784 789 100373e-1003749 CreatePopupMenu 780->789 790 1003755-1003764 call 10044a0 782->790 791 10036a8-10036ad 782->791 783->784 808 103d16e 783->808 784->785 786->784 799 103d074-103d076 787->799 800 103d0a8-103d0c7 MoveWindow 787->800 789->784 790->784 795 10036b3-10036b8 791->795 796 103d139-103d140 791->796 806 103d124-103d134 call 1062d36 795->806 807 10036be-10036c4 795->807 796->774 804 103d146-103d14f call 1057c36 796->804 801 103d097-103d0a3 SetFocus 799->801 802 103d078-103d07b 799->802 800->784 801->784 802->807 810 103d081-103d092 call 1011070 802->810 804->774 806->784 807->774 807->814 808->774 810->784 814->774 818 103d10c-103d11f call 100443a call 100434a 814->818 818->774
              APIs
              • DefWindowProcW.USER32(?,?,?,?), ref: 010036D2
              • KillTimer.USER32(?,00000001), ref: 010036FC
              • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 0100371F
              • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 0100372A
              • CreatePopupMenu.USER32 ref: 0100373E
              • PostQuitMessage.USER32(00000000), ref: 0100374D
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
              • String ID: TaskbarCreated
              • API String ID: 129472671-2362178303
              • Opcode ID: 30ffc6a317f6e02fca791280b4eaeaaa1effaa237cb1bbf8847c222efa1b060e
              • Instruction ID: b1152ddca0a7a8d59591b82163bcd9fee8f0f1e27c65c6bf3e84fc9d09de6a69
              • Opcode Fuzzy Hash: 30ffc6a317f6e02fca791280b4eaeaaa1effaa237cb1bbf8847c222efa1b060e
              • Instruction Fuzzy Hash: 3441D675204106AFFB776FBCDC08BBE3AD9FB45600F404119F6C2DA2D5CA6AA4548B61

              Control-flow Graph

              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: FileLibraryLoadModuleName__wcsicmp_l_memmove
              • String ID: /AutoIt3ExecuteLine$/AutoIt3ExecuteScript$/AutoIt3OutputDebug$/ErrorStdOut$>>>AUTOIT NO CMDEXECUTE<<<$CMDLINE$CMDLINERAW
              • API String ID: 1825951767-3513169116
              • Opcode ID: 20377789bf8511cd6298d414564c7f8cefce523b10e3ff26f028573701562094
              • Instruction ID: 342d910549016379b2b11b67d1c073505cb088d7cacf0a60c03b1d72e45c7968
              • Opcode Fuzzy Hash: 20377789bf8511cd6298d414564c7f8cefce523b10e3ff26f028573701562094
              • Instruction Fuzzy Hash: EAA16F7190021E9EEF16EBE4DC509EEB7B9BF25310F40051AE595BB1D0DF746A04CB60

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 942 15b14f8-15b15a6 call 15aeec8 945 15b15ad-15b15d3 call 15b2408 CreateFileW 942->945 948 15b15da-15b15ea 945->948 949 15b15d5 945->949 957 15b15ec 948->957 958 15b15f1-15b160b VirtualAlloc 948->958 950 15b1725-15b1729 949->950 951 15b176b-15b176e 950->951 952 15b172b-15b172f 950->952 954 15b1771-15b1778 951->954 955 15b173b-15b173f 952->955 956 15b1731-15b1734 952->956 961 15b177a-15b1785 954->961 962 15b17cd-15b17e2 954->962 963 15b174f-15b1753 955->963 964 15b1741-15b174b 955->964 956->955 957->950 959 15b160d 958->959 960 15b1612-15b1629 ReadFile 958->960 959->950 965 15b162b 960->965 966 15b1630-15b1670 VirtualAlloc 960->966 967 15b1789-15b1795 961->967 968 15b1787 961->968 969 15b17f2-15b17fa 962->969 970 15b17e4-15b17ef VirtualFree 962->970 971 15b1763 963->971 972 15b1755-15b175f 963->972 964->963 965->950 973 15b1672 966->973 974 15b1677-15b1692 call 15b2658 966->974 975 15b17a9-15b17b5 967->975 976 15b1797-15b17a7 967->976 968->962 970->969 971->951 972->971 973->950 982 15b169d-15b16a7 974->982 979 15b17c2-15b17c8 975->979 980 15b17b7-15b17c0 975->980 978 15b17cb 976->978 978->954 979->978 980->978 983 15b16da-15b16ee call 15b2468 982->983 984 15b16a9-15b16d8 call 15b2658 982->984 989 15b16f2-15b16f6 983->989 990 15b16f0 983->990 984->982 992 15b16f8-15b16fc CloseHandle 989->992 993 15b1702-15b1706 989->993 990->950 992->993 994 15b1708-15b1713 VirtualFree 993->994 995 15b1716-15b171f 993->995 994->995 995->945 995->950
              APIs
              • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 015B15C9
              • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 015B17EF
              Memory Dump Source
              • Source File: 00000000.00000002.1366952141.00000000015AE000.00000040.00000020.00020000.00000000.sdmp, Offset: 015AE000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_15ae000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: CreateFileFreeVirtual
              • String ID:
              • API String ID: 204039940-0
              • Opcode ID: 640a513b0a1dc75cf27b9d1dcd7263df352c7e5bc7e4f1208c2f85c57f315c64
              • Instruction ID: 8351acc342603d186c8f5a14665e444bc648802d1e87c83c2d269a2f2f6e988e
              • Opcode Fuzzy Hash: 640a513b0a1dc75cf27b9d1dcd7263df352c7e5bc7e4f1208c2f85c57f315c64
              • Instruction Fuzzy Hash: B9A10774E00609EBDB54CFA4D8D8BEEBBB5BF48304F208559E501BB280D7759A81CF94

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1073 10039d5-1003a45 CreateWindowExW * 2 ShowWindow * 2
              APIs
              • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 01003A03
              • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 01003A24
              • ShowWindow.USER32(00000000,?,?), ref: 01003A38
              • ShowWindow.USER32(00000000,?,?), ref: 01003A41
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: Window$CreateShow
              • String ID: AutoIt v3$edit
              • API String ID: 1584632944-3779509399
              • Opcode ID: 03e5f9fd4c309d045123371acc3d085e33d4afcf7a5e596de7354a0e522214a0
              • Instruction ID: bb809906a1e11d02ea7da57690aef547dffcb437cef0c404bc21ca7187977b7d
              • Opcode Fuzzy Hash: 03e5f9fd4c309d045123371acc3d085e33d4afcf7a5e596de7354a0e522214a0
              • Instruction Fuzzy Hash: 6DF0DA756412907EEA316727AC49E6B3EBEE7CBF50B00411EB980E6154C67A2851DFB0

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1074 15b1278-15b13ef call 15aeec8 call 15b1168 CreateFileW 1081 15b13f1 1074->1081 1082 15b13f6-15b1406 1074->1082 1083 15b14a6-15b14ab 1081->1083 1085 15b1408 1082->1085 1086 15b140d-15b1427 VirtualAlloc 1082->1086 1085->1083 1087 15b142b-15b1442 ReadFile 1086->1087 1088 15b1429 1086->1088 1089 15b1446-15b1480 call 15b11a8 call 15b0168 1087->1089 1090 15b1444 1087->1090 1088->1083 1095 15b149c-15b14a4 ExitProcess 1089->1095 1096 15b1482-15b1497 call 15b11f8 1089->1096 1090->1083 1095->1083 1096->1095
              APIs
                • Part of subcall function 015B1168: Sleep.KERNELBASE(000001F4), ref: 015B1179
              • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 015B13E2
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1366952141.00000000015AE000.00000040.00000020.00020000.00000000.sdmp, Offset: 015AE000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_15ae000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: CreateFileSleep
              • String ID: ZYUYCLICPSODZY
              • API String ID: 2694422964-2526276962
              • Opcode ID: 852eecdd52096100c6425cf790eafece19aa946a55e5635f538dcf611f25d407
              • Instruction ID: 2275e2b2426ed3c398f98b1324233f46c2f4691f1488eabd5aa4175a6d0c3ab4
              • Opcode Fuzzy Hash: 852eecdd52096100c6425cf790eafece19aa946a55e5635f538dcf611f25d407
              • Instruction Fuzzy Hash: 74618130E14649DBEF10DBE4D894BEEBB75EF58300F004599E608BB2C0D7795A45CBA6

              Control-flow Graph

              APIs
              • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 0103D3D7
                • Part of subcall function 01007BCC: _memmove.LIBCMT ref: 01007C06
              • _memset.LIBCMT ref: 010040FC
              • _wcscpy.LIBCMT ref: 01004150
              • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 01004160
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: IconLoadNotifyShell_String_memmove_memset_wcscpy
              • String ID: Line:
              • API String ID: 3942752672-1585850449
              • Opcode ID: 17ac9bf5812c651586c59862a7a1004899512d8857e933b65508bad84a472786
              • Instruction ID: 03a3b86d4afbc227c4aaf359ef493817e8fdb315ac996164815561ff5e4f0642
              • Opcode Fuzzy Hash: 17ac9bf5812c651586c59862a7a1004899512d8857e933b65508bad84a472786
              • Instruction Fuzzy Hash: 9531CF72108306AEE372EB64DC44FDB77E8AF65304F10491EF6C5920D0DB79A648CB96

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1133 100686a-1006891 call 1004ddd 1136 103e031-103e041 call 106955b 1133->1136 1137 1006897-10068a5 call 1004ddd 1133->1137 1141 103e046-103e048 1136->1141 1137->1136 1142 10068ab-10068b1 1137->1142 1143 103e067-103e0af call 1020db6 1141->1143 1144 103e04a-103e04d call 1004e4a 1141->1144 1146 103e052-103e061 call 10642f8 1142->1146 1147 10068b7-10068d9 call 1006a8c 1142->1147 1153 103e0b1-103e0bb 1143->1153 1154 103e0d4 1143->1154 1144->1146 1146->1143 1156 103e0cf-103e0d0 1153->1156 1157 103e0d6-103e0e9 1154->1157 1158 103e0d2 1156->1158 1159 103e0bd-103e0cc 1156->1159 1160 103e260-103e263 call 1022d55 1157->1160 1161 103e0ef 1157->1161 1158->1157 1159->1156 1164 103e268-103e271 call 1004e4a 1160->1164 1163 103e0f6-103e0f9 call 1007480 1161->1163 1167 103e0fe-103e120 call 1005db2 call 10673e9 1163->1167 1171 103e273-103e283 call 1007616 call 1005d9b 1164->1171 1176 103e122-103e12f 1167->1176 1177 103e134-103e13e call 10673d3 1167->1177 1184 103e288-103e2b8 call 105f7a1 call 1020e2c call 1022d55 call 1004e4a 1171->1184 1180 103e227-103e237 call 100750f 1176->1180 1186 103e140-103e153 1177->1186 1187 103e158-103e162 call 10673bd 1177->1187 1180->1167 1189 103e23d-103e247 call 100735d 1180->1189 1184->1171 1186->1180 1196 103e176-103e180 call 1005e2a 1187->1196 1197 103e164-103e171 1187->1197 1195 103e24c-103e25a 1189->1195 1195->1160 1195->1163 1196->1180 1202 103e186-103e19e call 105f73d 1196->1202 1197->1180 1208 103e1c1-103e1c4 1202->1208 1209 103e1a0-103e1bf call 1007de1 call 1005904 1202->1209 1211 103e1f2-103e1f5 1208->1211 1212 103e1c6-103e1e1 call 1007de1 call 1006839 call 1005904 1208->1212 1233 103e1e2-103e1f0 call 1005db2 1209->1233 1214 103e1f7-103e200 call 105f65e 1211->1214 1215 103e215-103e218 call 106737f 1211->1215 1212->1233 1214->1184 1225 103e206-103e210 call 1020e2c 1214->1225 1222 103e21d-103e226 call 1020e2c 1215->1222 1222->1180 1225->1167 1233->1222
              APIs
                • Part of subcall function 01004DDD: LoadLibraryExW.KERNEL32(?,00000000,00000002,?,010C52F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 01004E0F
              • _free.LIBCMT ref: 0103E263
              • _free.LIBCMT ref: 0103E2AA
                • Part of subcall function 01006A8C: SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 01006BAD
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: _free$CurrentDirectoryLibraryLoad
              • String ID: >>>AUTOIT SCRIPT<<<$Bad directive syntax error
              • API String ID: 2861923089-1757145024
              • Opcode ID: 775847b43595838ef547a12eeb8afa703d78a2c1bfec6e53ef3099683f46e558
              • Instruction ID: 94a00187fd01bbd577df6b2e7b994ebd9c132c6dcc2d11d4afd6df80632d0309
              • Opcode Fuzzy Hash: 775847b43595838ef547a12eeb8afa703d78a2c1bfec6e53ef3099683f46e558
              • Instruction Fuzzy Hash: 5D91B27190021AEFDF15EFA4CC809EDB7B8FF55310F00456AE995AB2A0DB34A955CF50
              APIs
              • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,00000003,00000000,80000001,80000001,?,010035A1,SwapMouseButtons,00000004,?), ref: 010035D4
              • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,010035A1,SwapMouseButtons,00000004,?,?,?,?,01002754), ref: 010035F5
              • RegCloseKey.KERNELBASE(00000000,?,?,010035A1,SwapMouseButtons,00000004,?,?,?,?,01002754), ref: 01003617
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: CloseOpenQueryValue
              • String ID: Control Panel\Mouse
              • API String ID: 3677997916-824357125
              • Opcode ID: 8c7ddd696e8a30abb61ef25f8229c8da3ae779ba8ea30dee88a514d2034dfc08
              • Instruction ID: 5b5eaa0e9f0892185f31f861a60309e4c553bc94589b334f2b4534a7fc5978a4
              • Opcode Fuzzy Hash: 8c7ddd696e8a30abb61ef25f8229c8da3ae779ba8ea30dee88a514d2034dfc08
              • Instruction Fuzzy Hash: 22115A71514208BFEB228F68DC44DEFBBB8FF08740F008459F885DB240D6719A419B60
              APIs
              • CreateProcessW.KERNELBASE(?,00000000), ref: 015B0923
              • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 015B09B9
              • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 015B09DB
              Memory Dump Source
              • Source File: 00000000.00000002.1366952141.00000000015AE000.00000040.00000020.00020000.00000000.sdmp, Offset: 015AE000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_15ae000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: Process$ContextCreateMemoryReadThreadWow64
              • String ID:
              • API String ID: 2438371351-0
              • Opcode ID: 3007ae169ef8b9d8c61beb8ea063371979b6b354134e23f449e077085ff78b4f
              • Instruction ID: 2b958b3df775b89e0f0f38ed261d822d806baa2bf0ce6b1f8fbb183afd3fdc1f
              • Opcode Fuzzy Hash: 3007ae169ef8b9d8c61beb8ea063371979b6b354134e23f449e077085ff78b4f
              • Instruction Fuzzy Hash: AA62F930A146189BEB24CFA4C891BDEB772FF58300F1095A9E10DEB2D0E7759E81CB59
              APIs
                • Part of subcall function 01004EE5: _fseek.LIBCMT ref: 01004EFD
                • Part of subcall function 01069734: _wcscmp.LIBCMT ref: 01069824
                • Part of subcall function 01069734: _wcscmp.LIBCMT ref: 01069837
              • _free.LIBCMT ref: 010696A2
              • _free.LIBCMT ref: 010696A9
              • _free.LIBCMT ref: 01069714
                • Part of subcall function 01022D55: RtlFreeHeap.NTDLL(00000000,00000000,?,01029A24), ref: 01022D69
                • Part of subcall function 01022D55: GetLastError.KERNEL32(00000000,?,01029A24), ref: 01022D7B
              • _free.LIBCMT ref: 0106971C
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: _free$_wcscmp$ErrorFreeHeapLast_fseek
              • String ID:
              • API String ID: 1552873950-0
              • Opcode ID: 83a1bf45cb5b46f0fbbb2b282febcfcf75e63ad05b5baa694a85d9b23f0f737c
              • Instruction ID: 0dc7305f7250a3367947807b554db3ae66bf5e63e106579fa2092542bfadd632
              • Opcode Fuzzy Hash: 83a1bf45cb5b46f0fbbb2b282febcfcf75e63ad05b5baa694a85d9b23f0f737c
              • Instruction Fuzzy Hash: 11516FB1D04259AFDF259FA4DC84AEEBBB9FF48304F00449EE249A3240DB715A90CF58
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: __flsbuf__flush__getptd_noexit__write_memmove
              • String ID:
              • API String ID: 2782032738-0
              • Opcode ID: 998aeda2236a74d80706e5f9a46343bd1135ee917ddd04e378ba6ed458c3dace
              • Instruction ID: 4104374f780afe5034fa1f1affe733ac7b3be372c10be7b0296ecd308858051f
              • Opcode Fuzzy Hash: 998aeda2236a74d80706e5f9a46343bd1135ee917ddd04e378ba6ed458c3dace
              • Instruction Fuzzy Hash: DD41D234B00B669BDB19CFADC8809AE7BE5FF45360B1481BDE9A9C7640E6B0D941CB40
              APIs
              • _memset.LIBCMT ref: 0103EA39
              • GetOpenFileNameW.COMDLG32(?), ref: 0103EA83
                • Part of subcall function 01004750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,01004743,?,?,010037AE,?), ref: 01004770
                • Part of subcall function 01020791: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 010207B0
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: Name$Path$FileFullLongOpen_memset
              • String ID: X
              • API String ID: 3777226403-3081909835
              • Opcode ID: 5acad21b79cd46307768fcbf06f0336a317671ebcdf23d7a306a991604e0777c
              • Instruction ID: f9b18222e9d609ccb5655f52ee0dac20acbc646185a9da90d9bdc4b482b23667
              • Opcode Fuzzy Hash: 5acad21b79cd46307768fcbf06f0336a317671ebcdf23d7a306a991604e0777c
              • Instruction Fuzzy Hash: DB21D871A002599BDB52DF94C844BDE7BFDAF49310F00805AE5C8B7280DBB855498FA1
              APIs
              • GetTempPathW.KERNEL32(00000104,?), ref: 010698F8
              • GetTempFileNameW.KERNELBASE(?,aut,00000000,?), ref: 0106990F
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: Temp$FileNamePath
              • String ID: aut
              • API String ID: 3285503233-3010740371
              • Opcode ID: 1aa03d317e4538b59f3d792311f563d0f88a94049b619f559ea059866b0baf72
              • Instruction ID: 252131a277ca90898dd3737f78ddd2c1c82e3a6cddd58e29516a649dd2a7eeac
              • Opcode Fuzzy Hash: 1aa03d317e4538b59f3d792311f563d0f88a94049b619f559ea059866b0baf72
              • Instruction Fuzzy Hash: C0D05E7954430EABDB609AA0EC4EFDA773CE704700F0042A1BAD4D5091EAB599988B95
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: c2e0bb3051f2577176baf8cd987e5b89d9f19df4de9be600d1773d13d285b370
              • Instruction ID: 39137682425c6a9eaa98cd83408b7e99ce07d16e77457f3e5b0c077b0fbeea67
              • Opcode Fuzzy Hash: c2e0bb3051f2577176baf8cd987e5b89d9f19df4de9be600d1773d13d285b370
              • Instruction Fuzzy Hash: 0CF13770A083029FDB14DF28C580A6ABBE5FF88314F54896EF8999B351D730E945CF92
              APIs
                • Part of subcall function 01020162: MapVirtualKeyW.USER32(0000005B,00000000), ref: 01020193
                • Part of subcall function 01020162: MapVirtualKeyW.USER32(00000010,00000000), ref: 0102019B
                • Part of subcall function 01020162: MapVirtualKeyW.USER32(000000A0,00000000), ref: 010201A6
                • Part of subcall function 01020162: MapVirtualKeyW.USER32(000000A1,00000000), ref: 010201B1
                • Part of subcall function 01020162: MapVirtualKeyW.USER32(00000011,00000000), ref: 010201B9
                • Part of subcall function 01020162: MapVirtualKeyW.USER32(00000012,00000000), ref: 010201C1
                • Part of subcall function 010160F9: RegisterWindowMessageW.USER32(WM_GETCONTROLNAME,?,0100F930), ref: 01016154
              • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 0100F9CD
              • OleInitialize.OLE32(00000000), ref: 0100FA4A
              • CloseHandle.KERNEL32(00000000), ref: 010445C8
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
              • String ID:
              • API String ID: 1986988660-0
              • Opcode ID: 054c68cae5889cd0d24b2ce13d47bd15fcd2b25ea0d3e24689e04d67d7e5430b
              • Instruction ID: bc1a2be6bbf5b2ed843fd0c5cbe02b2a2a534b98371bc7baa346fdfe9a2e6580
              • Opcode Fuzzy Hash: 054c68cae5889cd0d24b2ce13d47bd15fcd2b25ea0d3e24689e04d67d7e5430b
              • Instruction Fuzzy Hash: 1881B2B8B01641CFC3A4DF79EC54659BBE5FBA820AB50822ED0D9C7259EB7E6444CF10
              APIs
              • _memset.LIBCMT ref: 01004370
              • Shell_NotifyIconW.SHELL32(00000000,?), ref: 01004415
              • Shell_NotifyIconW.SHELL32(00000001,?), ref: 01004432
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: IconNotifyShell_$_memset
              • String ID:
              • API String ID: 1505330794-0
              • Opcode ID: 097e9e807440374a051fdb9591979797c93ee8201fb95849e69e4d8ff15568e2
              • Instruction ID: a6d8456f7cee64a1629a55f2b6ef5fd4022de574b8e7574ad1d8f1caf019e9d8
              • Opcode Fuzzy Hash: 097e9e807440374a051fdb9591979797c93ee8201fb95849e69e4d8ff15568e2
              • Instruction Fuzzy Hash: BD3180706043018FE762DF68D88469BBBE8FB49308F00096EF6DAC2281D775A544CB56
              APIs
              • __FF_MSGBANNER.LIBCMT ref: 01025733
                • Part of subcall function 0102A16B: __NMSG_WRITE.LIBCMT ref: 0102A192
                • Part of subcall function 0102A16B: __NMSG_WRITE.LIBCMT ref: 0102A19C
              • __NMSG_WRITE.LIBCMT ref: 0102573A
                • Part of subcall function 0102A1C8: GetModuleFileNameW.KERNEL32(00000000,010C33BA,00000104,?,00000001,00000000), ref: 0102A25A
                • Part of subcall function 0102A1C8: ___crtMessageBoxW.LIBCMT ref: 0102A308
                • Part of subcall function 0102309F: ___crtCorExitProcess.LIBCMT ref: 010230A5
                • Part of subcall function 0102309F: ExitProcess.KERNEL32 ref: 010230AE
                • Part of subcall function 01028B28: __getptd_noexit.LIBCMT ref: 01028B28
              • RtlAllocateHeap.NTDLL(01570000,00000000,00000001,00000000,?,?,?,01020DD3,?), ref: 0102575F
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: ExitProcess___crt$AllocateFileHeapMessageModuleName__getptd_noexit
              • String ID:
              • API String ID: 1372826849-0
              • Opcode ID: cf8cb18600325d30e414280b1368db84dfbe1678f2858d26b58c77cafeadbb13
              • Instruction ID: e484b987e1c0f35c5cf0ffbfb4c1b45d05c238c62033537bdb8183bb0aa01954
              • Opcode Fuzzy Hash: cf8cb18600325d30e414280b1368db84dfbe1678f2858d26b58c77cafeadbb13
              • Instruction Fuzzy Hash: 7D01F535380333DEEA612738FC84BEE77C8BB52561F50442AE9C59B180DE7488004768
              APIs
              • CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000003,00000080,00000000,?,?,01069548,?,?,?,?,?,00000004), ref: 010698BB
              • SetFileTime.KERNELBASE(00000000,?,00000000,?,?,01069548,?,?,?,?,?,00000004,00000001,?,?,00000004), ref: 010698D1
              • CloseHandle.KERNEL32(00000000,?,01069548,?,?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 010698D8
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: File$CloseCreateHandleTime
              • String ID:
              • API String ID: 3397143404-0
              • Opcode ID: bd0b976adfaf274cabf6c67c22790ade33f499cc46a3789bbb3caf764d1e4bbe
              • Instruction ID: 60c1ef362b5f455906be8f130806478c8edbf78784662fe36433ea1e0203b820
              • Opcode Fuzzy Hash: bd0b976adfaf274cabf6c67c22790ade33f499cc46a3789bbb3caf764d1e4bbe
              • Instruction Fuzzy Hash: 63E08632144215BBEB312A64EC09FDE7F59EB06764F108110FBD4A90D0C7B615219798
              APIs
              • _free.LIBCMT ref: 01068D1B
                • Part of subcall function 01022D55: RtlFreeHeap.NTDLL(00000000,00000000,?,01029A24), ref: 01022D69
                • Part of subcall function 01022D55: GetLastError.KERNEL32(00000000,?,01029A24), ref: 01022D7B
              • _free.LIBCMT ref: 01068D2C
              • _free.LIBCMT ref: 01068D3E
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: _free$ErrorFreeHeapLast
              • String ID:
              • API String ID: 776569668-0
              • Opcode ID: 625e2a9df38ff8793e00647abbe9ccf0d6414545c555b0c4696158d27d9f7751
              • Instruction ID: 0f635a88aac7a0a2dfb6a7e87014a76e235c2dba0fa6d6e628111b72348c4008
              • Opcode Fuzzy Hash: 625e2a9df38ff8793e00647abbe9ccf0d6414545c555b0c4696158d27d9f7751
              • Instruction Fuzzy Hash: F0E0C7B160172243EB60BABCA840AC323EC4FBC252B44484EF68DD7180CE60F8828038
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID:
              • String ID: CALL
              • API String ID: 0-4196123274
              • Opcode ID: 64e8a28784613f469dfa31b36e461edda7d415f865e60a62a33af91a37a01767
              • Instruction ID: abf48f54b4c081b0060030bc3dc2c70a870a4e9bbffe883477e5f45d7ff6cd0e
              • Opcode Fuzzy Hash: 64e8a28784613f469dfa31b36e461edda7d415f865e60a62a33af91a37a01767
              • Instruction Fuzzy Hash: DE227C74608302DFE726DF14C494A6ABBE1BF85304F05899DE9CA9B3A1D735EC45CB82
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: _memmove
              • String ID: EA06
              • API String ID: 4104443479-3962188686
              • Opcode ID: 02947bb97b82accd1fd231a8de306ee8a39cf9d70927be16136427e11f74c828
              • Instruction ID: 30ed5f7dfba82d7f7c77e0b4ca3da00e741ca690d840b156ef2ca67005f6c039
              • Opcode Fuzzy Hash: 02947bb97b82accd1fd231a8de306ee8a39cf9d70927be16136427e11f74c828
              • Instruction Fuzzy Hash: 9D415D21A0415967FF23AF588C907FE7FE69B55200F5840B6EFC6DB2C2D6305D4487A5
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: _memmove
              • String ID:
              • API String ID: 4104443479-0
              • Opcode ID: 75b3ef76dc9c1d7680ff1126038a0b5bca49f3ec50bdc15de679bd26e1e87542
              • Instruction ID: 392b06b6522110a1ec2955d41d51da9ca734e993eb9589d3633d362c9c3d7c28
              • Opcode Fuzzy Hash: 75b3ef76dc9c1d7680ff1126038a0b5bca49f3ec50bdc15de679bd26e1e87542
              • Instruction Fuzzy Hash: 2031C4B1600606AFD705DF68C8D0E69B3E9FF89310B158269E599CB2D1EB34F960CB90
              APIs
              • IsThemeActive.UXTHEME ref: 01004834
                • Part of subcall function 0102336C: __lock.LIBCMT ref: 01023372
                • Part of subcall function 0102336C: DecodePointer.KERNEL32(00000001,?,01004849,01057C74), ref: 0102337E
                • Part of subcall function 0102336C: EncodePointer.KERNEL32(?,?,01004849,01057C74), ref: 01023389
                • Part of subcall function 010048FD: SystemParametersInfoW.USER32(00002000,00000000,?,00000000), ref: 01004915
                • Part of subcall function 010048FD: SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 0100492A
                • Part of subcall function 01003B3A: GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 01003B68
                • Part of subcall function 01003B3A: IsDebuggerPresent.KERNEL32 ref: 01003B7A
                • Part of subcall function 01003B3A: GetFullPathNameW.KERNEL32(00007FFF,?,?,010C52F8,010C52E0,?,?), ref: 01003BEB
                • Part of subcall function 01003B3A: SetCurrentDirectoryW.KERNEL32(?), ref: 01003C6F
              • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 01004874
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: InfoParametersSystem$CurrentDirectoryPointer$ActiveDebuggerDecodeEncodeFullNamePathPresentTheme__lock
              • String ID:
              • API String ID: 1438897964-0
              • Opcode ID: db43b00a40785a2749b44adb07652280369fce4c4aae88cafe43def60946b46b
              • Instruction ID: 745b121be32b115617589d2867b761d056b0061d56f700a639fb3d2be14f62b4
              • Opcode Fuzzy Hash: db43b00a40785a2749b44adb07652280369fce4c4aae88cafe43def60946b46b
              • Instruction Fuzzy Hash: 91116A719083069FE721EF29D80494EFBE9FBA9750F00491EF4C4872A0DB769649CF96
              APIs
                • Part of subcall function 0102571C: __FF_MSGBANNER.LIBCMT ref: 01025733
                • Part of subcall function 0102571C: __NMSG_WRITE.LIBCMT ref: 0102573A
                • Part of subcall function 0102571C: RtlAllocateHeap.NTDLL(01570000,00000000,00000001,00000000,?,?,?,01020DD3,?), ref: 0102575F
              • std::exception::exception.LIBCMT ref: 01020DEC
              • __CxxThrowException@8.LIBCMT ref: 01020E01
                • Part of subcall function 0102859B: RaiseException.KERNEL32(?,?,?,010B9E78,00000000,?,?,?,?,01020E06,?,010B9E78,?,00000001), ref: 010285F0
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: AllocateExceptionException@8HeapRaiseThrowstd::exception::exception
              • String ID:
              • API String ID: 3902256705-0
              • Opcode ID: 9f19671a965e2ce114978ce7c3a7a9cb36edc1053878eeb9a5687d280b7b234e
              • Instruction ID: 26f600c7e3ce34312e7ee5b2e0278cff1cb81b801218f7ae448d62a7904c36f2
              • Opcode Fuzzy Hash: 9f19671a965e2ce114978ce7c3a7a9cb36edc1053878eeb9a5687d280b7b234e
              • Instruction Fuzzy Hash: 65F0A43550233A76DF14BAA8EC109DFBBECAF15215F00446AFD8896244DF709A80D2D1
              APIs
                • Part of subcall function 01028B28: __getptd_noexit.LIBCMT ref: 01028B28
              • __lock_file.LIBCMT ref: 010253EB
                • Part of subcall function 01026C11: __lock.LIBCMT ref: 01026C34
              • __fclose_nolock.LIBCMT ref: 010253F6
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
              • String ID:
              • API String ID: 2800547568-0
              • Opcode ID: 5983794dbb24dbb56bd3fd6f39372e996b013eea00d5eff3caab8fb671e364a2
              • Instruction ID: 8c839d07071ea1d2af4d3faf04f603ba0ee3ec5a7c1a6cdeaac31e1bbe372bac
              • Opcode Fuzzy Hash: 5983794dbb24dbb56bd3fd6f39372e996b013eea00d5eff3caab8fb671e364a2
              • Instruction Fuzzy Hash: A5F0B4319016269ADB11BF799C007ED7BF06F51334F25D249D4E4AB1C0CBFC89419B59
              APIs
              • CreateProcessW.KERNELBASE(?,00000000), ref: 015B0923
              • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 015B09B9
              • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 015B09DB
              Memory Dump Source
              • Source File: 00000000.00000002.1366952141.00000000015AE000.00000040.00000020.00020000.00000000.sdmp, Offset: 015AE000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_15ae000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: Process$ContextCreateMemoryReadThreadWow64
              • String ID:
              • API String ID: 2438371351-0
              • Opcode ID: df6a772f5278f9eae63f3a29a40672dfa4321236305f3f5d8c91d224ff423281
              • Instruction ID: cf190628ea6c0a3e29474a32d595ed12c231997de4609b4e0ee1e3aeaf4ff2cd
              • Opcode Fuzzy Hash: df6a772f5278f9eae63f3a29a40672dfa4321236305f3f5d8c91d224ff423281
              • Instruction Fuzzy Hash: 4D12DD24E24658C6EB24DF64D8507DEB232FF68300F1094E9910DEB7A5E77A4E81CF5A
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: ProtectVirtual
              • String ID:
              • API String ID: 544645111-0
              • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
              • Instruction ID: 5e87f718da24d247138a06449f0655226c15d3d9183732f21e2fd6a676c66e79
              • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
              • Instruction Fuzzy Hash: 1131D4B0A003199BD758DF58C49496DFBA6FB49300B7486A5E98ACB359D731EDC1CBC0
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: ClearVariant
              • String ID:
              • API String ID: 1473721057-0
              • Opcode ID: 711e68c9c7ae3f494ea095a2115238ff622077601a1ce7f3d068ba472e4bb93a
              • Instruction ID: 79ad6295468dd9464b6ea57578a144b334eced2c1537c5f65f4ecdfbba0fccad
              • Opcode Fuzzy Hash: 711e68c9c7ae3f494ea095a2115238ff622077601a1ce7f3d068ba472e4bb93a
              • Instruction Fuzzy Hash: 2C411874608341DFEB15DF18C448B5ABBE1BF45318F09889CE9D98B362C736E845CB52
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: _memmove
              • String ID:
              • API String ID: 4104443479-0
              • Opcode ID: 6e9fcb1987c2e05347aabe668f2705aae82ef1c269eeaaa8a3e237c56dba5ee3
              • Instruction ID: f5552a2bfcd348bcd629befbd1a4e790acf53e622608bd71bf431d230abdf84d
              • Opcode Fuzzy Hash: 6e9fcb1987c2e05347aabe668f2705aae82ef1c269eeaaa8a3e237c56dba5ee3
              • Instruction Fuzzy Hash: 23214872610A0DEBEB254F15E8807ED7BB8FF84350F24856DEAC6C5184EB359090C705
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: _memmove
              • String ID:
              • API String ID: 4104443479-0
              • Opcode ID: debd4a192cd98d234165f3013593147144481ea24bfc443804d127757904428b
              • Instruction ID: c36359f26b2d85901db7c128416d9124a38f248eb2f4bc839f2fbffb07814e75
              • Opcode Fuzzy Hash: debd4a192cd98d234165f3013593147144481ea24bfc443804d127757904428b
              • Instruction Fuzzy Hash: 32118731604216ABE756DF28D480CBEB7A9EF85324B24811AE9D5CB3D0DB35FD11C790
              APIs
                • Part of subcall function 01004BB5: FreeLibrary.KERNEL32(00000000,?), ref: 01004BEF
                • Part of subcall function 0102525B: __wfsopen.LIBCMT ref: 01025266
              • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,010C52F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 01004E0F
                • Part of subcall function 01004B6A: FreeLibrary.KERNEL32(00000000), ref: 01004BA4
                • Part of subcall function 01004C70: _memmove.LIBCMT ref: 01004CBA
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: Library$Free$Load__wfsopen_memmove
              • String ID:
              • API String ID: 1396898556-0
              • Opcode ID: 16041156027ee3c9eb0be113cdd35b0b4d1e51c94a24913a6a04beb3465b9bec
              • Instruction ID: e1eef6c6854183ba78c1c0797b650e4b91bcf662422c0f450fb4bbc9f8465e5f
              • Opcode Fuzzy Hash: 16041156027ee3c9eb0be113cdd35b0b4d1e51c94a24913a6a04beb3465b9bec
              • Instruction Fuzzy Hash: 7011C131604206ABEF26BFB4C815FED77A89F94710F10882DE7C1EB1C0EA759E019B58
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: ClearVariant
              • String ID:
              • API String ID: 1473721057-0
              • Opcode ID: 913960cda3c42fc1097e7488bc3211713fe5fc7cc26465b581b22ee588bf0f10
              • Instruction ID: cd41f556d819628aecf88d4cf157676b0c16bc9b10348e7396f66defa1628a11
              • Opcode Fuzzy Hash: 913960cda3c42fc1097e7488bc3211713fe5fc7cc26465b581b22ee588bf0f10
              • Instruction Fuzzy Hash: E92124B4A08302DFEB15DF24C844A5ABBE0BF88314F0589ACF9CA57361D731E805CB92
              APIs
              • __lock_file.LIBCMT ref: 010248A6
                • Part of subcall function 01028B28: __getptd_noexit.LIBCMT ref: 01028B28
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: __getptd_noexit__lock_file
              • String ID:
              • API String ID: 2597487223-0
              • Opcode ID: f605b7a8bacb2c38c3e3173d48405346f9b5836f081f15622278369254375a95
              • Instruction ID: c121e59a3facc5421610384b96aafb12c2bc136dd595340807f90bb29ea060d1
              • Opcode Fuzzy Hash: f605b7a8bacb2c38c3e3173d48405346f9b5836f081f15622278369254375a95
              • Instruction Fuzzy Hash: FBF0C23191062AEBEF51AFB48C047EE37E0AF11325F158459E8A4DA290D7B88951DB51
              APIs
              • FreeLibrary.KERNEL32(?,?,010C52F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 01004E7E
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: FreeLibrary
              • String ID:
              • API String ID: 3664257935-0
              • Opcode ID: dfa0ac9f07ed8730c573d2c33f1e4e15acdd62fdff43dab9de5d3099ac778a73
              • Instruction ID: 2e17fda144d008a7260a0d77c118a572d20b6d51fda1c247316d72e8d6664175
              • Opcode Fuzzy Hash: dfa0ac9f07ed8730c573d2c33f1e4e15acdd62fdff43dab9de5d3099ac778a73
              • Instruction Fuzzy Hash: 37F03971509752CFEB369F68E494856BBE1AF143697108A7EE2D6C2650C772A840CF44
              APIs
              • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 010207B0
                • Part of subcall function 01007BCC: _memmove.LIBCMT ref: 01007C06
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: LongNamePath_memmove
              • String ID:
              • API String ID: 2514874351-0
              • Opcode ID: 9f7045aff2c9b00c9620cbb9ffb23642725abfa2c4df43fe06f88ad4091734e9
              • Instruction ID: 3319d483aec19e64eb369c299fe62f63427474823bced25c4e87ccb6f3fcb341
              • Opcode Fuzzy Hash: 9f7045aff2c9b00c9620cbb9ffb23642725abfa2c4df43fe06f88ad4091734e9
              • Instruction Fuzzy Hash: 0CE0CD3690412957C721D5699C05FEA77DDDFCC6A0F0541B6FD8CD7248DD75AC8086D0
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: __wfsopen
              • String ID:
              • API String ID: 197181222-0
              • Opcode ID: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
              • Instruction ID: 4aa58b32b7dbb5630a066cef8cc822e79740136f51471bccdfff4cc5f52e215e
              • Opcode Fuzzy Hash: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
              • Instruction Fuzzy Hash: 6BB0927644020C77CE012A82EC02A997B199B56664F408020FB0C181A1A673A6689A89
              APIs
              • Sleep.KERNELBASE(000001F4), ref: 015B1179
              Memory Dump Source
              • Source File: 00000000.00000002.1366952141.00000000015AE000.00000040.00000020.00020000.00000000.sdmp, Offset: 015AE000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_15ae000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: Sleep
              • String ID:
              • API String ID: 3472027048-0
              • Opcode ID: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
              • Instruction ID: 746693d7ecb9713dc986a625125e200e194245840c950cfb44b1fdb065092d93
              • Opcode Fuzzy Hash: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
              • Instruction Fuzzy Hash: 22E0BF7494020DEFDB00DFA4D6496ED7BB4FF04301F1005A1FD05E7680DB309E548A62
              APIs
              • Sleep.KERNELBASE(000001F4), ref: 015B1179
              Memory Dump Source
              • Source File: 00000000.00000002.1366952141.00000000015AE000.00000040.00000020.00020000.00000000.sdmp, Offset: 015AE000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_15ae000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: Sleep
              • String ID:
              • API String ID: 3472027048-0
              • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
              • Instruction ID: f9bc555dd93800447e2a4cac8149d242134b184f23bdf425f67ea07498fc4d2f
              • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
              • Instruction Fuzzy Hash: 23E0E67494020DDFDB00DFB4D6496ED7BB4FF04301F100161FD05E2280D6309D508A62
              APIs
                • Part of subcall function 01002612: GetWindowLongW.USER32(?,000000EB), ref: 01002623
              • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 0108CB37
              • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0108CB95
              • GetWindowLongW.USER32(?,000000F0), ref: 0108CBD6
              • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 0108CC00
              • SendMessageW.USER32 ref: 0108CC29
              • _wcsncpy.LIBCMT ref: 0108CC95
              • GetKeyState.USER32(00000011), ref: 0108CCB6
              • GetKeyState.USER32(00000009), ref: 0108CCC3
              • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0108CCD9
              • GetKeyState.USER32(00000010), ref: 0108CCE3
              • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 0108CD0C
              • SendMessageW.USER32 ref: 0108CD33
              • SendMessageW.USER32(?,00001030,?,0108B348), ref: 0108CE37
              • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 0108CE4D
              • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 0108CE60
              • SetCapture.USER32(?), ref: 0108CE69
              • ClientToScreen.USER32(?,?), ref: 0108CECE
              • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 0108CEDB
              • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 0108CEF5
              • ReleaseCapture.USER32 ref: 0108CF00
              • GetCursorPos.USER32(?), ref: 0108CF3A
              • ScreenToClient.USER32(?,?), ref: 0108CF47
              • SendMessageW.USER32(?,00001012,00000000,?), ref: 0108CFA3
              • SendMessageW.USER32 ref: 0108CFD1
              • SendMessageW.USER32(?,00001111,00000000,?), ref: 0108D00E
              • SendMessageW.USER32 ref: 0108D03D
              • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 0108D05E
              • SendMessageW.USER32(?,0000110B,00000009,?), ref: 0108D06D
              • GetCursorPos.USER32(?), ref: 0108D08D
              • ScreenToClient.USER32(?,?), ref: 0108D09A
              • GetParent.USER32(?), ref: 0108D0BA
              • SendMessageW.USER32(?,00001012,00000000,?), ref: 0108D123
              • SendMessageW.USER32 ref: 0108D154
              • ClientToScreen.USER32(?,?), ref: 0108D1B2
              • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 0108D1E2
              • SendMessageW.USER32(?,00001111,00000000,?), ref: 0108D20C
              • SendMessageW.USER32 ref: 0108D22F
              • ClientToScreen.USER32(?,?), ref: 0108D281
              • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 0108D2B5
                • Part of subcall function 010025DB: GetWindowLongW.USER32(?,000000EB), ref: 010025EC
              • GetWindowLongW.USER32(?,000000F0), ref: 0108D351
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease_wcsncpy
              • String ID: @GUI_DRAGID$@U=u$F
              • API String ID: 3977979337-1007936534
              • Opcode ID: 9f9377816abecbed9cb70750202bc7057a7a59bc686c6204b39e62cb97ab861f
              • Instruction ID: 824a040f9e4f32c3534b1b4eb2c80e22d1a1f7d1365fe71065414ed52cf60364
              • Opcode Fuzzy Hash: 9f9377816abecbed9cb70750202bc7057a7a59bc686c6204b39e62cb97ab861f
              • Instruction Fuzzy Hash: B042AD74208641AFE721EF28C948AAABFF5FF48314F140659F6D9972A0C732E854DF61
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: _memmove$_memset
              • String ID: DEFINE$Q\E$[:<:]]$[:>:]]$\b(?<=\w)$\b(?=\w)
              • API String ID: 1357608183-1798697756
              • Opcode ID: 645c00b05ec617e209f2250526e34ecb52cc52a49f7c3c274d4aa3fd57f96f5f
              • Instruction ID: b72b1826d6cf4d22aad3ce71ab2c81f25999bd049be988332187cb09f8547e65
              • Opcode Fuzzy Hash: 645c00b05ec617e209f2250526e34ecb52cc52a49f7c3c274d4aa3fd57f96f5f
              • Instruction Fuzzy Hash: 6C939375E00219DBDB65CF98C8817AEBBF1FF48310F1481AAED85EB285E7749981CB50
              APIs
              • GetForegroundWindow.USER32(00000000,?), ref: 010048DF
              • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0103D665
              • IsIconic.USER32(?), ref: 0103D66E
              • ShowWindow.USER32(?,00000009), ref: 0103D67B
              • SetForegroundWindow.USER32(?), ref: 0103D685
              • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0103D69B
              • GetCurrentThreadId.KERNEL32 ref: 0103D6A2
              • GetWindowThreadProcessId.USER32(?,00000000), ref: 0103D6AE
              • AttachThreadInput.USER32(?,00000000,00000001), ref: 0103D6BF
              • AttachThreadInput.USER32(?,00000000,00000001), ref: 0103D6C7
              • AttachThreadInput.USER32(00000000,?,00000001), ref: 0103D6CF
              • SetForegroundWindow.USER32(?), ref: 0103D6D2
              • MapVirtualKeyW.USER32(00000012,00000000), ref: 0103D6E7
              • keybd_event.USER32(00000012,00000000), ref: 0103D6F2
              • MapVirtualKeyW.USER32(00000012,00000000), ref: 0103D6FC
              • keybd_event.USER32(00000012,00000000), ref: 0103D701
              • MapVirtualKeyW.USER32(00000012,00000000), ref: 0103D70A
              • keybd_event.USER32(00000012,00000000), ref: 0103D70F
              • MapVirtualKeyW.USER32(00000012,00000000), ref: 0103D719
              • keybd_event.USER32(00000012,00000000), ref: 0103D71E
              • SetForegroundWindow.USER32(?), ref: 0103D721
              • AttachThreadInput.USER32(?,?,00000000), ref: 0103D748
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
              • String ID: Shell_TrayWnd
              • API String ID: 4125248594-2988720461
              • Opcode ID: 643f6d00ef5e338cf3c32100da3630640eb3962056316fd4850917e1ca15943b
              • Instruction ID: 482fcefd514e1fd71f6fb21df6b5a613d40af809deae1257ee3e19e04010e5cd
              • Opcode Fuzzy Hash: 643f6d00ef5e338cf3c32100da3630640eb3962056316fd4850917e1ca15943b
              • Instruction Fuzzy Hash: 16319371A403187AEB312BB19C49F7F3E6CEB84B50F104025FA84EA1C1D6B55910ABA0
              APIs
                • Part of subcall function 010587E1: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0105882B
                • Part of subcall function 010587E1: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 01058858
                • Part of subcall function 010587E1: GetLastError.KERNEL32 ref: 01058865
              • _memset.LIBCMT ref: 01058353
              • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?,?,?,?,00000001,?,?), ref: 010583A5
              • CloseHandle.KERNEL32(?), ref: 010583B6
              • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 010583CD
              • GetProcessWindowStation.USER32 ref: 010583E6
              • SetProcessWindowStation.USER32(00000000), ref: 010583F0
              • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 0105840A
                • Part of subcall function 010581CB: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,01058309), ref: 010581E0
                • Part of subcall function 010581CB: CloseHandle.KERNEL32(?,?,01058309), ref: 010581F2
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLookupPrivilegeValue_memset
              • String ID: $default$winsta0
              • API String ID: 2063423040-1027155976
              • Opcode ID: b3da6cb76a65c9079bde0c0d4610efc4f71abc0c6bcecc6365bee0f587c6c82f
              • Instruction ID: 1eb76ea2fbdd507f6abd203bbdb687bf39af22d0f8b3236371df70d89fb6db4b
              • Opcode Fuzzy Hash: b3da6cb76a65c9079bde0c0d4610efc4f71abc0c6bcecc6365bee0f587c6c82f
              • Instruction Fuzzy Hash: 56814F7190020AAFEF919FA5DC44AEF7FB9FF08308F14819AFD94A6164D7358A54DB20
              APIs
              • FindFirstFileW.KERNEL32(?,?), ref: 0106C78D
              • FindClose.KERNEL32(00000000), ref: 0106C7E1
              • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 0106C806
              • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 0106C81D
              • FileTimeToSystemTime.KERNEL32(?,?), ref: 0106C844
              • __swprintf.LIBCMT ref: 0106C890
              • __swprintf.LIBCMT ref: 0106C8D3
                • Part of subcall function 01007DE1: _memmove.LIBCMT ref: 01007E22
              • __swprintf.LIBCMT ref: 0106C927
                • Part of subcall function 01023698: __woutput_l.LIBCMT ref: 010236F1
              • __swprintf.LIBCMT ref: 0106C975
                • Part of subcall function 01023698: __flsbuf.LIBCMT ref: 01023713
                • Part of subcall function 01023698: __flsbuf.LIBCMT ref: 0102372B
              • __swprintf.LIBCMT ref: 0106C9C4
              • __swprintf.LIBCMT ref: 0106CA13
              • __swprintf.LIBCMT ref: 0106CA62
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: __swprintf$FileTime$FindLocal__flsbuf$CloseFirstSystem__woutput_l_memmove
              • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
              • API String ID: 3953360268-2428617273
              • Opcode ID: 6c5dc98832495c35f015edd3ad7b52b82c81ca7dae75cb900f7c2e51d0a4c2b1
              • Instruction ID: b1403778d14d100b290f553b9d940b1307eeea0f441234feac92f0f1b0c2462d
              • Opcode Fuzzy Hash: 6c5dc98832495c35f015edd3ad7b52b82c81ca7dae75cb900f7c2e51d0a4c2b1
              • Instruction Fuzzy Hash: 36A12FB1404346AFE711EFA4C984DEFB7ECBFA8704F40491AF5D586191EA35DA08CB62
              APIs
              • FindFirstFileW.KERNEL32(?,?,76F88FB0,?,00000000), ref: 0106EFB6
              • _wcscmp.LIBCMT ref: 0106EFCB
              • _wcscmp.LIBCMT ref: 0106EFE2
              • GetFileAttributesW.KERNEL32(?), ref: 0106EFF4
              • SetFileAttributesW.KERNEL32(?,?), ref: 0106F00E
              • FindNextFileW.KERNEL32(00000000,?), ref: 0106F026
              • FindClose.KERNEL32(00000000), ref: 0106F031
              • FindFirstFileW.KERNEL32(*.*,?), ref: 0106F04D
              • _wcscmp.LIBCMT ref: 0106F074
              • _wcscmp.LIBCMT ref: 0106F08B
              • SetCurrentDirectoryW.KERNEL32(?), ref: 0106F09D
              • SetCurrentDirectoryW.KERNEL32(010B8920), ref: 0106F0BB
              • FindNextFileW.KERNEL32(00000000,00000010), ref: 0106F0C5
              • FindClose.KERNEL32(00000000), ref: 0106F0D2
              • FindClose.KERNEL32(00000000), ref: 0106F0E4
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: Find$File$_wcscmp$Close$AttributesCurrentDirectoryFirstNext
              • String ID: *.*
              • API String ID: 1803514871-438819550
              • Opcode ID: f44771763de84a64c68dfef7d57083ede5140d102311504336874d092d10d8a3
              • Instruction ID: f4e3926e718c702e8475ede5783a51ecd860f3221bed10a9dafb1e68f8cebea1
              • Opcode Fuzzy Hash: f44771763de84a64c68dfef7d57083ede5140d102311504336874d092d10d8a3
              • Instruction Fuzzy Hash: AE31A53250521A7AEB24EFB4EC58ADE77EC9F48260F144196F9C4D2050DB75DA84CB61
              APIs
              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 01080953
              • RegCreateKeyExW.ADVAPI32(?,?,00000000,0108F910,00000000,?,00000000,?,?), ref: 010809C1
              • RegCloseKey.ADVAPI32(00000000,00000001,00000000,00000000,00000000), ref: 01080A09
              • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000002,?), ref: 01080A92
              • RegCloseKey.ADVAPI32(?), ref: 01080DB2
              • RegCloseKey.ADVAPI32(00000000), ref: 01080DBF
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: Close$ConnectCreateRegistryValue
              • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
              • API String ID: 536824911-966354055
              • Opcode ID: 8e4a53f7772b37eefd09aeeced205a7a87c50297f83b29727974f84503346f64
              • Instruction ID: 63821114593c9da23de33fa12462db73944e0c69f418334aef9adb554c26f2a6
              • Opcode Fuzzy Hash: 8e4a53f7772b37eefd09aeeced205a7a87c50297f83b29727974f84503346f64
              • Instruction Fuzzy Hash: 3C0255756046129FDB55EF28C880E6AB7E5EF88724F04845CF9DA9B3A1CB30ED45CB81
              APIs
              • FindFirstFileW.KERNEL32(?,?,76F88FB0,?,00000000), ref: 0106F113
              • _wcscmp.LIBCMT ref: 0106F128
              • _wcscmp.LIBCMT ref: 0106F13F
                • Part of subcall function 01064385: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 010643A0
              • FindNextFileW.KERNEL32(00000000,?), ref: 0106F16E
              • FindClose.KERNEL32(00000000), ref: 0106F179
              • FindFirstFileW.KERNEL32(*.*,?), ref: 0106F195
              • _wcscmp.LIBCMT ref: 0106F1BC
              • _wcscmp.LIBCMT ref: 0106F1D3
              • SetCurrentDirectoryW.KERNEL32(?), ref: 0106F1E5
              • SetCurrentDirectoryW.KERNEL32(010B8920), ref: 0106F203
              • FindNextFileW.KERNEL32(00000000,00000010), ref: 0106F20D
              • FindClose.KERNEL32(00000000), ref: 0106F21A
              • FindClose.KERNEL32(00000000), ref: 0106F22C
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: Find$File$_wcscmp$Close$CurrentDirectoryFirstNext$Create
              • String ID: *.*
              • API String ID: 1824444939-438819550
              • Opcode ID: 0bf50504d8b541c09987c546cdb3279887f41948d632d43a59fe99f0e081b84e
              • Instruction ID: 1ffc16e3520e5866ea156cb6940f92d3984902f7baf85f65bbcfd42781345450
              • Opcode Fuzzy Hash: 0bf50504d8b541c09987c546cdb3279887f41948d632d43a59fe99f0e081b84e
              • Instruction Fuzzy Hash: 4731263650021B7AEF20EEB8FC68EDE77AC9F49260F104195E9C4E6090DB35DA84CF64
              APIs
              • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 0106A20F
              • __swprintf.LIBCMT ref: 0106A231
              • CreateDirectoryW.KERNEL32(?,00000000), ref: 0106A26E
              • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 0106A293
              • _memset.LIBCMT ref: 0106A2B2
              • _wcsncpy.LIBCMT ref: 0106A2EE
              • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 0106A323
              • CloseHandle.KERNEL32(00000000), ref: 0106A32E
              • RemoveDirectoryW.KERNEL32(?), ref: 0106A337
              • CloseHandle.KERNEL32(00000000), ref: 0106A341
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove__swprintf_memset_wcsncpy
              • String ID: :$\$\??\%s
              • API String ID: 2733774712-3457252023
              • Opcode ID: a88a43a966cec4b0b195c1c80f36b20c8577f55273efb17f0e6bbe964d5430ec
              • Instruction ID: b2dee37aead6ec0149e67f9f57acd53c3d8062f053f2842c66cdaf105529a34c
              • Opcode Fuzzy Hash: a88a43a966cec4b0b195c1c80f36b20c8577f55273efb17f0e6bbe964d5430ec
              • Instruction Fuzzy Hash: C931B47160411AABDB21EFA4DC48FEF77BCEF89740F1041B6F688E6150E77592448B24
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID:
              • String ID: ANY)$ANYCRLF)$BSR_ANYCRLF)$BSR_UNICODE)$CR)$CRLF)$LF)$LIMIT_MATCH=$LIMIT_RECURSION=$NO_AUTO_POSSESS)$NO_START_OPT)$UCP)$UTF)$UTF16)
              • API String ID: 0-4052911093
              • Opcode ID: b8ff8fdd3bc3889d45c29cbf68e0c3b7f3914d511bacdb566d502db56bad3bc6
              • Instruction ID: 12103731988928a5edb3d025c426e92386c1826f6985a74ac0d05e7d980e7d96
              • Opcode Fuzzy Hash: b8ff8fdd3bc3889d45c29cbf68e0c3b7f3914d511bacdb566d502db56bad3bc6
              • Instruction Fuzzy Hash: 0F72B1B5E00219CBDB54CF59C8807EEB7F5FF48310F1481AAE985EB285E7759A81CB90
              APIs
              • GetKeyboardState.USER32(?), ref: 01060097
              • SetKeyboardState.USER32(?), ref: 01060102
              • GetAsyncKeyState.USER32(000000A0), ref: 01060122
              • GetKeyState.USER32(000000A0), ref: 01060139
              • GetAsyncKeyState.USER32(000000A1), ref: 01060168
              • GetKeyState.USER32(000000A1), ref: 01060179
              • GetAsyncKeyState.USER32(00000011), ref: 010601A5
              • GetKeyState.USER32(00000011), ref: 010601B3
              • GetAsyncKeyState.USER32(00000012), ref: 010601DC
              • GetKeyState.USER32(00000012), ref: 010601EA
              • GetAsyncKeyState.USER32(0000005B), ref: 01060213
              • GetKeyState.USER32(0000005B), ref: 01060221
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: State$Async$Keyboard
              • String ID:
              • API String ID: 541375521-0
              • Opcode ID: 0ed895b45e1af6a7d758d23c34f8094f4a90f4c47ef6e90b790eebc18092c7db
              • Instruction ID: e85794b0c61fa95e543640b97b7a7ea95c63433b771f3d6e1e60c39db6322a7c
              • Opcode Fuzzy Hash: 0ed895b45e1af6a7d758d23c34f8094f4a90f4c47ef6e90b790eebc18092c7db
              • Instruction Fuzzy Hash: D051093094478969FB75DBB888147EABFFC9F01280F0845DEE6C25A1C7DAA4978CC761
              APIs
                • Part of subcall function 01080E1A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0107FDAD,?,?), ref: 01080E31
              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 010804AC
                • Part of subcall function 01009837: __itow.LIBCMT ref: 01009862
                • Part of subcall function 01009837: __swprintf.LIBCMT ref: 010098AC
              • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 0108054B
              • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 010805E3
              • RegCloseKey.ADVAPI32(000000FE,000000FE,00000000,?,00000000), ref: 01080822
              • RegCloseKey.ADVAPI32(00000000), ref: 0108082F
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: CloseQueryValue$BuffCharConnectRegistryUpper__itow__swprintf
              • String ID:
              • API String ID: 1240663315-0
              • Opcode ID: 8a4f0966968944f1111c31a191b4ac138df2d1d86b0b9f13df6811d75130e07a
              • Instruction ID: 3a0243abcf1d76128ab8f0e9d05123bfc4cfedaad43c493bb08ca96a0b6e9b41
              • Opcode Fuzzy Hash: 8a4f0966968944f1111c31a191b4ac138df2d1d86b0b9f13df6811d75130e07a
              • Instruction Fuzzy Hash: 07E15D70608201AFDB15EF28C894D6ABBE4FF89714F04856DF8C9DB2A5DA31E905CB91
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: Clipboard$AllocCloseEmptyGlobalOpen
              • String ID:
              • API String ID: 1737998785-0
              • Opcode ID: 7e1bbbff8979c3bd5376f0a247d3d658b7955d846107e35709a892faa1a1fe44
              • Instruction ID: 19dbd19b1b850b66ffc9eaf18bc542efcdffd87463b030de6dbe2aa80c4bec89
              • Opcode Fuzzy Hash: 7e1bbbff8979c3bd5376f0a247d3d658b7955d846107e35709a892faa1a1fe44
              • Instruction Fuzzy Hash: E6219F75704212DFDB21AF74EC08B6E7BA8EF14714F108019F9C6DB2A5DB36A911CB58
              APIs
                • Part of subcall function 01004750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,01004743,?,?,010037AE,?), ref: 01004770
                • Part of subcall function 01064A31: GetFileAttributesW.KERNEL32(?,0106370B), ref: 01064A32
              • FindFirstFileW.KERNEL32(?,?), ref: 010638A3
              • DeleteFileW.KERNEL32(?,?,00000000,?,?,?,?), ref: 0106394B
              • MoveFileW.KERNEL32(?,?), ref: 0106395E
              • DeleteFileW.KERNEL32(?,?,?,?,?), ref: 0106397B
              • FindNextFileW.KERNEL32(00000000,00000010), ref: 0106399D
              • FindClose.KERNEL32(00000000,?,?,?,?), ref: 010639B9
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: File$Find$Delete$AttributesCloseFirstFullMoveNameNextPath
              • String ID: \*.*
              • API String ID: 4002782344-1173974218
              • Opcode ID: fae7e35ddb45217c5d6c4ffc36c12b8e58e85d8bae281809812873c6a4771073
              • Instruction ID: 638f08547ba161b448585e527ba92d07036dfe22af978bbf11244af2aafceb73
              • Opcode Fuzzy Hash: fae7e35ddb45217c5d6c4ffc36c12b8e58e85d8bae281809812873c6a4771073
              • Instruction Fuzzy Hash: A051843180114EAADF16EBA4D991DEDB7B8AF25204F6040A9D4C6BB1D0DF356F09CFA1
              APIs
                • Part of subcall function 01007DE1: _memmove.LIBCMT ref: 01007E22
              • FindFirstFileW.KERNEL32(?,?,*.*,?,?,00000000,00000000), ref: 0106F440
              • Sleep.KERNEL32(0000000A), ref: 0106F470
              • _wcscmp.LIBCMT ref: 0106F484
              • _wcscmp.LIBCMT ref: 0106F49F
              • FindNextFileW.KERNEL32(?,?), ref: 0106F53D
              • FindClose.KERNEL32(00000000), ref: 0106F553
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: Find$File_wcscmp$CloseFirstNextSleep_memmove
              • String ID: *.*
              • API String ID: 713712311-438819550
              • Opcode ID: 3bc46bee170562a381da098b5a52e84c665a2a03a167c94be89ddb1f3130039a
              • Instruction ID: 7b65520a2f10ac38d2fafd26055dbfe51d28b689618e25dcd657c40dc69ac1db
              • Opcode Fuzzy Hash: 3bc46bee170562a381da098b5a52e84c665a2a03a167c94be89ddb1f3130039a
              • Instruction Fuzzy Hash: 6C418E7180421BAFDF51EF68DC54AEEBBB8FF15310F14409AE995A6190EB319E84CF50
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: _memmove
              • String ID:
              • API String ID: 4104443479-0
              • Opcode ID: 1c5d6d70b2228553b1ef8db7757a7a27fc2e30ca9bac0a1a5b0cce67a448e110
              • Instruction ID: 8c3ff471d119004c9690a9d13036f31b7066b4580e6d78b49128e168eddc533a
              • Opcode Fuzzy Hash: 1c5d6d70b2228553b1ef8db7757a7a27fc2e30ca9bac0a1a5b0cce67a448e110
              • Instruction Fuzzy Hash: CF12C370A0020ADFDF54DFA5D981AEEB7F5FF48300F104569E885EB294EB3AA910CB51
              APIs
                • Part of subcall function 01004750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,01004743,?,?,010037AE,?), ref: 01004770
                • Part of subcall function 01064A31: GetFileAttributesW.KERNEL32(?,0106370B), ref: 01064A32
              • FindFirstFileW.KERNEL32(?,?), ref: 01063B89
              • DeleteFileW.KERNEL32(?,?,?,?), ref: 01063BD9
              • FindNextFileW.KERNEL32(00000000,00000010), ref: 01063BEA
              • FindClose.KERNEL32(00000000), ref: 01063C01
              • FindClose.KERNEL32(00000000), ref: 01063C0A
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
              • String ID: \*.*
              • API String ID: 2649000838-1173974218
              • Opcode ID: 1186bdc4ca0628032ae67d18c79ee4d4264496cb23d5f5bbbca17ea60b3ea63e
              • Instruction ID: 30e51c72728f3b02d93c83508dac1997d10b520d50508f4ef5d43ca6d89c391e
              • Opcode Fuzzy Hash: 1186bdc4ca0628032ae67d18c79ee4d4264496cb23d5f5bbbca17ea60b3ea63e
              • Instruction Fuzzy Hash: 03316F310083869BD202EF24D8908EFB7ECBEA5214F404D1DF5D9861D1EB25A909CB97
              APIs
                • Part of subcall function 010587E1: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0105882B
                • Part of subcall function 010587E1: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 01058858
                • Part of subcall function 010587E1: GetLastError.KERNEL32 ref: 01058865
              • ExitWindowsEx.USER32(?,00000000), ref: 010651F9
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
              • String ID: $@$SeShutdownPrivilege
              • API String ID: 2234035333-194228
              • Opcode ID: feb6d1a70145165510d17ebfc503c9f8e647b6f5e908f5660c48026667f888c1
              • Instruction ID: 3d098a8ceb2cf6735ce8f057108fd190db13723f3621f59b66ae75691ef980ba
              • Opcode Fuzzy Hash: feb6d1a70145165510d17ebfc503c9f8e647b6f5e908f5660c48026667f888c1
              • Instruction Fuzzy Hash: 2B01D4316952136AF7686278AC9AFBF769CAB062C0F100465FEC3E60C1D5555C008690
              APIs
              • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 010762DC
              • WSAGetLastError.WSOCK32(00000000), ref: 010762EB
              • bind.WSOCK32(00000000,?,00000010), ref: 01076307
              • listen.WSOCK32(00000000,00000005), ref: 01076316
              • WSAGetLastError.WSOCK32(00000000), ref: 01076330
              • closesocket.WSOCK32(00000000,00000000), ref: 01076344
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: ErrorLast$bindclosesocketlistensocket
              • String ID:
              • API String ID: 1279440585-0
              • Opcode ID: 1841a045e7b28336c1696f6b8daa1b0c2b59a1b249612dc9514b6de2800452ed
              • Instruction ID: 96a651d390d68487a10146505ee2cab00518bda43f334ecf8e2f09dd3d34d730
              • Opcode Fuzzy Hash: 1841a045e7b28336c1696f6b8daa1b0c2b59a1b249612dc9514b6de2800452ed
              • Instruction Fuzzy Hash: F521D275600601DFEB10EF68C844A6EBBE9EF44724F148158E9D6E73D1CB71AD01CB51
              APIs
                • Part of subcall function 01020DB6: std::exception::exception.LIBCMT ref: 01020DEC
                • Part of subcall function 01020DB6: __CxxThrowException@8.LIBCMT ref: 01020E01
              • _memmove.LIBCMT ref: 01050258
              • _memmove.LIBCMT ref: 0105036D
              • _memmove.LIBCMT ref: 01050414
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: _memmove$Exception@8Throwstd::exception::exception
              • String ID:
              • API String ID: 1300846289-0
              • Opcode ID: e6615cc178f4cc5035f7f53246a3bedc4d0fee701b245e0bf83766e1c7d2eb4b
              • Instruction ID: 0c4365e2917123af7c5e5eab9220f174c5588aa58fa555afb66ec25701b9a5ac
              • Opcode Fuzzy Hash: e6615cc178f4cc5035f7f53246a3bedc4d0fee701b245e0bf83766e1c7d2eb4b
              • Instruction Fuzzy Hash: D0029270A00206DBDF45DF68D981AAE7BF5FF84304F1480A9E886DB299EB35D950CB91
              APIs
                • Part of subcall function 01002612: GetWindowLongW.USER32(?,000000EB), ref: 01002623
              • DefDlgProcW.USER32(?,?,?,?,?), ref: 010019FA
              • GetSysColor.USER32(0000000F), ref: 01001A4E
              • SetBkColor.GDI32(?,00000000), ref: 01001A61
                • Part of subcall function 01001290: DefDlgProcW.USER32(?,00000020,?), ref: 010012D8
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: ColorProc$LongWindow
              • String ID:
              • API String ID: 3744519093-0
              • Opcode ID: 567f1a55ef28feb0687e7ac6f2a1e31971b252850d22784fc9a626974e501ace
              • Instruction ID: 4603ec378b5d8958278baf1083126b034230931f97c3129f02c37f236f2f1c77
              • Opcode Fuzzy Hash: 567f1a55ef28feb0687e7ac6f2a1e31971b252850d22784fc9a626974e501ace
              • Instruction Fuzzy Hash: 92A13671204945BEF67BAB6C9C48EBF39DCEB8B345F04025AF5C2D61C1CA35D98186B2
              APIs
                • Part of subcall function 01077D8B: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 01077DB6
              • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 0107679E
              • WSAGetLastError.WSOCK32(00000000), ref: 010767C7
              • bind.WSOCK32(00000000,?,00000010), ref: 01076800
              • WSAGetLastError.WSOCK32(00000000), ref: 0107680D
              • closesocket.WSOCK32(00000000,00000000), ref: 01076821
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: ErrorLast$bindclosesocketinet_addrsocket
              • String ID:
              • API String ID: 99427753-0
              • Opcode ID: b28df317ec171bba49ca5a1c8481e425d64bf0e8f988d45dd45b862512baf312
              • Instruction ID: 8e6fe4951e42933a74381a0ee76156dd13416431ceed7c6c8c48d910e87fc3e2
              • Opcode Fuzzy Hash: b28df317ec171bba49ca5a1c8481e425d64bf0e8f988d45dd45b862512baf312
              • Instruction Fuzzy Hash: BE411575A00611AFFB51BF248885FAE77E8EF14714F048159FACAAB3C2CA709E008791
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: Window$EnabledForegroundIconicVisibleZoomed
              • String ID:
              • API String ID: 292994002-0
              • Opcode ID: 81682dc465e1669cde64223f42ab283910b3e6703abfabb7c18ba6d0701508ca
              • Instruction ID: 92ff660a070de4890ef02b3e91b7beb5b4354e28458d71ac64c7b8cf1f7cffe1
              • Opcode Fuzzy Hash: 81682dc465e1669cde64223f42ab283910b3e6703abfabb7c18ba6d0701508ca
              • Instruction Fuzzy Hash: 8F110431308512AFEB227F3ADC44A6E7BD8FF44261F408028E9C5D3280CB74D90187A0
              APIs
              • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 01058121
              • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 0105812B
              • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 0105813A
              • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 01058141
              • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 01058157
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: HeapInformationToken$AllocErrorLastProcess
              • String ID:
              • API String ID: 44706859-0
              • Opcode ID: e8fd43a4baa793c9bc1636e9e7e42a21f8497842e87d84abf86e8afc2d33d43c
              • Instruction ID: c35667b2372697d0ab1f54855a01b7b1e9db538dc1843685e633c7ba226f266a
              • Opcode Fuzzy Hash: e8fd43a4baa793c9bc1636e9e7e42a21f8497842e87d84abf86e8afc2d33d43c
              • Instruction Fuzzy Hash: 6FF06271204305AFEBA11FBAEC88E6B3BACFF4A654B104056FDC5C6140EB669951DB60
              APIs
              • CoInitialize.OLE32(00000000), ref: 0106C432
              • CoCreateInstance.OLE32(01092D6C,00000000,00000001,01092BDC,?), ref: 0106C44A
                • Part of subcall function 01007DE1: _memmove.LIBCMT ref: 01007E22
              • CoUninitialize.OLE32 ref: 0106C6B7
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: CreateInitializeInstanceUninitialize_memmove
              • String ID: .lnk
              • API String ID: 2683427295-24824748
              • Opcode ID: 66c76e136a340482f30e31c264b55a842a703cc226324067aeb0be785d537795
              • Instruction ID: a9569ee13640a9f5c74a146db8d9d97d633e7664442a90e7446ed73809f8058a
              • Opcode Fuzzy Hash: 66c76e136a340482f30e31c264b55a842a703cc226324067aeb0be785d537795
              • Instruction Fuzzy Hash: 42A12CB1104206AFE701EF54C880EABB7ECFF95358F00491DF5999B191DB71EA49CB62
              APIs
              • LoadLibraryA.KERNEL32(kernel32.dll,?,01004AD0), ref: 01004B45
              • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 01004B57
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: AddressLibraryLoadProc
              • String ID: GetNativeSystemInfo$kernel32.dll
              • API String ID: 2574300362-192647395
              • Opcode ID: d98d808f9f49e0a103143c2392c652693a1160b82be5d08d7c8abc86c817e12a
              • Instruction ID: 2ec5156d0fbd11d04baf71e85cb21c124e8211b4d4438bb5d5f492847046568b
              • Opcode Fuzzy Hash: d98d808f9f49e0a103143c2392c652693a1160b82be5d08d7c8abc86c817e12a
              • Instruction Fuzzy Hash: 7FD01234A14B13CFEB21AF36D828B0676D4AF45651F11886D95C5D6140D678D480C758
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: __itow__swprintf
              • String ID:
              • API String ID: 674341424-0
              • Opcode ID: b2a85317a7918bde48ad64d802101a719f50fb1bdd04d0a9fdc1e123a005a32d
              • Instruction ID: a2ca04f9c95997042f198f1315a44bc4b5ba691deec79b2d687d343b12ce91e1
              • Opcode Fuzzy Hash: b2a85317a7918bde48ad64d802101a719f50fb1bdd04d0a9fdc1e123a005a32d
              • Instruction Fuzzy Hash: B722ACB16083028FD725DF14C880BAFB7E4BF95314F00492DE9DA9B291EB35E904CB92
              APIs
              • CreateToolhelp32Snapshot.KERNEL32 ref: 0107EE3D
              • Process32FirstW.KERNEL32(00000000,?), ref: 0107EE4B
                • Part of subcall function 01007DE1: _memmove.LIBCMT ref: 01007E22
              • Process32NextW.KERNEL32(00000000,?), ref: 0107EF0B
              • CloseHandle.KERNEL32(00000000,?,?,?), ref: 0107EF1A
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32_memmove
              • String ID:
              • API String ID: 2576544623-0
              • Opcode ID: f01f66b54f100191a8cfbcbda5a9f35c32695701606673d52b5b2593efdcf19e
              • Instruction ID: 91a398b1b970d79215feb42b1ac8f0e095fbe9396fdbff6fe34a7502d9b9c66d
              • Opcode Fuzzy Hash: f01f66b54f100191a8cfbcbda5a9f35c32695701606673d52b5b2593efdcf19e
              • Instruction Fuzzy Hash: E1516D71504302AFE721EF24DC80EABB7E8EF98714F50491DF5D5972A1EB70A904CB92
              APIs
              • lstrlenW.KERNEL32(?,?,?,00000000), ref: 0105E628
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: lstrlen
              • String ID: ($|
              • API String ID: 1659193697-1631851259
              • Opcode ID: c267c243f9231c6ec6a91996b1842d0e37238edfdd60a95274e94737b80dbe27
              • Instruction ID: b6e7504b6434aa2e98bf353f3c8af034f91d946e18a7bcd442d2933a1b615ff2
              • Opcode Fuzzy Hash: c267c243f9231c6ec6a91996b1842d0e37238edfdd60a95274e94737b80dbe27
              • Instruction Fuzzy Hash: 4B321675A007059FD768CF29C4809AAF7F1FF48310B15C5AEE99ADB3A1D770A941CB50
              APIs
              • InternetQueryDataAvailable.WININET(00000001,?,00000000,00000000,00000000,?,?,?,?,?,?,?,?,0107180A,00000000), ref: 010723E1
              • InternetReadFile.WININET(00000001,00000000,00000001,00000001), ref: 01072418
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: Internet$AvailableDataFileQueryRead
              • String ID:
              • API String ID: 599397726-0
              • Opcode ID: 7eb2ed3eabcf2a8267e4f8c6202f3fac749f9c7dabe5628ef60f5c5d099ed979
              • Instruction ID: 9e81ffa9e9e55f45b0f80d47e2b9aa4a9184c301d55b5a6465232c8e43a2eba8
              • Opcode Fuzzy Hash: 7eb2ed3eabcf2a8267e4f8c6202f3fac749f9c7dabe5628ef60f5c5d099ed979
              • Instruction Fuzzy Hash: 80419471D0420ABFEB20DE99DD84FBFB7FCEB40614F10806AF6C5A6141DB719E419658
              APIs
              • SetErrorMode.KERNEL32(00000001), ref: 0106B343
              • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 0106B39D
              • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 0106B3EA
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: ErrorMode$DiskFreeSpace
              • String ID:
              • API String ID: 1682464887-0
              • Opcode ID: 56de3470552a6b9182ca8ca4165678f98ed23e202e992363eb347b400e3b3aef
              • Instruction ID: 4f18475003fe1282c8c8142cfccd2266118737ec91cc6b07ceda78dfa43fa563
              • Opcode Fuzzy Hash: 56de3470552a6b9182ca8ca4165678f98ed23e202e992363eb347b400e3b3aef
              • Instruction Fuzzy Hash: 52217175A00119EFDF00EFA5D880AEEBBB8FF49314F048099E985EB355CB319915CB50
              APIs
                • Part of subcall function 01020DB6: std::exception::exception.LIBCMT ref: 01020DEC
                • Part of subcall function 01020DB6: __CxxThrowException@8.LIBCMT ref: 01020E01
              • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0105882B
              • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 01058858
              • GetLastError.KERNEL32 ref: 01058865
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: AdjustErrorException@8LastLookupPrivilegePrivilegesThrowTokenValuestd::exception::exception
              • String ID:
              • API String ID: 1922334811-0
              • Opcode ID: d613b841334b74cb79995d068a69c29bfdfe460b894b7889b53da6f0682f7ad5
              • Instruction ID: 2ca9ac512d50d4ca52cd60cab0bf796c2dd8e2eff96fe2de752b3d196bccd4f6
              • Opcode Fuzzy Hash: d613b841334b74cb79995d068a69c29bfdfe460b894b7889b53da6f0682f7ad5
              • Instruction Fuzzy Hash: EB116DB2414306AFE728DF64EC85D7BB7E8EB44714B20C52EF89597240EA31A8418B60
              APIs
              • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 01058774
              • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 0105878B
              • FreeSid.ADVAPI32(?), ref: 0105879B
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: AllocateCheckFreeInitializeMembershipToken
              • String ID:
              • API String ID: 3429775523-0
              • Opcode ID: 50583930b8ab16c8922e0f997d47ef57257fefc8ff5cab643db2427f32d0bf50
              • Instruction ID: fe691002162dbb85097bd7ba1eb5681af57af4c52c4e24cde6dba9527ddbdb5d
              • Opcode Fuzzy Hash: 50583930b8ab16c8922e0f997d47ef57257fefc8ff5cab643db2427f32d0bf50
              • Instruction Fuzzy Hash: DAF04975A1130DBFDF04DFF4DC89AAEBBBCEF08201F1044A9AA41E2180E7756A148B50
              APIs
              • FindFirstFileW.KERNEL32(?,?), ref: 0106C6FB
              • FindClose.KERNEL32(00000000), ref: 0106C72B
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: Find$CloseFileFirst
              • String ID:
              • API String ID: 2295610775-0
              • Opcode ID: b0a0c40f0cb84cc4884ab25a42c5a441aa55ab88bcc056fdf043ae7d5e0ce177
              • Instruction ID: c40df29210e8a5a4d11f471a6dc986ba5def449a25f6e300bfbcf856ef4bbe8d
              • Opcode Fuzzy Hash: b0a0c40f0cb84cc4884ab25a42c5a441aa55ab88bcc056fdf043ae7d5e0ce177
              • Instruction Fuzzy Hash: B1118B726006019FEB10EF29C884A6AF7E8FF94224F00851EE8E9C7390DB34A901CB91
              APIs
              • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,00000016,?,01079468,?,0108FB84,?), ref: 0106A097
              • FormatMessageW.KERNEL32(00001000,00000000,000000FF,00000000,?,00000FFF,00000000,00000016,?,01079468,?,0108FB84,?), ref: 0106A0A9
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: ErrorFormatLastMessage
              • String ID:
              • API String ID: 3479602957-0
              • Opcode ID: eb102bee65344556431a16071d7dd1360264d59664b0982b591c222de353f00f
              • Instruction ID: 62e9fa3a426089c1cc4af87dfe364234d120f73f629fb0d1b0373a87cfbfce1a
              • Opcode Fuzzy Hash: eb102bee65344556431a16071d7dd1360264d59664b0982b591c222de353f00f
              • Instruction Fuzzy Hash: 62F0823520522EABEB21AEA4CC48FEE776CBF08361F008156F989D7181DA309540CBA1
              APIs
              • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,01058309), ref: 010581E0
              • CloseHandle.KERNEL32(?,?,01058309), ref: 010581F2
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: AdjustCloseHandlePrivilegesToken
              • String ID:
              • API String ID: 81990902-0
              • Opcode ID: 13ca8194d3da42d4fda1bfbc552faaa34ac2b09e19a5ba300acf435af4152daa
              • Instruction ID: 65c93f217371b51198a39f1bc7f9627881864ab153de95bebc098487bc51ba09
              • Opcode Fuzzy Hash: 13ca8194d3da42d4fda1bfbc552faaa34ac2b09e19a5ba300acf435af4152daa
              • Instruction Fuzzy Hash: 85E0B672014622AEEB652B75EC08DB77BEEEB042107248869FDE684474DB62AC91DB10
              APIs
              • SetUnhandledExceptionFilter.KERNEL32(00000000,?,01028D57,?,?,?,00000001), ref: 0102A15A
              • UnhandledExceptionFilter.KERNEL32(?,?,?,00000001), ref: 0102A163
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: ExceptionFilterUnhandled
              • String ID:
              • API String ID: 3192549508-0
              • Opcode ID: 430b28e024bb28d6273ec9c4568826ccbddfd510f099e8694233084be98b3ab8
              • Instruction ID: 5107e8936739212285fcf3ad3f66ec3fe70b449ebb5517456af7c771c771ef31
              • Opcode Fuzzy Hash: 430b28e024bb28d6273ec9c4568826ccbddfd510f099e8694233084be98b3ab8
              • Instruction Fuzzy Hash: 9AB0923125830AABCA102BA1E809B8C3F68EB46AA2F408010F68D84054CBE754508B91
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 33579b19d75b9344b021902bce7c72e552e2f3b9d41b669e03bc6f1056d30850
              • Instruction ID: e828c891a21bd30896a9f66c9e4e8e40f18809eb9a5338e37c22f8d6f25c0b64
              • Opcode Fuzzy Hash: 33579b19d75b9344b021902bce7c72e552e2f3b9d41b669e03bc6f1056d30850
              • Instruction Fuzzy Hash: 1D321532D29F124DD7739538D832335A698BFB73D4F15D727E899B59AAEB29C0834200
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 14b130d03247ed8b5ca619321063dc3d1e5145484334f9296c92edf1e11dc29a
              • Instruction ID: e514a8e27da57b2e7921f2ba12123dc6f4b33f41e9806b27e0ed3368c0bd92b8
              • Opcode Fuzzy Hash: 14b130d03247ed8b5ca619321063dc3d1e5145484334f9296c92edf1e11dc29a
              • Instruction Fuzzy Hash: F0B1EF30E2AF418DD62396398831336BA5CBFFB2C5B51D71BFCA675D16EB2685834240
              APIs
              • __time64.LIBCMT ref: 0106889B
                • Part of subcall function 0102520A: GetSystemTimeAsFileTime.KERNEL32(00000000,?,?,?,01068F6E,00000000,?,?,?,?,0106911F,00000000,?), ref: 01025213
                • Part of subcall function 0102520A: __aulldiv.LIBCMT ref: 01025233
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: Time$FileSystem__aulldiv__time64
              • String ID:
              • API String ID: 2893107130-0
              • Opcode ID: 8a6ed2efe6cc83f7c3cb032f34428ff40ddb50f50f0b47e961b2825e08e732a6
              • Instruction ID: cc972cacaf4bfb636c14eb32bbcc09cc78557b053d1e93b4d174dbe2a21f2537
              • Opcode Fuzzy Hash: 8a6ed2efe6cc83f7c3cb032f34428ff40ddb50f50f0b47e961b2825e08e732a6
              • Instruction Fuzzy Hash: EF21AF326356108FC729CF29D440A92B3E5EBA5311F288E6DD1F5CB2C0CA36A905CF54
              APIs
              • mouse_event.USER32(00000002,00000000,00000000,00000000,00000000), ref: 01064C4A
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: mouse_event
              • String ID:
              • API String ID: 2434400541-0
              • Opcode ID: df6fb8c3d702005b36031dc1c1b7f81e2daec71a0acc7feccafb50c07ab97ff1
              • Instruction ID: 1837cf0e39ec5111d2927c867a0b082137e5848fa7c001f8aff8a122dca95ffb
              • Opcode Fuzzy Hash: df6fb8c3d702005b36031dc1c1b7f81e2daec71a0acc7feccafb50c07ab97ff1
              • Instruction Fuzzy Hash: AFD05EA116421E78FCEC0B249E2FFBE15CCE3006A2FC0918973C1CA2C9ECC058404130
              APIs
              • LogonUserW.ADVAPI32(?,00000001,?,?,00000000,01058389), ref: 010587D1
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: LogonUser
              • String ID:
              • API String ID: 1244722697-0
              • Opcode ID: 02993bd5e69a28f475d8a149a085573820e9c0e828c8c0f3dea4c164c8016180
              • Instruction ID: 36054ebc79a4039de2904233852a49155da0c315f68a5c5db48a9d970066ebae
              • Opcode Fuzzy Hash: 02993bd5e69a28f475d8a149a085573820e9c0e828c8c0f3dea4c164c8016180
              • Instruction Fuzzy Hash: 2CD05E3226450EAFEF018EA4DC01EAE3B69EB04B01F408111FE15D5090C776D835AF60
              APIs
              • SetUnhandledExceptionFilter.KERNEL32(?), ref: 0102A12A
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: ExceptionFilterUnhandled
              • String ID:
              • API String ID: 3192549508-0
              • Opcode ID: 4a1ce117729e2ae14e425d9e293afabe7459a577003c6c55e908459c9e811e86
              • Instruction ID: 55025f9815af33771e176173192d4413d94895774797daeb13b3c88ef2db0ce0
              • Opcode Fuzzy Hash: 4a1ce117729e2ae14e425d9e293afabe7459a577003c6c55e908459c9e811e86
              • Instruction Fuzzy Hash: 3BA0123000410DA78A001A51E8044487F5CD6011907008010F44C80011C7B354104680
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: df3c1f3ab018f1b86fa71c5795af8103d4fd93c1dd948bdf8e4e020c3d7455f7
              • Instruction ID: e771a66e24440ca4984f14b41b1f8e7aeab54d52dcd9af90b6e6964f8d376c13
              • Opcode Fuzzy Hash: df3c1f3ab018f1b86fa71c5795af8103d4fd93c1dd948bdf8e4e020c3d7455f7
              • Instruction Fuzzy Hash: 8C221831904106CBEFB98A5CC8946BD7BE1FB01344F58C0ABEBC6CB59AD7789A91C741
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
              • Instruction ID: 72d1efcdff19519abb30f75769ad079778fdc2e84bd633c1882c27f081515fdd
              • Opcode Fuzzy Hash: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
              • Instruction Fuzzy Hash: 7BC192322051B34AEBAE567D843403EFEE15E926B131B47ADD8F3CB1D5EE20D169D620
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
              • Instruction ID: e7b38bb6d821be94a47db050bb10981737393667d7f6a2a547fb430b90f2c4e1
              • Opcode Fuzzy Hash: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
              • Instruction Fuzzy Hash: 54C164322091B34AEFAE567D843413EBEE15E926B131B07EDE4F2DB1D5EE20C525D620
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
              • Instruction ID: acbfe60ab08baee29b180d8475f81c6f32951e63c6101e7d731567b4113bc7e7
              • Opcode Fuzzy Hash: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
              • Instruction Fuzzy Hash: B2C160362051B349EFAE663D847413EBEE15E926B131B07ADD4F2CB1D5EE30C165C660
              APIs
              • DeleteObject.GDI32(00000000), ref: 0107785B
              • DeleteObject.GDI32(00000000), ref: 0107786D
              • DestroyWindow.USER32 ref: 0107787B
              • GetDesktopWindow.USER32 ref: 01077895
              • GetWindowRect.USER32(00000000), ref: 0107789C
              • SetRect.USER32(?,00000000,00000000,000001F4,00000190), ref: 010779DD
              • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000002), ref: 010779ED
              • CreateWindowExW.USER32(00000002,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 01077A35
              • GetClientRect.USER32(00000000,?), ref: 01077A41
              • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 01077A7B
              • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 01077A9D
              • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 01077AB0
              • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 01077ABB
              • GlobalLock.KERNEL32(00000000), ref: 01077AC4
              • ReadFile.KERNEL32(00000000,00000000,00000000,00000190,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 01077AD3
              • GlobalUnlock.KERNEL32(00000000), ref: 01077ADC
              • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 01077AE3
              • GlobalFree.KERNEL32(00000000), ref: 01077AEE
              • CreateStreamOnHGlobal.OLE32(00000000,00000001,88C00000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 01077B00
              • OleLoadPicture.OLEAUT32(88C00000,00000000,00000000,01092CAC,00000000), ref: 01077B16
              • GlobalFree.KERNEL32(00000000), ref: 01077B26
              • CopyImage.USER32(000001F4,00000000,00000000,00000000,00002000), ref: 01077B4C
              • SendMessageW.USER32(?,00000172,00000000,000001F4), ref: 01077B6B
              • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 01077B8D
              • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 01077D7A
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
              • String ID: $@U=u$AutoIt v3$DISPLAY$static
              • API String ID: 2211948467-3613752883
              • Opcode ID: 1b68d30db18e4bc3fb88c53ebc5b75ae2184365ab58ff75d425fd47a2f3cdb8f
              • Instruction ID: be8cbc564312c19af1316e7cb83f2ed35c85112110a82ee99a47324cc90cf4a4
              • Opcode Fuzzy Hash: 1b68d30db18e4bc3fb88c53ebc5b75ae2184365ab58ff75d425fd47a2f3cdb8f
              • Instruction Fuzzy Hash: 0B027E71A00116EFDB24DFA8CD88EAE7BB9FF49354F148158F985AB291C735AD01CB60
              APIs
              • SetTextColor.GDI32(?,00000000), ref: 0108A630
              • GetSysColorBrush.USER32(0000000F), ref: 0108A661
              • GetSysColor.USER32(0000000F), ref: 0108A66D
              • SetBkColor.GDI32(?,000000FF), ref: 0108A687
              • SelectObject.GDI32(?,00000000), ref: 0108A696
              • InflateRect.USER32(?,000000FF,000000FF), ref: 0108A6C1
              • GetSysColor.USER32(00000010), ref: 0108A6C9
              • CreateSolidBrush.GDI32(00000000), ref: 0108A6D0
              • FrameRect.USER32(?,?,00000000), ref: 0108A6DF
              • DeleteObject.GDI32(00000000), ref: 0108A6E6
              • InflateRect.USER32(?,000000FE,000000FE), ref: 0108A731
              • FillRect.USER32(?,?,00000000), ref: 0108A763
              • GetWindowLongW.USER32(?,000000F0), ref: 0108A78E
                • Part of subcall function 0108A8CA: GetSysColor.USER32(00000012), ref: 0108A903
                • Part of subcall function 0108A8CA: SetTextColor.GDI32(?,?), ref: 0108A907
                • Part of subcall function 0108A8CA: GetSysColorBrush.USER32(0000000F), ref: 0108A91D
                • Part of subcall function 0108A8CA: GetSysColor.USER32(0000000F), ref: 0108A928
                • Part of subcall function 0108A8CA: GetSysColor.USER32(00000011), ref: 0108A945
                • Part of subcall function 0108A8CA: CreatePen.GDI32(00000000,00000001,00743C00), ref: 0108A953
                • Part of subcall function 0108A8CA: SelectObject.GDI32(?,00000000), ref: 0108A964
                • Part of subcall function 0108A8CA: SetBkColor.GDI32(?,00000000), ref: 0108A96D
                • Part of subcall function 0108A8CA: SelectObject.GDI32(?,?), ref: 0108A97A
                • Part of subcall function 0108A8CA: InflateRect.USER32(?,000000FF,000000FF), ref: 0108A999
                • Part of subcall function 0108A8CA: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 0108A9B0
                • Part of subcall function 0108A8CA: GetWindowLongW.USER32(00000000,000000F0), ref: 0108A9C5
                • Part of subcall function 0108A8CA: SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 0108A9ED
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameMessageRoundSendSolid
              • String ID: @U=u
              • API String ID: 3521893082-2594219639
              • Opcode ID: 122867ff7da549e9ca4994b613e61bd5c6d10dd4d8d2df13f63baeed74991132
              • Instruction ID: 1b3fb790df38019188bb2ec7f8754d6de6f3013e0892513edb2bea117a0d7a5f
              • Opcode Fuzzy Hash: 122867ff7da549e9ca4994b613e61bd5c6d10dd4d8d2df13f63baeed74991132
              • Instruction Fuzzy Hash: DA917C7150C302EFDB21AF64DC08A5F7BA9FB89321F100B1AF6E296194D736D945CB61
              APIs
              • CharUpperBuffW.USER32(?,?,0108F910), ref: 01083627
              • IsWindowVisible.USER32(?), ref: 0108364B
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: BuffCharUpperVisibleWindow
              • String ID: @U=u$ADDSTRING$CHECK$CURRENTTAB$DELSTRING$EDITPASTE$FINDSTRING$GETCURRENTCOL$GETCURRENTLINE$GETCURRENTSELECTION$GETLINE$GETLINECOUNT$GETSELECTED$HIDEDROPDOWN$ISCHECKED$ISENABLED$ISVISIBLE$SELECTSTRING$SENDCOMMANDID$SETCURRENTSELECTION$SHOWDROPDOWN$TABLEFT$TABRIGHT$UNCHECK
              • API String ID: 4105515805-3469695742
              • Opcode ID: e874e34c25613a5cf3ff2f4c87397efe5d82be41b712fe9b471d33370615c92a
              • Instruction ID: 25cfb3cac203e7b1bae487e9c20c349d9f2a462dfd2810f4758ce872cf05250c
              • Opcode Fuzzy Hash: e874e34c25613a5cf3ff2f4c87397efe5d82be41b712fe9b471d33370615c92a
              • Instruction Fuzzy Hash: 0AD17F70208302DBDB04FF14C494AAEBBE5BFA5658F448558EDC65F3A2DB31E90ACB51
              APIs
              • DestroyWindow.USER32(?,?,?), ref: 01002CA2
              • DeleteObject.GDI32(00000000), ref: 01002CE8
              • DeleteObject.GDI32(00000000), ref: 01002CF3
              • DestroyIcon.USER32(00000000,?,?,?), ref: 01002CFE
              • DestroyWindow.USER32(00000000,?,?,?), ref: 01002D09
              • SendMessageW.USER32(?,00001308,?,00000000), ref: 0103C43B
              • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 0103C474
              • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 0103C89D
                • Part of subcall function 01001B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,01002036,?,00000000,?,?,?,?,010016CB,00000000,?), ref: 01001B9A
              • SendMessageW.USER32(?,00001053), ref: 0103C8DA
              • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 0103C8F1
              • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 0103C907
              • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 0103C912
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: Destroy$ImageList_MessageSendWindow$DeleteObject$IconInvalidateMoveRectRemove
              • String ID: 0$@U=u
              • API String ID: 464785882-975001249
              • Opcode ID: ece6e6f34b7a48f472ac8d128d98d7adde9c4e30e92233555078729f41ea180c
              • Instruction ID: 47a87858a53f975c93a0681e2af288d57ae21b0092ccfc58ab03fe491ff0a7b9
              • Opcode Fuzzy Hash: ece6e6f34b7a48f472ac8d128d98d7adde9c4e30e92233555078729f41ea180c
              • Instruction Fuzzy Hash: A712C330604206DFFB62CF28C588BA97BE9FF85314F5445AAE9D5DB292C731E841CB51
              APIs
              • DestroyWindow.USER32(00000000), ref: 010774DE
              • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 0107759D
              • SetRect.USER32(?,00000000,00000000,0000012C,00000064), ref: 010775DB
              • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000006), ref: 010775ED
              • CreateWindowExW.USER32(00000006,AutoIt v3,?,88C00000,?,?,?,?,00000000,00000000,00000000), ref: 01077633
              • GetClientRect.USER32(00000000,?), ref: 0107763F
              • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000), ref: 01077683
              • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 01077692
              • GetStockObject.GDI32(00000011), ref: 010776A2
              • SelectObject.GDI32(00000000,00000000), ref: 010776A6
              • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?), ref: 010776B6
              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 010776BF
              • DeleteDC.GDI32(00000000), ref: 010776C8
              • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 010776F4
              • SendMessageW.USER32(00000030,00000000,00000001), ref: 0107770B
              • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,0000001E,00000104,00000014,00000000,00000000,00000000), ref: 01077746
              • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 0107775A
              • SendMessageW.USER32(00000404,00000001,00000000), ref: 0107776B
              • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000037,00000500,00000032,00000000,00000000,00000000), ref: 0107779B
              • GetStockObject.GDI32(00000011), ref: 010777A6
              • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 010777B1
              • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?,?,?,?), ref: 010777BB
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
              • String ID: @U=u$AutoIt v3$DISPLAY$msctls_progress32$static
              • API String ID: 2910397461-2771358697
              • Opcode ID: 86104edd63d30b9f0ebd26f10e26e8b9d67dc71d518ef15775946970130f55ae
              • Instruction ID: a74f597dd9c100cf64c1ebebc7bd0aaf1d6d6020e89a87fbf5198aa9e2b5529f
              • Opcode Fuzzy Hash: 86104edd63d30b9f0ebd26f10e26e8b9d67dc71d518ef15775946970130f55ae
              • Instruction Fuzzy Hash: A6A150B1A40215BFEB24DBA4DC49FAE7BA9EB09714F008114FA95E72D0C775AD00CF64
              APIs
              • GetSysColor.USER32(00000012), ref: 0108A903
              • SetTextColor.GDI32(?,?), ref: 0108A907
              • GetSysColorBrush.USER32(0000000F), ref: 0108A91D
              • GetSysColor.USER32(0000000F), ref: 0108A928
              • CreateSolidBrush.GDI32(?), ref: 0108A92D
              • GetSysColor.USER32(00000011), ref: 0108A945
              • CreatePen.GDI32(00000000,00000001,00743C00), ref: 0108A953
              • SelectObject.GDI32(?,00000000), ref: 0108A964
              • SetBkColor.GDI32(?,00000000), ref: 0108A96D
              • SelectObject.GDI32(?,?), ref: 0108A97A
              • InflateRect.USER32(?,000000FF,000000FF), ref: 0108A999
              • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 0108A9B0
              • GetWindowLongW.USER32(00000000,000000F0), ref: 0108A9C5
              • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 0108A9ED
              • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 0108AA14
              • InflateRect.USER32(?,000000FD,000000FD), ref: 0108AA32
              • DrawFocusRect.USER32(?,?), ref: 0108AA3D
              • GetSysColor.USER32(00000011), ref: 0108AA4B
              • SetTextColor.GDI32(?,00000000), ref: 0108AA53
              • DrawTextW.USER32(?,00000000,000000FF,?,?), ref: 0108AA67
              • SelectObject.GDI32(?,0108A5FA), ref: 0108AA7E
              • DeleteObject.GDI32(?), ref: 0108AA89
              • SelectObject.GDI32(?,?), ref: 0108AA8F
              • DeleteObject.GDI32(?), ref: 0108AA94
              • SetTextColor.GDI32(?,?), ref: 0108AA9A
              • SetBkColor.GDI32(?,?), ref: 0108AAA4
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
              • String ID: @U=u
              • API String ID: 1996641542-2594219639
              • Opcode ID: 37d099dce45bbdc1bc0e20e20cb8602b22c8826c61530b3cdaf5ed6d0c5dbbea
              • Instruction ID: d8f1925691d5b591af23833477512395990b25e84db66fc4dc86526e3e51e8e9
              • Opcode Fuzzy Hash: 37d099dce45bbdc1bc0e20e20cb8602b22c8826c61530b3cdaf5ed6d0c5dbbea
              • Instruction Fuzzy Hash: 35515E71904209FFDF11AFB4DC48EAE7BB9EB08320F114215FA91AB295D7759940CF50
              APIs
              • SetErrorMode.KERNEL32(00000001), ref: 0106AD1E
              • GetDriveTypeW.KERNEL32(?,0108FAC0,?,\\.\,0108F910), ref: 0106ADFB
              • SetErrorMode.KERNEL32(00000000,0108FAC0,?,\\.\,0108F910), ref: 0106AF59
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: ErrorMode$DriveType
              • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
              • API String ID: 2907320926-4222207086
              • Opcode ID: 85f52130fbe3afc1862da31866e1aaa2da861eeb0c1f54cae3662863bed14ab6
              • Instruction ID: c76ad7a53da083032dd58e08404a9c24dd5b9cada5362bf226886f3329063dcc
              • Opcode Fuzzy Hash: 85f52130fbe3afc1862da31866e1aaa2da861eeb0c1f54cae3662863bed14ab6
              • Instruction Fuzzy Hash: 7C51B3B0744206EB9B50FBA5C9D1DFDB7ECEF19604B10805AE4C7BB2E1D6319A41CB52
              APIs
              • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000103,?,?,?), ref: 01089AD2
              • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 01089B8B
              • SendMessageW.USER32(?,00001102,00000002,?), ref: 01089BA7
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: MessageSend$Window
              • String ID: 0$@U=u
              • API String ID: 2326795674-975001249
              • Opcode ID: fbf141fdd3994c914e4d3bdee7ac7fbe24376cf40a21d233efb10cdcc1ad0b9d
              • Instruction ID: 45b37017355aa3aa332d47dec7a38ce9451890fa40c33ac3dbe60f611a939f9b
              • Opcode Fuzzy Hash: fbf141fdd3994c914e4d3bdee7ac7fbe24376cf40a21d233efb10cdcc1ad0b9d
              • Instruction Fuzzy Hash: 8D02BE3020C201AFE765AF28C848BBABFE5FF89318F04465DF6D5962A1C775D854CB51
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: __wcsnicmp
              • String ID: #OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
              • API String ID: 1038674560-86951937
              • Opcode ID: d00ea8ddae0801a533192582faf621b74bccff79b6368188a6b864f9953a923b
              • Instruction ID: e0fb3f7c3aa5b8898157e1da5dfb080bc869daf659cd77acf66eeff95c52f0cd
              • Opcode Fuzzy Hash: d00ea8ddae0801a533192582faf621b74bccff79b6368188a6b864f9953a923b
              • Instruction Fuzzy Hash: 48813670200217BAEF22BA65DC41FEE37ADBF15600F044029FAC19E0D5EB62D955C6A1
              APIs
              • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 01088AC1
              • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 01088AD2
              • CharNextW.USER32(0000014E), ref: 01088B01
              • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 01088B42
              • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 01088B58
              • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 01088B69
              • SendMessageW.USER32(?,000000C2,00000001,0000014E), ref: 01088B86
              • SetWindowTextW.USER32(?,0000014E), ref: 01088BD8
              • SendMessageW.USER32(?,000000B1,000F4240,000F423F), ref: 01088BEE
              • SendMessageW.USER32(?,00001002,00000000,?), ref: 01088C1F
              • _memset.LIBCMT ref: 01088C44
              • SendMessageW.USER32(00000000,00001060,00000001,00000004), ref: 01088C8D
              • _memset.LIBCMT ref: 01088CEC
              • SendMessageW.USER32(?,00001053,000000FF,?), ref: 01088D16
              • SendMessageW.USER32(?,00001074,?,00000001), ref: 01088D6E
              • SendMessageW.USER32(?,0000133D,?,?), ref: 01088E1B
              • InvalidateRect.USER32(?,00000000,00000001), ref: 01088E3D
              • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 01088E87
              • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 01088EB4
              • DrawMenuBar.USER32(?), ref: 01088EC3
              • SetWindowTextW.USER32(?,0000014E), ref: 01088EEB
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: MessageSend$Menu$InfoItemTextWindow_memset$CharDrawInvalidateNextRect
              • String ID: 0$@U=u
              • API String ID: 1073566785-975001249
              • Opcode ID: d5dbc64d544a7fef64d1ee3a943626d7d20aadbbfdefda492424c5fa53dc903f
              • Instruction ID: 20679d69adc95bfdbe89a62c8826ae6ad4ef97169fb964a0cf9d4d83a8003857
              • Opcode Fuzzy Hash: d5dbc64d544a7fef64d1ee3a943626d7d20aadbbfdefda492424c5fa53dc903f
              • Instruction Fuzzy Hash: ADE18274908219AFEF20AF64CC84EEE7BB9FF09710F408196FAD5AA191D7759580CF60
              APIs
              • GetCursorPos.USER32(?), ref: 010849CA
              • GetDesktopWindow.USER32 ref: 010849DF
              • GetWindowRect.USER32(00000000), ref: 010849E6
              • GetWindowLongW.USER32(?,000000F0), ref: 01084A48
              • DestroyWindow.USER32(?), ref: 01084A74
              • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 01084A9D
              • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 01084ABB
              • SendMessageW.USER32(?,00000439,00000000,00000030), ref: 01084AE1
              • SendMessageW.USER32(?,00000421,?,?), ref: 01084AF6
              • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 01084B09
              • IsWindowVisible.USER32(?), ref: 01084B29
              • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 01084B44
              • SendMessageW.USER32(?,00000411,00000001,00000030), ref: 01084B58
              • GetWindowRect.USER32(?,?), ref: 01084B70
              • MonitorFromPoint.USER32(?,?,00000002), ref: 01084B96
              • GetMonitorInfoW.USER32(00000000,?), ref: 01084BB0
              • CopyRect.USER32(?,?), ref: 01084BC7
              • SendMessageW.USER32(?,00000412,00000000), ref: 01084C32
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
              • String ID: ($0$tooltips_class32
              • API String ID: 698492251-4156429822
              • Opcode ID: 932983ba963a5e6c83f67a46399a8870e67147e81ca26ce43aca93c48ed6ab62
              • Instruction ID: 7b5b47c4417cdce99b1378ec375c162fbd1a8ce23e007ff15e838f237ae3165f
              • Opcode Fuzzy Hash: 932983ba963a5e6c83f67a46399a8870e67147e81ca26ce43aca93c48ed6ab62
              • Instruction Fuzzy Hash: E1B18A70608342AFDB54EF68C844B6EBBE4BF88314F008A1CF5D99B291D771E905CB55
              APIs
              • GetFileVersionInfoSizeW.VERSION(?,?), ref: 010644AC
              • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 010644D2
              • _wcscpy.LIBCMT ref: 01064500
              • _wcscmp.LIBCMT ref: 0106450B
              • _wcscat.LIBCMT ref: 01064521
              • _wcsstr.LIBCMT ref: 0106452C
              • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 01064548
              • _wcscat.LIBCMT ref: 01064591
              • _wcscat.LIBCMT ref: 01064598
              • _wcsncpy.LIBCMT ref: 010645C3
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: _wcscat$FileInfoVersion$QuerySizeValue_wcscmp_wcscpy_wcsncpy_wcsstr
              • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
              • API String ID: 699586101-1459072770
              • Opcode ID: e475b1ec5d57f56aebe774860ef56a3424188fd294972fe081484e6b5cf54978
              • Instruction ID: 33999a544be52bd166546edaf72f2f77b98cd409e2178183a314e021035cc70d
              • Opcode Fuzzy Hash: e475b1ec5d57f56aebe774860ef56a3424188fd294972fe081484e6b5cf54978
              • Instruction Fuzzy Hash: 9D412971A003227BEB11FA75CC46EFF77ACEF55710F00405AF9C4EA181EB359A0186A6
              APIs
              • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 010028BC
              • GetSystemMetrics.USER32(00000007), ref: 010028C4
              • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 010028EF
              • GetSystemMetrics.USER32(00000008), ref: 010028F7
              • GetSystemMetrics.USER32(00000004), ref: 0100291C
              • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 01002939
              • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 01002949
              • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 0100297C
              • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 01002990
              • GetClientRect.USER32(00000000,000000FF), ref: 010029AE
              • GetStockObject.GDI32(00000011), ref: 010029CA
              • SendMessageW.USER32(00000000,00000030,00000000), ref: 010029D5
                • Part of subcall function 01002344: GetCursorPos.USER32(?), ref: 01002357
                • Part of subcall function 01002344: ScreenToClient.USER32(010C57B0,?), ref: 01002374
                • Part of subcall function 01002344: GetAsyncKeyState.USER32(00000001), ref: 01002399
                • Part of subcall function 01002344: GetAsyncKeyState.USER32(00000002), ref: 010023A7
              • SetTimer.USER32(00000000,00000000,00000028,01001256), ref: 010029FC
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
              • String ID: @U=u$AutoIt v3 GUI
              • API String ID: 1458621304-2077007950
              • Opcode ID: 99473d645444a5b1f512e0f960f6db6a44e0df5b38d3622d361c82dae7c75f0e
              • Instruction ID: f512e7f707b18589bd6b9294b12c8c2335afa77facae1644f791083c77dee1a7
              • Opcode Fuzzy Hash: 99473d645444a5b1f512e0f960f6db6a44e0df5b38d3622d361c82dae7c75f0e
              • Instruction Fuzzy Hash: 8CB19E7460020AEFEB25DFA8D949BAE7BB4FB48314F104219FA95E72D4CB75A850CF50
              APIs
              • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,00000000,?), ref: 0108BA56
              • GetFileSize.KERNEL32(00000000,00000000), ref: 0108BA6D
              • GlobalAlloc.KERNEL32(00000002,00000000), ref: 0108BA78
              • CloseHandle.KERNEL32(00000000), ref: 0108BA85
              • GlobalLock.KERNEL32(00000000), ref: 0108BA8E
              • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 0108BA9D
              • GlobalUnlock.KERNEL32(00000000), ref: 0108BAA6
              • CloseHandle.KERNEL32(00000000), ref: 0108BAAD
              • CreateStreamOnHGlobal.OLE32(00000000,00000001,?), ref: 0108BABE
              • OleLoadPicture.OLEAUT32(?,00000000,00000000,01092CAC,?), ref: 0108BAD7
              • GlobalFree.KERNEL32(00000000), ref: 0108BAE7
              • GetObjectW.GDI32(?,00000018,000000FF), ref: 0108BB0B
              • CopyImage.USER32(?,00000000,?,?,00002000), ref: 0108BB36
              • DeleteObject.GDI32(00000000), ref: 0108BB5E
              • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 0108BB74
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
              • String ID: @U=u
              • API String ID: 3840717409-2594219639
              • Opcode ID: 6db2479561a6786f62a12056425cd0560ea819303885969c96557376f5076918
              • Instruction ID: 0a0d7432e143431d7e576d02f4656e97b1dc51c008d637a8a6dca90e5ac2c9e5
              • Opcode Fuzzy Hash: 6db2479561a6786f62a12056425cd0560ea819303885969c96557376f5076918
              • Instruction Fuzzy Hash: 2A414875604209AFDB21AF69DC88EAEBBB8FF89711F104058F9C5D7254CB759901CB20
              APIs
              • GetClassNameW.USER32(?,?,00000100), ref: 0105A47A
              • __swprintf.LIBCMT ref: 0105A51B
              • _wcscmp.LIBCMT ref: 0105A52E
              • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 0105A583
              • _wcscmp.LIBCMT ref: 0105A5BF
              • GetClassNameW.USER32(?,?,00000400), ref: 0105A5F6
              • GetDlgCtrlID.USER32(?), ref: 0105A648
              • GetWindowRect.USER32(?,?), ref: 0105A67E
              • GetParent.USER32(?), ref: 0105A69C
              • ScreenToClient.USER32(00000000), ref: 0105A6A3
              • GetClassNameW.USER32(?,?,00000100), ref: 0105A71D
              • _wcscmp.LIBCMT ref: 0105A731
              • GetWindowTextW.USER32(?,?,00000400), ref: 0105A757
              • _wcscmp.LIBCMT ref: 0105A76B
                • Part of subcall function 0102362C: _iswctype.LIBCMT ref: 01023634
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: _wcscmp$ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf_iswctype
              • String ID: %s%u
              • API String ID: 3744389584-679674701
              • Opcode ID: 434a7cd9c4fd07c984f31710d2d0e19132ead42c8436cfef364105f8ab9ca7bd
              • Instruction ID: 3bc4e26e1aba8e8730b65082d502682d76e620ef8c0209738300e9f1e631dd93
              • Opcode Fuzzy Hash: 434a7cd9c4fd07c984f31710d2d0e19132ead42c8436cfef364105f8ab9ca7bd
              • Instruction Fuzzy Hash: FDA1A131304206EFDB95DE64C884BABBBE8FF48254F008619EDDAD7150DB34E955CBA1
              APIs
              • GetClassNameW.USER32(00000008,?,00000400), ref: 0105AF18
              • _wcscmp.LIBCMT ref: 0105AF29
              • GetWindowTextW.USER32(00000001,?,00000400), ref: 0105AF51
              • CharUpperBuffW.USER32(?,00000000), ref: 0105AF6E
              • _wcscmp.LIBCMT ref: 0105AF8C
              • _wcsstr.LIBCMT ref: 0105AF9D
              • GetClassNameW.USER32(00000018,?,00000400), ref: 0105AFD5
              • _wcscmp.LIBCMT ref: 0105AFE5
              • GetWindowTextW.USER32(00000002,?,00000400), ref: 0105B00C
              • GetClassNameW.USER32(00000018,?,00000400), ref: 0105B055
              • _wcscmp.LIBCMT ref: 0105B065
              • GetClassNameW.USER32(00000010,?,00000400), ref: 0105B08D
              • GetWindowRect.USER32(00000004,?), ref: 0105B0F6
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: ClassName_wcscmp$Window$Text$BuffCharRectUpper_wcsstr
              • String ID: @$ThumbnailClass
              • API String ID: 1788623398-1539354611
              • Opcode ID: 2e8b236d51fcd744e060ff5c58a2a455a9edc11972e834d76449c0d747e513bc
              • Instruction ID: 3e67176ca4a4d02f3552a9d645ee26a89e03592105c42a99afbe190c44aea0d3
              • Opcode Fuzzy Hash: 2e8b236d51fcd744e060ff5c58a2a455a9edc11972e834d76449c0d747e513bc
              • Instruction Fuzzy Hash: 2B81C3711082069FEB95DF28C884FAB7BD9FF44314F0485A9EEC58A095DB34E945CB61
              APIs
              • _memset.LIBCMT ref: 0108A259
              • DestroyWindow.USER32(?,?), ref: 0108A2D3
                • Part of subcall function 01007BCC: _memmove.LIBCMT ref: 01007C06
              • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 0108A34D
              • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 0108A36F
              • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 0108A382
              • DestroyWindow.USER32(00000000), ref: 0108A3A4
              • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,01000000,00000000), ref: 0108A3DB
              • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 0108A3F4
              • GetDesktopWindow.USER32 ref: 0108A40D
              • GetWindowRect.USER32(00000000), ref: 0108A414
              • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 0108A42C
              • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 0108A444
                • Part of subcall function 010025DB: GetWindowLongW.USER32(?,000000EB), ref: 010025EC
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_memmove_memset
              • String ID: 0$@U=u$tooltips_class32
              • API String ID: 1297703922-1130792468
              • Opcode ID: c1b5614401b3cd338bb1aabd3633f7d7d84c3b62873ae25e26814a0613a3c1c0
              • Instruction ID: cb84ad17fb06ec67f28b9310d2086c3c14fbf2403769a3ee4be8c7efc449da13
              • Opcode Fuzzy Hash: c1b5614401b3cd338bb1aabd3633f7d7d84c3b62873ae25e26814a0613a3c1c0
              • Instruction Fuzzy Hash: 8B71AC70245205AFEB21DF28CC48FAA7BE5FB88304F04455DFAC59B2A0DB75E906CB56
              APIs
                • Part of subcall function 01002612: GetWindowLongW.USER32(?,000000EB), ref: 01002623
              • DragQueryPoint.SHELL32(?,?), ref: 0108C627
                • Part of subcall function 0108AB37: ClientToScreen.USER32(?,?), ref: 0108AB60
                • Part of subcall function 0108AB37: GetWindowRect.USER32(?,?), ref: 0108ABD6
                • Part of subcall function 0108AB37: PtInRect.USER32(?,?,0108C014), ref: 0108ABE6
              • SendMessageW.USER32(?,000000B0,?,?), ref: 0108C690
              • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 0108C69B
              • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 0108C6BE
              • _wcscat.LIBCMT ref: 0108C6EE
              • SendMessageW.USER32(?,000000C2,00000001,?), ref: 0108C705
              • SendMessageW.USER32(?,000000B0,?,?), ref: 0108C71E
              • SendMessageW.USER32(?,000000B1,?,?), ref: 0108C735
              • SendMessageW.USER32(?,000000B1,?,?), ref: 0108C757
              • DragFinish.SHELL32(?), ref: 0108C75E
              • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 0108C851
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen_wcscat
              • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID$@U=u
              • API String ID: 169749273-762882726
              • Opcode ID: 54f5a2bc78df0e4e25b99832944e8b2bfbe71b826ee0277698a7c95705a288a2
              • Instruction ID: 96a60c25eed4ebddb541ccd0e34e5c58a4d48c0e86a2af608190e1f14af8109b
              • Opcode Fuzzy Hash: 54f5a2bc78df0e4e25b99832944e8b2bfbe71b826ee0277698a7c95705a288a2
              • Instruction Fuzzy Hash: 35616A71108302AFD711EF64D884D9FBBF8EB98754F00091EF6D5962A0DB31AA49CB62
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: __wcsnicmp
              • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:
              • API String ID: 1038674560-1810252412
              • Opcode ID: 17a2502faac2fe25c7acac62bed6a634d527d8d168b42fbcee58b274fa5c4315
              • Instruction ID: 7a0c465c7ed949cfba964fcabcc281ad75f6864c799b77c233668e184302d80c
              • Opcode Fuzzy Hash: 17a2502faac2fe25c7acac62bed6a634d527d8d168b42fbcee58b274fa5c4315
              • Instruction Fuzzy Hash: CF31C831A4020EEBEB96FA95DE42EEF7BA8AF60610F10056DE9C2760D0EF556F04C651
              APIs
              • LoadCursorW.USER32(00000000,00007F8A), ref: 01075013
              • LoadCursorW.USER32(00000000,00007F00), ref: 0107501E
              • LoadCursorW.USER32(00000000,00007F03), ref: 01075029
              • LoadCursorW.USER32(00000000,00007F8B), ref: 01075034
              • LoadCursorW.USER32(00000000,00007F01), ref: 0107503F
              • LoadCursorW.USER32(00000000,00007F81), ref: 0107504A
              • LoadCursorW.USER32(00000000,00007F88), ref: 01075055
              • LoadCursorW.USER32(00000000,00007F80), ref: 01075060
              • LoadCursorW.USER32(00000000,00007F86), ref: 0107506B
              • LoadCursorW.USER32(00000000,00007F83), ref: 01075076
              • LoadCursorW.USER32(00000000,00007F85), ref: 01075081
              • LoadCursorW.USER32(00000000,00007F82), ref: 0107508C
              • LoadCursorW.USER32(00000000,00007F84), ref: 01075097
              • LoadCursorW.USER32(00000000,00007F04), ref: 010750A2
              • LoadCursorW.USER32(00000000,00007F02), ref: 010750AD
              • LoadCursorW.USER32(00000000,00007F89), ref: 010750B8
              • GetCursorInfo.USER32(?), ref: 010750C8
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: Cursor$Load$Info
              • String ID:
              • API String ID: 2577412497-0
              • Opcode ID: ec4a2c2ed890a53fd39b04fa9613c5e505b8a61d2b35aa0b431004c761fc44ef
              • Instruction ID: 6f8e9a5679dee924a5c30e987f581e4c2acb8939e6f1f7d60b59bf63ddc3add5
              • Opcode Fuzzy Hash: ec4a2c2ed890a53fd39b04fa9613c5e505b8a61d2b35aa0b431004c761fc44ef
              • Instruction Fuzzy Hash: 873117B1D0831EAADF509FB68C8989EBFE8FF04750F50452AA54DE7280DA786500CF95
              APIs
              • CharUpperBuffW.USER32(?,?), ref: 01084424
              • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 0108446F
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: BuffCharMessageSendUpper
              • String ID: @U=u$CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
              • API String ID: 3974292440-383632319
              • Opcode ID: fb320e2b75e75d94d64e437b7f43dee8ad59cee02e75825c3ed9b5f8fc61d1fb
              • Instruction ID: c3e9b16e31ba62ec7ed78555ef6a855d29a9232fe24e5251eabc041b33400195
              • Opcode Fuzzy Hash: fb320e2b75e75d94d64e437b7f43dee8ad59cee02e75825c3ed9b5f8fc61d1fb
              • Instruction Fuzzy Hash: BA916270204312DFDB05EF14C490AAEB7E1BFA4658F44896CE8D69B7A2CB31ED45CB91
              APIs
              • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 0108B8B4
              • LoadLibraryExW.KERNEL32(?,00000000,00000032,?,?,00000001,?,?,?,01086B11,?), ref: 0108B910
              • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 0108B949
              • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 0108B98C
              • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 0108B9C3
              • FreeLibrary.KERNEL32(?), ref: 0108B9CF
              • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 0108B9DF
              • DestroyIcon.USER32(?), ref: 0108B9EE
              • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 0108BA0B
              • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 0108BA17
                • Part of subcall function 01022EFD: __wcsicmp_l.LIBCMT ref: 01022F86
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: Load$Image$IconLibraryMessageSend$DestroyExtractFree__wcsicmp_l
              • String ID: .dll$.exe$.icl$@U=u
              • API String ID: 1212759294-1639919054
              • Opcode ID: 883ceef7704a38acfbd87380a3fe429719a91a67741cdc209f642b078afcb472
              • Instruction ID: 7d355e3995356cb8c39ccac94101afda062fcbd15bdc1a7a138f38253153e51b
              • Opcode Fuzzy Hash: 883ceef7704a38acfbd87380a3fe429719a91a67741cdc209f642b078afcb472
              • Instruction Fuzzy Hash: 1C61BE71504216BAEB25EF68CD40FBE7BA8EB08721F104149F9D5D61C0DB759A90DBA0
              APIs
                • Part of subcall function 01009837: __itow.LIBCMT ref: 01009862
                • Part of subcall function 01009837: __swprintf.LIBCMT ref: 010098AC
              • CharLowerBuffW.USER32(?,?), ref: 0106A3CB
              • GetDriveTypeW.KERNEL32 ref: 0106A418
              • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0106A460
              • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0106A497
              • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0106A4C5
                • Part of subcall function 01007BCC: _memmove.LIBCMT ref: 01007C06
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: SendString$BuffCharDriveLowerType__itow__swprintf_memmove
              • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
              • API String ID: 2698844021-4113822522
              • Opcode ID: 6453018c7b0ed3b417ab45ff60a3980e5cc4b1509c5b53fc9555096b96fb85b7
              • Instruction ID: 82c4cd3aad92969236ab1e63276d083636af02b64f4ca2a83a9557fd52c6985b
              • Opcode Fuzzy Hash: 6453018c7b0ed3b417ab45ff60a3980e5cc4b1509c5b53fc9555096b96fb85b7
              • Instruction Fuzzy Hash: 0B5140711043069FD701EF24C8909AEB7E8FF94618F04895DF8D9572A1DB31EE09CB52
              APIs
              • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000001,00000000,00000000,?,0103E029,00000001,0000138C,00000001,00000000,00000001,?,00000000,00000000), ref: 0105F8DF
              • LoadStringW.USER32(00000000,?,0103E029,00000001), ref: 0105F8E8
                • Part of subcall function 01007DE1: _memmove.LIBCMT ref: 01007E22
              • GetModuleHandleW.KERNEL32(00000000,010C5310,?,00000FFF,?,?,0103E029,00000001,0000138C,00000001,00000000,00000001,?,00000000,00000000,00000001), ref: 0105F90A
              • LoadStringW.USER32(00000000,?,0103E029,00000001), ref: 0105F90D
              • __swprintf.LIBCMT ref: 0105F95D
              • __swprintf.LIBCMT ref: 0105F96E
              • _wprintf.LIBCMT ref: 0105FA17
              • MessageBoxW.USER32(00000000,?,?,00011010), ref: 0105FA2E
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: HandleLoadModuleString__swprintf$Message_memmove_wprintf
              • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
              • API String ID: 984253442-2268648507
              • Opcode ID: 8eaeab862eb698d22857596f9487c8b13188ff538b2f606fed0d1f50035b86eb
              • Instruction ID: bfa75b26456f8faeae3bd04883aa3de872f1c3f6bc5caf26a0b3bd0247bc7586
              • Opcode Fuzzy Hash: 8eaeab862eb698d22857596f9487c8b13188ff538b2f606fed0d1f50035b86eb
              • Instruction Fuzzy Hash: 3441217280011FAADF16FBE0DD85DEE777CAF28210F500465E685B61D0EA396F49CB61
              APIs
              • __wsplitpath.LIBCMT ref: 0106DA10
              • _wcscat.LIBCMT ref: 0106DA28
              • _wcscat.LIBCMT ref: 0106DA3A
              • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 0106DA4F
              • SetCurrentDirectoryW.KERNEL32(?), ref: 0106DA63
              • GetFileAttributesW.KERNEL32(?), ref: 0106DA7B
              • SetFileAttributesW.KERNEL32(?,00000000), ref: 0106DA95
              • SetCurrentDirectoryW.KERNEL32(?), ref: 0106DAA7
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: CurrentDirectory$AttributesFile_wcscat$__wsplitpath
              • String ID: *.*
              • API String ID: 34673085-438819550
              • Opcode ID: f4c22e79ea4a06898edfd60e82b58196913c876efea7ea5031f630786de98a67
              • Instruction ID: 06105de87f2d5ccbd45000749d2b6a87178b38f171d3953c0b408d40674616bd
              • Opcode Fuzzy Hash: f4c22e79ea4a06898edfd60e82b58196913c876efea7ea5031f630786de98a67
              • Instruction Fuzzy Hash: 7681A6716083419FDB64EFA8C8449AEB7EDBF89214F088C6EE5C9CB251D630D945CB62
              APIs
                • Part of subcall function 01002612: GetWindowLongW.USER32(?,000000EB), ref: 01002623
              • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 0108C1FC
              • GetFocus.USER32 ref: 0108C20C
              • GetDlgCtrlID.USER32(00000000), ref: 0108C217
              • _memset.LIBCMT ref: 0108C342
              • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 0108C36D
              • GetMenuItemCount.USER32(?), ref: 0108C38D
              • GetMenuItemID.USER32(?,00000000), ref: 0108C3A0
              • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 0108C3D4
              • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 0108C41C
              • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 0108C454
              • DefDlgProcW.USER32(?,00000111,?,?,?,?,?,?,?), ref: 0108C489
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow_memset
              • String ID: 0
              • API String ID: 1296962147-4108050209
              • Opcode ID: d4bb91d2a25880ffababa099072dd4197e9ba34ef8c4e51e107b3ec3e25ef532
              • Instruction ID: d82ffc098378366487193582ef9af66636161c5170a8bdb04cdb8aa6dd47e9fe
              • Opcode Fuzzy Hash: d4bb91d2a25880ffababa099072dd4197e9ba34ef8c4e51e107b3ec3e25ef532
              • Instruction Fuzzy Hash: CE816B702083029FE761EF28D984AABBBF4FB88714F00456DFAD597291CB71D945CB62
              APIs
              • GetDC.USER32(00000000), ref: 0107738F
              • CreateCompatibleBitmap.GDI32(00000000,00000007,?), ref: 0107739B
              • CreateCompatibleDC.GDI32(?), ref: 010773A7
              • SelectObject.GDI32(00000000,?), ref: 010773B4
              • StretchBlt.GDI32(00000006,00000000,00000000,00000007,?,?,?,?,00000007,?,00CC0020), ref: 01077408
              • GetDIBits.GDI32(00000006,?,00000000,00000000,00000000,00000028,00000000), ref: 01077444
              • GetDIBits.GDI32(00000006,?,00000000,?,00000000,00000028,00000000), ref: 01077468
              • SelectObject.GDI32(00000006,?), ref: 01077470
              • DeleteObject.GDI32(?), ref: 01077479
              • DeleteDC.GDI32(00000006), ref: 01077480
              • ReleaseDC.USER32(00000000,?), ref: 0107748B
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
              • String ID: (
              • API String ID: 2598888154-3887548279
              • Opcode ID: a52f84b0a255e0d905b352e2123d9c8051b15b9c6534993210f2b98ab40609e3
              • Instruction ID: 781ae4d2e1e9ec4bc14a8f2b075453b5a153f8f826daedf58fb29763ab2d5979
              • Opcode Fuzzy Hash: a52f84b0a255e0d905b352e2123d9c8051b15b9c6534993210f2b98ab40609e3
              • Instruction Fuzzy Hash: 8A515B75904309EFDB24CFA8C889EAEBBF9EF48350F14851DF99997210C735A941CB54
              APIs
              • timeGetTime.WINMM ref: 01064F7A
                • Part of subcall function 0102049F: timeGetTime.WINMM(?,753DB400,01010E7B), ref: 010204A3
              • Sleep.KERNEL32(0000000A), ref: 01064FA6
              • EnumThreadWindows.USER32(?,Function_00064F28,00000000), ref: 01064FCA
              • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 01064FEC
              • SetActiveWindow.USER32 ref: 0106500B
              • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 01065019
              • SendMessageW.USER32(00000010,00000000,00000000), ref: 01065038
              • Sleep.KERNEL32(000000FA), ref: 01065043
              • IsWindow.USER32 ref: 0106504F
              • EndDialog.USER32(00000000), ref: 01065060
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
              • String ID: @U=u$BUTTON
              • API String ID: 1194449130-2582809321
              • Opcode ID: 9a13d5d34c0e8ae068d7ba0b9b821543333daff4458d2d8dbd14e6d640703368
              • Instruction ID: 60b9a291da1aba522cc4266d9ad5c3e244698d3fe7f2225d8703e7cb51a25eba
              • Opcode Fuzzy Hash: 9a13d5d34c0e8ae068d7ba0b9b821543333daff4458d2d8dbd14e6d640703368
              • Instruction Fuzzy Hash: 6B216274208206AFF7315F74EC88B6E3BADEB5A785F141024F1C6C129DCB6B9D608B61
              APIs
                • Part of subcall function 01020957: GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,01006B0C,?,00008000), ref: 01020973
                • Part of subcall function 01004750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,01004743,?,?,010037AE,?), ref: 01004770
              • SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 01006BAD
              • SetCurrentDirectoryW.KERNEL32(?), ref: 01006CFA
                • Part of subcall function 0100586D: _wcscpy.LIBCMT ref: 010058A5
                • Part of subcall function 0102363D: _iswctype.LIBCMT ref: 01023645
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: CurrentDirectory$FullNamePath_iswctype_wcscpy
              • String ID: #include depth exceeded. Make sure there are no recursive includes$>>>AUTOIT SCRIPT<<<$AU3!$Bad directive syntax error$EA06$Error opening the file$Unterminated string
              • API String ID: 537147316-1018226102
              • Opcode ID: 8d168274ce5788e74965093c1b44655fee640d566acdbfabe874242f64e3cbe8
              • Instruction ID: 0e8b47bc3a86fb70b723bb22c1479b04367a35a94463a06f217c9ec7461e6b14
              • Opcode Fuzzy Hash: 8d168274ce5788e74965093c1b44655fee640d566acdbfabe874242f64e3cbe8
              • Instruction Fuzzy Hash: ED027C305083429FD726EF24C8809AFBBE9BFA9314F04491EF5C6972A0DB35D949CB52
              APIs
              • _memset.LIBCMT ref: 01062D50
              • GetMenuItemInfoW.USER32(00000000,00000007,00000000,00000030), ref: 01062DDD
              • GetMenuItemCount.USER32(010C5890), ref: 01062E66
              • DeleteMenu.USER32(010C5890,00000005,00000000,000000F5,?,?), ref: 01062EF6
              • DeleteMenu.USER32(010C5890,00000004,00000000), ref: 01062EFE
              • DeleteMenu.USER32(010C5890,00000006,00000000), ref: 01062F06
              • DeleteMenu.USER32(010C5890,00000003,00000000), ref: 01062F0E
              • GetMenuItemCount.USER32(010C5890), ref: 01062F16
              • SetMenuItemInfoW.USER32(010C5890,00000004,00000000,00000030), ref: 01062F4C
              • GetCursorPos.USER32(?), ref: 01062F56
              • SetForegroundWindow.USER32(00000000), ref: 01062F5F
              • TrackPopupMenuEx.USER32(010C5890,00000000,?,00000000,00000000,00000000), ref: 01062F72
              • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 01062F7E
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: Menu$DeleteItem$CountInfo$CursorForegroundMessagePopupPostTrackWindow_memset
              • String ID:
              • API String ID: 3993528054-0
              • Opcode ID: 0014d49ea66a3643f4cdd81fbf7646fcf7cac5c581bddccd0f30af253ec1d3bf
              • Instruction ID: d796b2c26b1654fdb0c7f8370012f64785d41017656e5af151b0e4d5a0b22d94
              • Opcode Fuzzy Hash: 0014d49ea66a3643f4cdd81fbf7646fcf7cac5c581bddccd0f30af253ec1d3bf
              • Instruction Fuzzy Hash: 0B71D770605206BFFB219F68DC48FAABFACFF14364F140266F695AA1D0C7755860CB51
              APIs
                • Part of subcall function 01007BCC: _memmove.LIBCMT ref: 01007C06
              • _memset.LIBCMT ref: 0105786B
              • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 010578A0
              • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 010578BC
              • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 010578D8
              • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 01057902
              • CLSIDFromString.OLE32(?,?,?,SOFTWARE\Classes\), ref: 0105792A
              • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 01057935
              • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 0105793A
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_memmove_memset
              • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
              • API String ID: 1411258926-22481851
              • Opcode ID: ec2b3c554dc0aa5e6d8a95f3d99b80b7f90cab5c43887b750ef84cc982a8c70a
              • Instruction ID: f518ea663b511826c68718cc8f8b223b7b449feb8e5dc0c54b8c1fdfa8c19c71
              • Opcode Fuzzy Hash: ec2b3c554dc0aa5e6d8a95f3d99b80b7f90cab5c43887b750ef84cc982a8c70a
              • Instruction Fuzzy Hash: 4441DB72C1022EABDF22EBA4DC84DEEB7B8FF14614F404469E985A7190DB355D05CBA0
              APIs
              • CharUpperBuffW.USER32(?,?,?,?,?,?,?,0107FDAD,?,?), ref: 01080E31
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: BuffCharUpper
              • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
              • API String ID: 3964851224-909552448
              • Opcode ID: cc91b81825291690ef33b8c2dda60c962c1aa6cc91f41ec9ef77b61b1c17041d
              • Instruction ID: 5f91e0ecf9e68d538ed6b73b5b7dddbdbcc21186945e84947661857ea565a1db
              • Opcode Fuzzy Hash: cc91b81825291690ef33b8c2dda60c962c1aa6cc91f41ec9ef77b61b1c17041d
              • Instruction Fuzzy Hash: 3D418D7110425A8BDF11FF14D8A0AEF37A0BF22304F448464FDE51B69ADB35A91ECBA0
              APIs
              • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 0108755E
              • CreateCompatibleDC.GDI32(00000000), ref: 01087565
              • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 01087578
              • SelectObject.GDI32(00000000,00000000), ref: 01087580
              • GetPixel.GDI32(00000000,00000000,00000000), ref: 0108758B
              • DeleteDC.GDI32(00000000), ref: 01087594
              • GetWindowLongW.USER32(?,000000EC), ref: 0108759E
              • SetLayeredWindowAttributes.USER32(?,00000000,00000000,00000001), ref: 010875B2
              • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?,?), ref: 010875BE
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
              • String ID: @U=u$static
              • API String ID: 2559357485-3553413495
              • Opcode ID: 6e89f10ea44a8a0079986da8687a5e9e5e57300b1a7192bed15a2eb27ce14196
              • Instruction ID: 2293992110c2e3f02c2cfff4d3a0539162841582706d5a2f7c05f7d6708fbdef
              • Opcode Fuzzy Hash: 6e89f10ea44a8a0079986da8687a5e9e5e57300b1a7192bed15a2eb27ce14196
              • Instruction Fuzzy Hash: B6316E31108216ABDF22AF78DC08FDE3BA9FF09365F210214FAD596194CB76D861DB64
              APIs
              • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,0103E2A0,00000010,?,Bad directive syntax error,0108F910,00000000,?,?,?,>>>AUTOIT SCRIPT<<<), ref: 0105F7C2
              • LoadStringW.USER32(00000000,?,0103E2A0,00000010), ref: 0105F7C9
                • Part of subcall function 01007DE1: _memmove.LIBCMT ref: 01007E22
              • _wprintf.LIBCMT ref: 0105F7FC
              • __swprintf.LIBCMT ref: 0105F81E
              • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 0105F88D
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: HandleLoadMessageModuleString__swprintf_memmove_wprintf
              • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
              • API String ID: 1506413516-4153970271
              • Opcode ID: cb5058d7cc7c040e89a0d20adae375870bbbd1c475bf5433c5460fd5e56f7513
              • Instruction ID: d8debb8c1e57b2f24116d933417224deac3af365e83816efe2e4e462798056cb
              • Opcode Fuzzy Hash: cb5058d7cc7c040e89a0d20adae375870bbbd1c475bf5433c5460fd5e56f7513
              • Instruction Fuzzy Hash: 7C214F3290021FABDF12EFA0CC49EFE7779BF28204F04485AF5956A0A0DA75A518CB51
              APIs
                • Part of subcall function 01007BCC: _memmove.LIBCMT ref: 01007C06
                • Part of subcall function 01007924: _memmove.LIBCMT ref: 010079AD
              • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 01065330
              • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 01065346
              • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 01065357
              • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 01065369
              • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 0106537A
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: SendString$_memmove
              • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
              • API String ID: 2279737902-1007645807
              • Opcode ID: 6889c52cffcda50c0e794f1bb0144bc9bbc05e3da1470588db262cb7a536082c
              • Instruction ID: 4d60c110cb9144da903e2eb6ef4656ac905dbc5e267900eb920270508a264007
              • Opcode Fuzzy Hash: 6889c52cffcda50c0e794f1bb0144bc9bbc05e3da1470588db262cb7a536082c
              • Instruction Fuzzy Hash: 7F110870A9012E39E720B676CC88DFF7BBCFBA5F44F00441E74C1960E0E9A05804C6B0
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: _wcscpy$CleanupStartup_memmove_strcatgethostbynamegethostnameinet_ntoa
              • String ID: 0.0.0.0
              • API String ID: 208665112-3771769585
              • Opcode ID: 29f2bd840ed3ac5192f3bb87561e2da220c698d4187607f1461d2d172935bb68
              • Instruction ID: 5fb4f419e2d1028692c102280ed1bba95985da206a5444b29d6e4d2f21d13d22
              • Opcode Fuzzy Hash: 29f2bd840ed3ac5192f3bb87561e2da220c698d4187607f1461d2d172935bb68
              • Instruction Fuzzy Hash: 8311B431504126AFDB24BB749C49EEE77BCFF12711F0441AAE5C5D6050EF799AC28B50
              APIs
                • Part of subcall function 01009837: __itow.LIBCMT ref: 01009862
                • Part of subcall function 01009837: __swprintf.LIBCMT ref: 010098AC
              • CoInitialize.OLE32(00000000), ref: 0106D5EA
              • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 0106D67D
              • SHGetDesktopFolder.SHELL32(?), ref: 0106D691
              • CoCreateInstance.OLE32(01092D7C,00000000,00000001,010B8C1C,?), ref: 0106D6DD
              • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 0106D74C
              • CoTaskMemFree.OLE32(?,?), ref: 0106D7A4
              • _memset.LIBCMT ref: 0106D7E1
              • SHBrowseForFolderW.SHELL32(?), ref: 0106D81D
              • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 0106D840
              • CoTaskMemFree.OLE32(00000000), ref: 0106D847
              • CoTaskMemFree.OLE32(00000000,00000001,00000000), ref: 0106D87E
              • CoUninitialize.OLE32(00000001,00000000), ref: 0106D880
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize__itow__swprintf_memset
              • String ID:
              • API String ID: 1246142700-0
              • Opcode ID: 46b0f3c56c3495a32e6f7f05208bce6186a415962c4ba2cbc5ae3ef03fb5944a
              • Instruction ID: 01fb0f982b998a57755d511ce05872032650cf1ad885755a9b3626cbcc61f831
              • Opcode Fuzzy Hash: 46b0f3c56c3495a32e6f7f05208bce6186a415962c4ba2cbc5ae3ef03fb5944a
              • Instruction Fuzzy Hash: A7B1FD75A00109AFDB14DFA4C888DAEBBF9FF48314F148499E989EB251DB35EE41CB50
              APIs
              • GetDlgItem.USER32(?,00000001), ref: 0105C283
              • GetWindowRect.USER32(00000000,?), ref: 0105C295
              • MoveWindow.USER32(00000001,0000000A,?,00000001,?,00000000), ref: 0105C2F3
              • GetDlgItem.USER32(?,00000002), ref: 0105C2FE
              • GetWindowRect.USER32(00000000,?), ref: 0105C310
              • MoveWindow.USER32(00000001,?,00000000,00000001,?,00000000), ref: 0105C364
              • GetDlgItem.USER32(?,000003E9), ref: 0105C372
              • GetWindowRect.USER32(00000000,?), ref: 0105C383
              • MoveWindow.USER32(00000000,0000000A,00000000,?,?,00000000), ref: 0105C3C6
              • GetDlgItem.USER32(?,000003EA), ref: 0105C3D4
              • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 0105C3F1
              • InvalidateRect.USER32(?,00000000,00000001), ref: 0105C3FE
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: Window$ItemMoveRect$Invalidate
              • String ID:
              • API String ID: 3096461208-0
              • Opcode ID: ee9b3bfe3e4f081fabc535dab4b272cea03f5295fa66a6f5b9f4b4f5316abe8d
              • Instruction ID: aef4f53333fc649820a0d4301dcccb2ffd7b0108c492a87f22fede188650e36d
              • Opcode Fuzzy Hash: ee9b3bfe3e4f081fabc535dab4b272cea03f5295fa66a6f5b9f4b4f5316abe8d
              • Instruction Fuzzy Hash: B2514171B00205ABEB18CFBDDD89A6EBBB9FB88310F14816DF955D6294D77199408B10
              APIs
                • Part of subcall function 01001B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,01002036,?,00000000,?,?,?,?,010016CB,00000000,?), ref: 01001B9A
              • DestroyWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,?), ref: 010020D3
              • KillTimer.USER32(-00000001,?,?,?,?,010016CB,00000000,?,?,01001AE2,?,?), ref: 0100216E
              • DestroyAcceleratorTable.USER32(00000000), ref: 0103BCA6
              • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,010016CB,00000000,?,?,01001AE2,?,?), ref: 0103BCD7
              • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,010016CB,00000000,?,?,01001AE2,?,?), ref: 0103BCEE
              • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,010016CB,00000000,?,?,01001AE2,?,?), ref: 0103BD0A
              • DeleteObject.GDI32(00000000), ref: 0103BD1C
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
              • String ID:
              • API String ID: 641708696-0
              • Opcode ID: d62fd534e22b3eb08355c2bac34a63f4cf96726bdd987490008678ae54fc29fb
              • Instruction ID: bed706621d3ac680a11662cce1956aa5ef566fc85879648f57d21aaeb9a0aa2b
              • Opcode Fuzzy Hash: d62fd534e22b3eb08355c2bac34a63f4cf96726bdd987490008678ae54fc29fb
              • Instruction Fuzzy Hash: 48619D34204B01DFEB36EF18D94CB2A7BF2FB80316F504558E5C29A9A5C77AA891CF41
              APIs
                • Part of subcall function 010025DB: GetWindowLongW.USER32(?,000000EB), ref: 010025EC
              • GetSysColor.USER32(0000000F), ref: 010021D3
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: ColorLongWindow
              • String ID:
              • API String ID: 259745315-0
              • Opcode ID: 02ef0767bc2a8c9ca239e0276ca28a88a13bc12d1799b091ebe1b96fd88bced8
              • Instruction ID: 74a7a50f3dbf80ecbeab48ba1b3e6d2456e5594e5090888d99e042a980e6e74b
              • Opcode Fuzzy Hash: 02ef0767bc2a8c9ca239e0276ca28a88a13bc12d1799b091ebe1b96fd88bced8
              • Instruction Fuzzy Hash: B8417131104541AFEF265F6CD88CBB93BA5EB46321F144295FEE58A1E6C7368881CB21
              APIs
              • CharLowerBuffW.USER32(?,?,0108F910), ref: 0106A90B
              • GetDriveTypeW.KERNEL32(00000061,010B89A0,00000061), ref: 0106A9D5
              • _wcscpy.LIBCMT ref: 0106A9FF
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: BuffCharDriveLowerType_wcscpy
              • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
              • API String ID: 2820617543-1000479233
              • Opcode ID: f4dd706e01546bb4324bcb055fc41690395844097eeeca955ee1bf91d9de9bff
              • Instruction ID: 53c75cdb4fe4eea58e201116c52cfd018b4c2c494bc33be0a9b05cd75a47eb7e
              • Opcode Fuzzy Hash: f4dd706e01546bb4324bcb055fc41690395844097eeeca955ee1bf91d9de9bff
              • Instruction Fuzzy Hash: D8519D352183029BD701EF24C890AAFB7E9FFA4254F54482EF5D6672E1DB319909CB62
              APIs
              • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 010886FF
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: InvalidateRect
              • String ID: @U=u
              • API String ID: 634782764-2594219639
              • Opcode ID: 6cdcc658b4bd18193d0cc9b271d720a4bcb23fc8b5e331b657454aab479076ae
              • Instruction ID: 488e58d6ca401089619c5351f9f0e39828f0d17f696d8d5eef1dfc44fb627db3
              • Opcode Fuzzy Hash: 6cdcc658b4bd18193d0cc9b271d720a4bcb23fc8b5e331b657454aab479076ae
              • Instruction Fuzzy Hash: 5651A530518205BEEB31BA28DC88F9D7BA4BB19724F908157FAD1E61D0D776E9A0CB40
              APIs
              • LoadImageW.USER32(00000000,?,00000001,00000010,00000010,00000010), ref: 0103C2F7
              • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 0103C319
              • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 0103C331
              • ExtractIconExW.SHELL32(?,00000000,?,00000000,00000001), ref: 0103C34F
              • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 0103C370
              • DestroyIcon.USER32(00000000), ref: 0103C37F
              • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 0103C39C
              • DestroyIcon.USER32(?), ref: 0103C3AB
                • Part of subcall function 0108A4AF: DeleteObject.GDI32(00000000), ref: 0108A4E8
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: Icon$DestroyExtractImageLoadMessageSend$DeleteObject
              • String ID: @U=u
              • API String ID: 2819616528-2594219639
              • Opcode ID: 9b533a54a6c8538a2d5d45efc23fa92cd4a8114222603dab8d255294658e49f9
              • Instruction ID: 9724d19bd092d3fcebb4bb3e035bf909aff0a0e153a08d80904b6dc6323861a6
              • Opcode Fuzzy Hash: 9b533a54a6c8538a2d5d45efc23fa92cd4a8114222603dab8d255294658e49f9
              • Instruction Fuzzy Hash: 6251697460060AAFEB21DF68CD48FAE3BE9EB58310F104559F982E72D0DB71A990DB50
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: __i64tow__itow__swprintf
              • String ID: %.15g$0x%p$False$True
              • API String ID: 421087845-2263619337
              • Opcode ID: 48b96309b83f76d870dac558b8509655452aa57dae9cd0e16569554a014e10ea
              • Instruction ID: 2fa965c98b02ee874b480f4b1cd9913494a07a5374b6fd930d477b8f3ba2beae
              • Opcode Fuzzy Hash: 48b96309b83f76d870dac558b8509655452aa57dae9cd0e16569554a014e10ea
              • Instruction Fuzzy Hash: 7041B671900206DFFB25EF38D845EBA77ECFB45204F1044AEE6C9DA2D1EA35AA418B11
              APIs
              • _memset.LIBCMT ref: 0108716A
              • CreateMenu.USER32 ref: 01087185
              • SetMenu.USER32(?,00000000), ref: 01087194
              • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 01087221
              • IsMenu.USER32(?), ref: 01087237
              • CreatePopupMenu.USER32 ref: 01087241
              • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 0108726E
              • DrawMenuBar.USER32 ref: 01087276
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: Menu$CreateItem$DrawInfoInsertPopup_memset
              • String ID: 0$F
              • API String ID: 176399719-3044882817
              • Opcode ID: 91093af73909fe70f9b45b36e876bca60dd8dcf4bc6d52c9ccbd793f950d6d46
              • Instruction ID: 071c36e6f53233afb418c4445b0aace38042a0bde721d8c92caafc4719c90f36
              • Opcode Fuzzy Hash: 91093af73909fe70f9b45b36e876bca60dd8dcf4bc6d52c9ccbd793f950d6d46
              • Instruction Fuzzy Hash: FC413874A05205EFDB20EFA8D884E9A7BF5FF49310F140068FA95A7355D736A910CFA0
              APIs
                • Part of subcall function 01007DE1: _memmove.LIBCMT ref: 01007E22
                • Part of subcall function 0105AA99: GetClassNameW.USER32(?,?,000000FF), ref: 0105AABC
              • SendMessageW.USER32(?,0000018C,000000FF,00000002), ref: 01059014
              • GetDlgCtrlID.USER32 ref: 0105901F
              • GetParent.USER32 ref: 0105903B
              • SendMessageW.USER32(00000000,?,00000111,?), ref: 0105903E
              • GetDlgCtrlID.USER32(?), ref: 01059047
              • GetParent.USER32(?), ref: 01059063
              • SendMessageW.USER32(00000000,?,?,00000111), ref: 01059066
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: MessageSend$CtrlParent$ClassName_memmove
              • String ID: @U=u$ComboBox$ListBox
              • API String ID: 1536045017-2258501812
              • Opcode ID: 137b7e1a38705ebbd81bdb684e1b212ef1d025b42f5bcb8e3b9fa5e93bab7c68
              • Instruction ID: 5a59835188298f273875e23e5b6aab829238c2c73b3f5c11f390f37923a94ad4
              • Opcode Fuzzy Hash: 137b7e1a38705ebbd81bdb684e1b212ef1d025b42f5bcb8e3b9fa5e93bab7c68
              • Instruction Fuzzy Hash: AD21A170A00109BFDF15ABB4CC84EFEBBB4EB59310F10025AB9E1972E0DB795425DB20
              APIs
                • Part of subcall function 01007DE1: _memmove.LIBCMT ref: 01007E22
                • Part of subcall function 0105AA99: GetClassNameW.USER32(?,?,000000FF), ref: 0105AABC
              • SendMessageW.USER32(?,00000186,00000002,00000000), ref: 010590FD
              • GetDlgCtrlID.USER32 ref: 01059108
              • GetParent.USER32 ref: 01059124
              • SendMessageW.USER32(00000000,?,00000111,?), ref: 01059127
              • GetDlgCtrlID.USER32(?), ref: 01059130
              • GetParent.USER32(?), ref: 0105914C
              • SendMessageW.USER32(00000000,?,?,00000111), ref: 0105914F
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: MessageSend$CtrlParent$ClassName_memmove
              • String ID: @U=u$ComboBox$ListBox
              • API String ID: 1536045017-2258501812
              • Opcode ID: 60157164dcbc21d4968f315afa6b9b1284a2481b400f2ae3d656c3ced2755579
              • Instruction ID: ebff345b8d9f1851b887f5052a665375bec957f0a64e297d462a776b8e7d0702
              • Opcode Fuzzy Hash: 60157164dcbc21d4968f315afa6b9b1284a2481b400f2ae3d656c3ced2755579
              • Instruction Fuzzy Hash: 6321B375A00109BFEF11ABB4CC84EFEBBB8EF59300F10415ABAD1972A5DB795425DB20
              APIs
              • GetParent.USER32 ref: 0105916F
              • GetClassNameW.USER32(00000000,?,00000100), ref: 01059184
              • _wcscmp.LIBCMT ref: 01059196
              • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 01059211
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: ClassMessageNameParentSend_wcscmp
              • String ID: @U=u$SHELLDLL_DefView$details$largeicons$list$smallicons
              • API String ID: 1704125052-1428604138
              • Opcode ID: dd9632180ecc14ab7fe6a254c6fb7f918892f1bd22ea004b0ca67ab7f8e61e43
              • Instruction ID: 6c8ca3aa4bd00c07e054b7b0fc6685e2bd6c124971f833e6e7594a402fa330d1
              • Opcode Fuzzy Hash: dd9632180ecc14ab7fe6a254c6fb7f918892f1bd22ea004b0ca67ab7f8e61e43
              • Instruction Fuzzy Hash: F1112936248317FAFB622538DC0ADEB37DCDB15764B20006AFDC0E84D1FE6264515A94
              APIs
              • _memset.LIBCMT ref: 01026E3E
                • Part of subcall function 01028B28: __getptd_noexit.LIBCMT ref: 01028B28
              • __gmtime64_s.LIBCMT ref: 01026ED7
              • __gmtime64_s.LIBCMT ref: 01026F0D
              • __gmtime64_s.LIBCMT ref: 01026F2A
              • __allrem.LIBCMT ref: 01026F80
              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 01026F9C
              • __allrem.LIBCMT ref: 01026FB3
              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 01026FD1
              • __allrem.LIBCMT ref: 01026FE8
              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 01027006
              • __invoke_watson.LIBCMT ref: 01027077
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@__gmtime64_s$__getptd_noexit__invoke_watson_memset
              • String ID:
              • API String ID: 384356119-0
              • Opcode ID: 1572197e9c4cf49d3ac3c19b6e82465e4eefa01e3d88f7bbd38cf7a66862b9c5
              • Instruction ID: 53255806eaa267d4d74a9a9e10f4c155e772efee0f12d1e466cd505b2e8e4b6e
              • Opcode Fuzzy Hash: 1572197e9c4cf49d3ac3c19b6e82465e4eefa01e3d88f7bbd38cf7a66862b9c5
              • Instruction Fuzzy Hash: AF710A76A00727EBDB14EE7CCC80B9AB7E8AF54324F14416AF994DB281E775D9048790
              APIs
              • _memset.LIBCMT ref: 01062542
              • GetMenuItemInfoW.USER32(010C5890,000000FF,00000000,00000030), ref: 010625A3
              • SetMenuItemInfoW.USER32(010C5890,00000004,00000000,00000030), ref: 010625D9
              • Sleep.KERNEL32(000001F4), ref: 010625EB
              • GetMenuItemCount.USER32(?), ref: 0106262F
              • GetMenuItemID.USER32(?,00000000), ref: 0106264B
              • GetMenuItemID.USER32(?,-00000001), ref: 01062675
              • GetMenuItemID.USER32(?,?), ref: 010626BA
              • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 01062700
              • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 01062714
              • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 01062735
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: ItemMenu$Info$CheckCountRadioSleep_memset
              • String ID:
              • API String ID: 4176008265-0
              • Opcode ID: f9dff5b0c4776c60c4269d3bb4b020511854600ada0dea5b2ca9e84ab8b3647e
              • Instruction ID: b3bdf30ee21dbe9c14be23306fa852ebd57dd31101c293ca4603f96d8509723c
              • Opcode Fuzzy Hash: f9dff5b0c4776c60c4269d3bb4b020511854600ada0dea5b2ca9e84ab8b3647e
              • Instruction Fuzzy Hash: B2618E7490424AAFEB21DF68D888DAE7BFDFB45344F140099F9C2A7291D736AD05CB21
              APIs
              • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 01086FA5
              • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 01086FA8
              • GetWindowLongW.USER32(?,000000F0), ref: 01086FCC
              • _memset.LIBCMT ref: 01086FDD
              • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 01086FEF
              • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 01087067
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: MessageSend$LongWindow_memset
              • String ID:
              • API String ID: 830647256-0
              • Opcode ID: 2355bf45eccbd5436ac9f0c72b7a990af2924cac592320a1a4f880dee3f73461
              • Instruction ID: 0d67e24deda35ef77be5e563d822f7cc2962678ae8e17be26feedb063f9512ec
              • Opcode Fuzzy Hash: 2355bf45eccbd5436ac9f0c72b7a990af2924cac592320a1a4f880dee3f73461
              • Instruction Fuzzy Hash: B1617C75A04208AFDB21DFA8CC80EEE77F9EB09710F100199FA94EB291C775A945CF90
              APIs
              • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 01056BBF
              • SafeArrayAllocData.OLEAUT32(?), ref: 01056C18
              • VariantInit.OLEAUT32(?), ref: 01056C2A
              • SafeArrayAccessData.OLEAUT32(?,?), ref: 01056C4A
              • VariantCopy.OLEAUT32(?,?), ref: 01056C9D
              • SafeArrayUnaccessData.OLEAUT32(?), ref: 01056CB1
              • VariantClear.OLEAUT32(?), ref: 01056CC6
              • SafeArrayDestroyData.OLEAUT32(?), ref: 01056CD3
              • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 01056CDC
              • VariantClear.OLEAUT32(?), ref: 01056CEE
              • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 01056CF9
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
              • String ID:
              • API String ID: 2706829360-0
              • Opcode ID: 8a6c6186da7a204fef8767bb9cc79f9432085a3551c05676e361b35e2c517aca
              • Instruction ID: 20778ac4067a5925b4bd946ca1040f3997a225b2f1795dd564035bb7bea1bee9
              • Opcode Fuzzy Hash: 8a6c6186da7a204fef8767bb9cc79f9432085a3551c05676e361b35e2c517aca
              • Instruction Fuzzy Hash: 52415171D0011E9FDF10DFA8D8449EEBFB9EF18354F408069E995E7251CB36AA45CBA0
              APIs
                • Part of subcall function 01002612: GetWindowLongW.USER32(?,000000EB), ref: 01002623
              • GetSystemMetrics.USER32(0000000F), ref: 0108D47C
              • GetSystemMetrics.USER32(0000000F), ref: 0108D49C
              • MoveWindow.USER32(00000003,?,?,?,?,00000000,?,?,?), ref: 0108D6D7
              • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 0108D6F5
              • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 0108D716
              • ShowWindow.USER32(00000003,00000000), ref: 0108D735
              • InvalidateRect.USER32(?,00000000,00000001), ref: 0108D75A
              • DefDlgProcW.USER32(?,00000005,?,?), ref: 0108D77D
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: Window$MessageMetricsSendSystem$InvalidateLongMoveProcRectShow
              • String ID: @U=u
              • API String ID: 1211466189-2594219639
              • Opcode ID: 10c7328bbf652fe557ccb3f7931ebc4b90396da832013c29e5e078ed4c200281
              • Instruction ID: 72aa668c8705793c29816508b259682325ce3cb09831cf74969b324e56afc4ff
              • Opcode Fuzzy Hash: 10c7328bbf652fe557ccb3f7931ebc4b90396da832013c29e5e078ed4c200281
              • Instruction Fuzzy Hash: 0EB19C30604219EFDF14EFA8C5847AD7BF1BF08704F0482A9EDC89A299E735A950CB60
              APIs
                • Part of subcall function 01009837: __itow.LIBCMT ref: 01009862
                • Part of subcall function 01009837: __swprintf.LIBCMT ref: 010098AC
              • CoInitialize.OLE32 ref: 01078403
              • CoUninitialize.OLE32 ref: 0107840E
              • CoCreateInstance.OLE32(?,00000000,00000017,01092BEC,?), ref: 0107846E
              • IIDFromString.OLE32(?,?), ref: 010784E1
              • VariantInit.OLEAUT32(?), ref: 0107857B
              • VariantClear.OLEAUT32(?), ref: 010785DC
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize__itow__swprintf
              • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
              • API String ID: 834269672-1287834457
              • Opcode ID: 701e4a5322e7a52034ef38bd027ab1562c5c101076fc0c933cd8e3074479e152
              • Instruction ID: 7dc07a01de2cfe32f30bdbbe50e831b231eb0bfe29a2aac2bec7fe7cbd5a4d78
              • Opcode Fuzzy Hash: 701e4a5322e7a52034ef38bd027ab1562c5c101076fc0c933cd8e3074479e152
              • Instruction Fuzzy Hash: 78618C70A083129FD711DF64C848FAEBBE8AF49754F04845EF9C59B291CB70E944CB96
              APIs
              • SetWindowLongW.USER32(?,000000EB), ref: 01002EAE
                • Part of subcall function 01001DB3: GetClientRect.USER32(?,?), ref: 01001DDC
                • Part of subcall function 01001DB3: GetWindowRect.USER32(?,?), ref: 01001E1D
                • Part of subcall function 01001DB3: ScreenToClient.USER32(?,?), ref: 01001E45
              • GetDC.USER32 ref: 0103CD32
              • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 0103CD45
              • SelectObject.GDI32(00000000,00000000), ref: 0103CD53
              • SelectObject.GDI32(00000000,00000000), ref: 0103CD68
              • ReleaseDC.USER32(?,00000000), ref: 0103CD70
              • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 0103CDFB
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
              • String ID: @U=u$U
              • API String ID: 4009187628-4110099822
              • Opcode ID: 97dce4dcdebe7b049bd01276e688171cf28f78a9b5993c0f96ed3fb765f96845
              • Instruction ID: 2dd53d21aff614dca8a15c84a65c0aa73f5684a022374557dc74d09c6a9c1f83
              • Opcode Fuzzy Hash: 97dce4dcdebe7b049bd01276e688171cf28f78a9b5993c0f96ed3fb765f96845
              • Instruction Fuzzy Hash: A371D631500105DFEF629F68C988AEE7FB9FF88310F1442ABEDD5AA196C7319851CB60
              APIs
              • WSAStartup.WSOCK32(00000101,?), ref: 01075793
              • inet_addr.WSOCK32(?,?,?), ref: 010757D8
              • gethostbyname.WSOCK32(?), ref: 010757E4
              • IcmpCreateFile.IPHLPAPI ref: 010757F2
              • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 01075862
              • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 01075878
              • IcmpCloseHandle.IPHLPAPI(00000000), ref: 010758ED
              • WSACleanup.WSOCK32 ref: 010758F3
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
              • String ID: Ping
              • API String ID: 1028309954-2246546115
              • Opcode ID: a14de337c2884ff2b97d7cf126f80cb3fe49276e6e280d04ec409e5ab6600467
              • Instruction ID: 82e4017630d2eb9a4c1297990d476322b838467b3c49c67a601d4069de173ead
              • Opcode Fuzzy Hash: a14de337c2884ff2b97d7cf126f80cb3fe49276e6e280d04ec409e5ab6600467
              • Instruction Fuzzy Hash: A5518E71A043019FEB619F28CC45BAABBE4EF49720F048569F9D6EB2D0DB30E900CB55
              APIs
              • SetErrorMode.KERNEL32(00000001), ref: 0106B4D0
              • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 0106B546
              • GetLastError.KERNEL32 ref: 0106B550
              • SetErrorMode.KERNEL32(00000000,READY), ref: 0106B5BD
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: Error$Mode$DiskFreeLastSpace
              • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
              • API String ID: 4194297153-14809454
              • Opcode ID: 658fb7a738edc4dd82e82a8c80ed2103f344cb0eb2104d7ef5403121c559217e
              • Instruction ID: a5e92cbe55e3715f1f04177ed2911ba99f0ea2e2b543832bb6f60c98c385babf
              • Opcode Fuzzy Hash: 658fb7a738edc4dd82e82a8c80ed2103f344cb0eb2104d7ef5403121c559217e
              • Instruction Fuzzy Hash: CC3181B5B002069FDB11EB68C884FEE7BB8FF15314F00816AE685DB291DA719A41CB91
              APIs
              • DeleteObject.GDI32(00000000), ref: 010861EB
              • GetDC.USER32(00000000), ref: 010861F3
              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 010861FE
              • ReleaseDC.USER32(00000000,00000000), ref: 0108620A
              • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 01086246
              • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 01086257
              • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,0108902A,?,?,000000FF,00000000,?,000000FF,?), ref: 01086291
              • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 010862B1
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
              • String ID: @U=u
              • API String ID: 3864802216-2594219639
              • Opcode ID: 737c1c1df55bc45959b43f71c1f9ae6653e46e7b4b84164d34817e97cfcd0d9c
              • Instruction ID: c73816f5f30eadfa38737962b960be78aa2c0416adec3d83b46bb09d705d424f
              • Opcode Fuzzy Hash: 737c1c1df55bc45959b43f71c1f9ae6653e46e7b4b84164d34817e97cfcd0d9c
              • Instruction Fuzzy Hash: EF319172104610BFEF215F64CC4AFEA3FA9EF49765F040095FE88DA181C67A9851CB60
              APIs
              • VariantInit.OLEAUT32(?), ref: 010788D7
              • CoInitialize.OLE32(00000000), ref: 01078904
              • CoUninitialize.OLE32 ref: 0107890E
              • GetRunningObjectTable.OLE32(00000000,?), ref: 01078A0E
              • SetErrorMode.KERNEL32(00000001,00000029), ref: 01078B3B
              • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,01092C0C), ref: 01078B6F
              • CoGetObject.OLE32(?,00000000,01092C0C,?), ref: 01078B92
              • SetErrorMode.KERNEL32(00000000), ref: 01078BA5
              • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 01078C25
              • VariantClear.OLEAUT32(?), ref: 01078C35
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize
              • String ID:
              • API String ID: 2395222682-0
              • Opcode ID: b66a90aa9e884910ee3a3841b319fb5f2f561cd4a1e00200c6487b5e205afe14
              • Instruction ID: b68a2d82c32d96504fd1318f7c8aa7bf3ff24f40d52cb0da7aa5d881b368f178
              • Opcode Fuzzy Hash: b66a90aa9e884910ee3a3841b319fb5f2f561cd4a1e00200c6487b5e205afe14
              • Instruction Fuzzy Hash: 4FC127B1608306AFD700EF68C88896BBBE9FF89248F00895DF5C99B251D771ED05CB56
              APIs
              • SafeArrayGetVartype.OLEAUT32(00000000,?), ref: 01067A6C
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: ArraySafeVartype
              • String ID:
              • API String ID: 1725837607-0
              • Opcode ID: 5e7f767148d2db77e8f15aee97ad918d66cadb34ba6f9dcbddec0ae899188b9c
              • Instruction ID: 7a45c40d7d84c1892c5376cd5e579c1346bfcfa504c69166f31e330b99fd6319
              • Opcode Fuzzy Hash: 5e7f767148d2db77e8f15aee97ad918d66cadb34ba6f9dcbddec0ae899188b9c
              • Instruction Fuzzy Hash: E1B1817190021A9FDB11DFA8C484BFEBBF8FF49329F144469E691E7241D774A941CBA0
              APIs
              • GetCurrentThreadId.KERNEL32 ref: 010611F0
              • GetForegroundWindow.USER32(00000000,?,?,?,?,?,01060268,?,00000001), ref: 01061204
              • GetWindowThreadProcessId.USER32(00000000), ref: 0106120B
              • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,01060268,?,00000001), ref: 0106121A
              • GetWindowThreadProcessId.USER32(?,00000000), ref: 0106122C
              • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,01060268,?,00000001), ref: 01061245
              • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,01060268,?,00000001), ref: 01061257
              • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,01060268,?,00000001), ref: 0106129C
              • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,01060268,?,00000001), ref: 010612B1
              • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,01060268,?,00000001), ref: 010612BC
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: Thread$AttachInput$Window$Process$CurrentForeground
              • String ID:
              • API String ID: 2156557900-0
              • Opcode ID: edbaa102c1eef732edc45983b90d16ac210c057d91a0e16eda342f2e7833c1ed
              • Instruction ID: 43ab99414915e3b4fd71b8c3fd3125610a7ccfd5f1dbb67f94af7578c7a4bcb2
              • Opcode Fuzzy Hash: edbaa102c1eef732edc45983b90d16ac210c057d91a0e16eda342f2e7833c1ed
              • Instruction Fuzzy Hash: B831C1B560420ABFEB319F68D848F6D37EDEF98319F104255F9C0C6286D77A99608F50
              APIs
              • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 0100FAA6
              • OleUninitialize.OLE32(?,00000000), ref: 0100FB45
              • UnregisterHotKey.USER32(?), ref: 0100FC9C
              • DestroyWindow.USER32(?), ref: 010445D6
              • FreeLibrary.KERNEL32(?), ref: 0104463B
              • VirtualFree.KERNEL32(?,00000000,00008000), ref: 01044668
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
              • String ID: close all
              • API String ID: 469580280-3243417748
              • Opcode ID: fdb64ce5735863d13354e0620dfe178a66eb21c3c47774ef5bac9ffefc72be03
              • Instruction ID: 8aca6994cbaa6e76627a8fd16677e76a83eac3f23fd3a9afb6a0b34dbf7d9bf6
              • Opcode Fuzzy Hash: fdb64ce5735863d13354e0620dfe178a66eb21c3c47774ef5bac9ffefc72be03
              • Instruction Fuzzy Hash: 21A18F70701213CFEB2AEF14C594BA9F7A4BF15710F5442ADE98AAB291CB30AD16CF51
              APIs
              • EnumChildWindows.USER32(?,0105A439), ref: 0105A377
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: ChildEnumWindows
              • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
              • API String ID: 3555792229-1603158881
              • Opcode ID: d265026ea0f1047a2f5891dd5708932b08b22683d4dd80cd6e3dcc4d674041da
              • Instruction ID: e0f5b1a44df43e86d7e5038691addc35221b256dd0f7bf3813cb2c4744e0eaaa
              • Opcode Fuzzy Hash: d265026ea0f1047a2f5891dd5708932b08b22683d4dd80cd6e3dcc4d674041da
              • Instruction Fuzzy Hash: A491B530700616EADB88DFA4C491BEEFBB4BF14354F448259DDDAA7180DB316999CBA0
              APIs
              • IsWindow.USER32(01585958), ref: 0108B3EB
              • IsWindowEnabled.USER32(01585958), ref: 0108B3F7
              • SendMessageW.USER32(?,0000041C,00000000,00000000), ref: 0108B4DB
              • SendMessageW.USER32(01585958,000000B0,?,?), ref: 0108B512
              • IsDlgButtonChecked.USER32(?,?), ref: 0108B54F
              • GetWindowLongW.USER32(01585958,000000EC), ref: 0108B571
              • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 0108B589
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: MessageSendWindow$ButtonCheckedEnabledLong
              • String ID: @U=u
              • API String ID: 4072528602-2594219639
              • Opcode ID: 351fa4997a6e3ef10dbcb6910c6b78d4a0e3b2d1c344fbe5826a9376000e59b4
              • Instruction ID: d8a7724c12fdec2eb81dc5e423d5967ac1e3e3a3f0801411426e9e92f528029d
              • Opcode Fuzzy Hash: 351fa4997a6e3ef10dbcb6910c6b78d4a0e3b2d1c344fbe5826a9376000e59b4
              • Instruction Fuzzy Hash: 5D71C034608205EFEB61AF6CC895FBA7BF5FF09310F145199EAC297291CB36A851CB50
              APIs
              • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 01086E24
              • SendMessageW.USER32(?,00001036,00000000,?), ref: 01086E38
              • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 01086E52
              • _wcscat.LIBCMT ref: 01086EAD
              • SendMessageW.USER32(?,00001057,00000000,?), ref: 01086EC4
              • SendMessageW.USER32(?,00001061,?,0000000F), ref: 01086EF2
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: MessageSend$Window_wcscat
              • String ID: @U=u$SysListView32
              • API String ID: 307300125-1908207174
              • Opcode ID: 89a365e4ba2025e412cb93220fc36fa72b57083623644ca55dd0cf038eaf8f6c
              • Instruction ID: 52c93fa13b074d736fbe54493b6cc2a2707bf22ab90812e434cb6196e1a1d6f0
              • Opcode Fuzzy Hash: 89a365e4ba2025e412cb93220fc36fa72b57083623644ca55dd0cf038eaf8f6c
              • Instruction Fuzzy Hash: B641A471904349EFEB21EF68CC84BEE77E8EF08354F11056AF5C4E7291D67299848B60
              APIs
              • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 01071A50
              • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 01071A7C
              • InternetQueryOptionW.WININET(00000000,0000001F,00000000,?), ref: 01071ABE
              • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 01071AD3
              • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 01071AE0
              • HttpQueryInfoW.WININET(00000000,00000005,?,?,00000000), ref: 01071B10
              • InternetCloseHandle.WININET(00000000), ref: 01071B57
                • Part of subcall function 01072483: GetLastError.KERNEL32(?,?,01071817,00000000,00000000,00000001), ref: 01072498
                • Part of subcall function 01072483: SetEvent.KERNEL32(?,?,01071817,00000000,00000000,00000001), ref: 010724AD
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: Internet$Http$OptionQueryRequest$CloseConnectErrorEventHandleInfoLastOpenSend
              • String ID:
              • API String ID: 2603140658-3916222277
              • Opcode ID: 0bf84c6ecdc45251d37a217dd7b48d18f64f4831e3df8d56b0a40dc8300ba7c3
              • Instruction ID: 553d90a7ea787bad727d3d3c4522d027e8e09b27801c1f41b0cf9949adea94c6
              • Opcode Fuzzy Hash: 0bf84c6ecdc45251d37a217dd7b48d18f64f4831e3df8d56b0a40dc8300ba7c3
              • Instruction Fuzzy Hash: 1B4172B1900219BFFB129F64CC89FFE7BACFF08354F004156FA859A181E7759A448BA4
              APIs
              • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 010862EC
              • GetWindowLongW.USER32(01585958,000000F0), ref: 0108631F
              • GetWindowLongW.USER32(01585958,000000F0), ref: 01086354
              • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 01086386
              • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 010863B0
              • GetWindowLongW.USER32(00000000,000000F0), ref: 010863C1
              • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 010863DB
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: LongWindow$MessageSend
              • String ID: @U=u
              • API String ID: 2178440468-2594219639
              • Opcode ID: 60fae286e980bf744d12b42ce6aa486da3b10984fdc2832c398e4420514f0d4b
              • Instruction ID: bc40052f4914aaa399f964c87deb2579e1b5652aeb6c8ca5741b4b8631c0e834
              • Opcode Fuzzy Hash: 60fae286e980bf744d12b42ce6aa486da3b10984fdc2832c398e4420514f0d4b
              • Instruction Fuzzy Hash: B6313434608251AFDB21DF28DC84F593BE1FB4A714F1A81A4F5C09F2B6CB77A8449B50
              APIs
              • GetModuleFileNameW.KERNEL32(?,?,00000104,?,0108F910), ref: 01078D28
              • FreeLibrary.KERNEL32(00000000,00000001,00000000,?,0108F910), ref: 01078D5C
              • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 01078ED6
              • SysFreeString.OLEAUT32(?), ref: 01078F00
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: Free$FileLibraryModuleNamePathQueryStringType
              • String ID:
              • API String ID: 560350794-0
              • Opcode ID: 453d788218a377553aa8872045c6543551706aaa920781126465411afe4ba1dd
              • Instruction ID: e9c1d6e0c43c3f571f895059c071fe6c5e3d940e68cd296eca455dcdf3acbf07
              • Opcode Fuzzy Hash: 453d788218a377553aa8872045c6543551706aaa920781126465411afe4ba1dd
              • Instruction Fuzzy Hash: F6F16871A00109AFDF45DF98C888EEEBBB9FF45314F108499F985AB251DB31AE41CB90
              APIs
              • _memset.LIBCMT ref: 0107F6B5
              • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 0107F848
              • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 0107F86C
              • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0107F8AC
              • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0107F8CE
              • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 0107FA4A
              • GetLastError.KERNEL32(00000000,00000001,00000000), ref: 0107FA7C
              • CloseHandle.KERNEL32(?), ref: 0107FAAB
              • CloseHandle.KERNEL32(?), ref: 0107FB22
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: Directory$CloseCurrentHandleSystem$CreateErrorLastProcess_memset
              • String ID:
              • API String ID: 4090791747-0
              • Opcode ID: 76d3c8271faca5342507c4521910d6c170a84a38f26e853146a8483bd2e81e9d
              • Instruction ID: 21cd7163b27f52cb869d7f422be9533d5e4e9537bc2c9283eaf4d6e96f1c80a6
              • Opcode Fuzzy Hash: 76d3c8271faca5342507c4521910d6c170a84a38f26e853146a8483bd2e81e9d
              • Instruction Fuzzy Hash: B3E1CF716043029FDB15EF28C880AAEBBE1BF84354F04855DE8E99B2A1CB31ED45CB56
              APIs
                • Part of subcall function 0106466E: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,01063697,?), ref: 0106468B
                • Part of subcall function 0106466E: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,01063697,?), ref: 010646A4
                • Part of subcall function 01064A31: GetFileAttributesW.KERNEL32(?,0106370B), ref: 01064A32
              • lstrcmpiW.KERNEL32(?,?), ref: 01064D40
              • _wcscmp.LIBCMT ref: 01064D5A
              • MoveFileW.KERNEL32(?,?), ref: 01064D75
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: FileFullNamePath$AttributesMove_wcscmplstrcmpi
              • String ID:
              • API String ID: 793581249-0
              • Opcode ID: 6641ffe18eb0bda883b364b3fb50fc32761bfaea4a1ddbda2c58f8f502c70fe5
              • Instruction ID: 399db2bd63814794e08de26e114325aa3739ea51eb66fa2063aa8702d41ac5f7
              • Opcode Fuzzy Hash: 6641ffe18eb0bda883b364b3fb50fc32761bfaea4a1ddbda2c58f8f502c70fe5
              • Instruction Fuzzy Hash: 085153B24083469BD765EBA4DC809DFB7ECAF95250F00092EE2C9D3151EF75A288C766
              APIs
                • Part of subcall function 0105A82C: GetWindowThreadProcessId.USER32(?,00000000), ref: 0105A84C
                • Part of subcall function 0105A82C: GetCurrentThreadId.KERNEL32 ref: 0105A853
                • Part of subcall function 0105A82C: AttachThreadInput.USER32(00000000,?,01059683,?,00000001), ref: 0105A85A
              • MapVirtualKeyW.USER32(00000025,00000000), ref: 0105968E
              • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 010596AB
              • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000,?,00000001), ref: 010596AE
              • MapVirtualKeyW.USER32(00000025,00000000), ref: 010596B7
              • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 010596D5
              • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 010596D8
              • MapVirtualKeyW.USER32(00000025,00000000), ref: 010596E1
              • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 010596F8
              • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 010596FB
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
              • String ID:
              • API String ID: 2014098862-0
              • Opcode ID: 5e0e82ebc47ceccb11140349a6d7e3b0382f8f5071ebebe09cb45ecab93090f5
              • Instruction ID: c7ee52714aea136381e6a7c19ab89c973f4ff678bcfcb1c3f08162fb1862c805
              • Opcode Fuzzy Hash: 5e0e82ebc47ceccb11140349a6d7e3b0382f8f5071ebebe09cb45ecab93090f5
              • Instruction Fuzzy Hash: C811CBB1A10219BEFB206B709C89FAB3E2DEB4C7A4F100515F6C4AB094C9F35C10CBA4
              APIs
              • GetProcessHeap.KERNEL32(00000008,0000000C,00000000,00000000,?,0105853C,00000B00,?,?), ref: 0105892A
              • HeapAlloc.KERNEL32(00000000,?,0105853C,00000B00,?,?), ref: 01058931
              • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,0105853C,00000B00,?,?), ref: 01058946
              • GetCurrentProcess.KERNEL32(?,00000000,?,0105853C,00000B00,?,?), ref: 0105894E
              • DuplicateHandle.KERNEL32(00000000,?,0105853C,00000B00,?,?), ref: 01058951
              • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,0105853C,00000B00,?,?), ref: 01058961
              • GetCurrentProcess.KERNEL32(0105853C,00000000,?,0105853C,00000B00,?,?), ref: 01058969
              • DuplicateHandle.KERNEL32(00000000,?,0105853C,00000B00,?,?), ref: 0105896C
              • CreateThread.KERNEL32(00000000,00000000,01058992,00000000,00000000,00000000), ref: 01058986
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
              • String ID:
              • API String ID: 1957940570-0
              • Opcode ID: 8b81657ba4268f4fa5a6b3e67742f79f70211fa87402297a281157949be743e4
              • Instruction ID: c5f322a8d52484116ca94c087ee0911f604a62bfb11a73a300dad8594c9f94ac
              • Opcode Fuzzy Hash: 8b81657ba4268f4fa5a6b3e67742f79f70211fa87402297a281157949be743e4
              • Instruction Fuzzy Hash: 8301BF75244305BFEB20ABB5DC8DF5B7B6CEB89711F408411FA45DB195C6799810CB20
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID:
              • String ID: NULL Pointer assignment$Not an Object type
              • API String ID: 0-572801152
              • Opcode ID: 6684ce3b65b6176fe534eb721ae7c9917d98dd1948bdf07c860506c5993e703a
              • Instruction ID: 66f6665531e1af64137685305ce0535ec6bd34f553ff5fa06f26dabcb6789a46
              • Opcode Fuzzy Hash: 6684ce3b65b6176fe534eb721ae7c9917d98dd1948bdf07c860506c5993e703a
              • Instruction Fuzzy Hash: FFC19671E0020A9FDF10DF98C984AEEB7F5FF48328F148469E985AB241E771AD45CB54
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: Variant$ClearInit$_memset
              • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
              • API String ID: 2862541840-625585964
              • Opcode ID: 36f18618aacd909d3e8dd0bc1c905b202d13b13deb9e968a240f184d22c5833b
              • Instruction ID: eec80c4395ac14ddda839b8fa7dd2d8fcdae33b3d6f6aa270891f5bbae6de217
              • Opcode Fuzzy Hash: 36f18618aacd909d3e8dd0bc1c905b202d13b13deb9e968a240f184d22c5833b
              • Instruction Fuzzy Hash: 2C919071E00219EBDF24DFA5C848FAEBBB8EF45728F008159F595AB290D7709901CFA4
              APIs
                • Part of subcall function 0105710A: CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,01057044,80070057,?,?,?,01057455), ref: 01057127
                • Part of subcall function 0105710A: ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,01057044,80070057,?,?), ref: 01057142
                • Part of subcall function 0105710A: lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,01057044,80070057,?,?), ref: 01057150
                • Part of subcall function 0105710A: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,01057044,80070057,?), ref: 01057160
              • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,?,?,?), ref: 01079806
              • _memset.LIBCMT ref: 01079813
              • _memset.LIBCMT ref: 01079956
              • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,00000000), ref: 01079982
              • CoTaskMemFree.OLE32(?), ref: 0107998D
              Strings
              • NULL Pointer assignment, xrefs: 010799DB
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: FreeFromProgTask_memset$CreateInitializeInstanceSecuritylstrcmpi
              • String ID: NULL Pointer assignment
              • API String ID: 1300414916-2785691316
              • Opcode ID: 9d99834163376d66ef815d1273c860008df0001adb230f11d21af30c6aa2e6cf
              • Instruction ID: d4e2370225acfc05556592f47df4a79c58edbbb9a85f5a487263beda37112d9a
              • Opcode Fuzzy Hash: 9d99834163376d66ef815d1273c860008df0001adb230f11d21af30c6aa2e6cf
              • Instruction Fuzzy Hash: 38913A71D0021AEBDF11DFA5DC40EDEBBB9BF08324F10415AE559A7290EB715A44CFA0
              APIs
                • Part of subcall function 01063C55: CreateToolhelp32Snapshot.KERNEL32 ref: 01063C7A
                • Part of subcall function 01063C55: Process32FirstW.KERNEL32(00000000,?), ref: 01063C88
                • Part of subcall function 01063C55: CloseHandle.KERNEL32(00000000), ref: 01063D52
              • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0107E9A4
              • GetLastError.KERNEL32 ref: 0107E9B7
              • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0107E9E6
              • TerminateProcess.KERNEL32(00000000,00000000), ref: 0107EA63
              • GetLastError.KERNEL32(00000000), ref: 0107EA6E
              • CloseHandle.KERNEL32(00000000), ref: 0107EAA3
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
              • String ID: SeDebugPrivilege
              • API String ID: 2533919879-2896544425
              • Opcode ID: 1a1fbd4837bff9577a66bab08816cc4db212b3cdd31e52db760f793792faa83e
              • Instruction ID: 2d0e115f99a0b3cd284e70f8ddeec35f3070b5d9b1389e35b0e26e9972261c81
              • Opcode Fuzzy Hash: 1a1fbd4837bff9577a66bab08816cc4db212b3cdd31e52db760f793792faa83e
              • Instruction Fuzzy Hash: 37419071604202AFDB15EF24C894FAEB7E5BF54314F048498E9C69F3C2CB75A904CB95
              APIs
              • ShowWindow.USER32(010C57B0,00000000,01585958,?,?,010C57B0,?,0108B5A8,?,?), ref: 0108B712
              • EnableWindow.USER32(00000000,00000000), ref: 0108B736
              • ShowWindow.USER32(010C57B0,00000000,01585958,?,?,010C57B0,?,0108B5A8,?,?), ref: 0108B796
              • ShowWindow.USER32(00000000,00000004,?,0108B5A8,?,?), ref: 0108B7A8
              • EnableWindow.USER32(00000000,00000001), ref: 0108B7CC
              • SendMessageW.USER32(?,0000130C,?,00000000), ref: 0108B7EF
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: Window$Show$Enable$MessageSend
              • String ID: @U=u
              • API String ID: 642888154-2594219639
              • Opcode ID: a78fe1c748d981869307dcb20035091ca9b60ed42d18ff177c3360c4e08e34fb
              • Instruction ID: 841e2b84d2c9c6302d57283687ddd470d06768fc3c9f0b61e99e7b654ecdf3ca
              • Opcode Fuzzy Hash: a78fe1c748d981869307dcb20035091ca9b60ed42d18ff177c3360c4e08e34fb
              • Instruction Fuzzy Hash: D7418334608241AFDB62EF28C499B957FE0FF09314F1C41E9EAC88F666C735A456CB50
              APIs
              • LoadIconW.USER32(00000000,00007F03), ref: 01063033
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: IconLoad
              • String ID: blank$info$question$stop$warning
              • API String ID: 2457776203-404129466
              • Opcode ID: b4170f89dff30e7e87dece0eb671b91f3227e3d1112966734720107ba1195b45
              • Instruction ID: 9ea4d76a538513252f6abbba3e4c27b190094c13a6f035e51048458472a1a55f
              • Opcode Fuzzy Hash: b4170f89dff30e7e87dece0eb671b91f3227e3d1112966734720107ba1195b45
              • Instruction Fuzzy Hash: E5112731348347BEFB159A59DC91CEF7BDCEF15330B10406AFA88AE181EB716A4456E0
              APIs
              • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 01064312
              • LoadStringW.USER32(00000000), ref: 01064319
              • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 0106432F
              • LoadStringW.USER32(00000000), ref: 01064336
              • _wprintf.LIBCMT ref: 0106435C
              • MessageBoxW.USER32(00000000,?,?,00011010), ref: 0106437A
              Strings
              • %s (%d) : ==> %s: %s %s, xrefs: 01064357
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: HandleLoadModuleString$Message_wprintf
              • String ID: %s (%d) : ==> %s: %s %s
              • API String ID: 3648134473-3128320259
              • Opcode ID: 9e93e1ecdadbf2892655b6f5ef660d800c6302e1d5a704bcd42f70e1342fb8d6
              • Instruction ID: 6c45f50922db8b610375a1ea0b134b3d805cac53559bd485e2940452d8822e81
              • Opcode Fuzzy Hash: 9e93e1ecdadbf2892655b6f5ef660d800c6302e1d5a704bcd42f70e1342fb8d6
              • Instruction Fuzzy Hash: 2501A2F2804209BFE720A7B0DD88EFA776CEB08210F000591B7C5E6001EA395E944B70
              APIs
              • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,0103C1C7,00000004,00000000,00000000,00000000), ref: 01002ACF
              • ShowWindow.USER32(FFFFFFFF,00000000,00000000,00000000,?,0103C1C7,00000004,00000000,00000000,00000000,000000FF), ref: 01002B17
              • ShowWindow.USER32(FFFFFFFF,00000006,00000000,00000000,?,0103C1C7,00000004,00000000,00000000,00000000), ref: 0103C21A
              • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,0103C1C7,00000004,00000000,00000000,00000000), ref: 0103C286
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: ShowWindow
              • String ID:
              • API String ID: 1268545403-0
              • Opcode ID: d767402e229c2118dfda7f37263b5079a4f61caf61f5e9b8b54da505ad7c50ab
              • Instruction ID: 05b76ff3c15bac42d666552f512fc0ab3a176d78f24a53f63b334b813a062aae
              • Opcode Fuzzy Hash: d767402e229c2118dfda7f37263b5079a4f61caf61f5e9b8b54da505ad7c50ab
              • Instruction Fuzzy Hash: B441E6306086809BFBB79B3C8D8CB6F7ED5AB86304F15888AE1C6D65D0CA75A4C5C720
              APIs
              • InterlockedExchange.KERNEL32(?,000001F5), ref: 010670DD
                • Part of subcall function 01020DB6: std::exception::exception.LIBCMT ref: 01020DEC
                • Part of subcall function 01020DB6: __CxxThrowException@8.LIBCMT ref: 01020E01
              • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,?,00000000), ref: 01067114
              • EnterCriticalSection.KERNEL32(?), ref: 01067130
              • _memmove.LIBCMT ref: 0106717E
              • _memmove.LIBCMT ref: 0106719B
              • LeaveCriticalSection.KERNEL32(?), ref: 010671AA
              • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,00000000,00000000), ref: 010671BF
              • InterlockedExchange.KERNEL32(?,000001F6), ref: 010671DE
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: CriticalExchangeFileInterlockedReadSection_memmove$EnterException@8LeaveThrowstd::exception::exception
              • String ID:
              • API String ID: 256516436-0
              • Opcode ID: fd65f971f4501dd3da4abcc56081cafc295456cffd1f1935dc5fd47bd9be4392
              • Instruction ID: 5c98958581574dce63aea470abed39478bebfa236793a08e0244d74840cb506c
              • Opcode Fuzzy Hash: fd65f971f4501dd3da4abcc56081cafc295456cffd1f1935dc5fd47bd9be4392
              • Instruction Fuzzy Hash: B0318171900216EBDF10EFA8DC849AEB7B9EF45714F1441A5ED849B24ADB359A10CB60
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: _memcmp
              • String ID:
              • API String ID: 2931989736-0
              • Opcode ID: a4f6f650a788321d26a547fc563b9346cc083b8a4fb83bd6e4534c654231bee3
              • Instruction ID: a863fbb9110bfd04a20889ce09dfa441f589aea6380cd8601bf794de6f066425
              • Opcode Fuzzy Hash: a4f6f650a788321d26a547fc563b9346cc083b8a4fb83bd6e4534c654231bee3
              • Instruction Fuzzy Hash: 152104B120121E7BBB9466169D51FFF7B9E9E10148F044024FDC89A203EFA4FE10C1A5
              APIs
                • Part of subcall function 01009837: __itow.LIBCMT ref: 01009862
                • Part of subcall function 01009837: __swprintf.LIBCMT ref: 010098AC
                • Part of subcall function 0101FC86: _wcscpy.LIBCMT ref: 0101FCA9
              • _wcstok.LIBCMT ref: 0106EC94
              • _wcscpy.LIBCMT ref: 0106ED23
              • _memset.LIBCMT ref: 0106ED56
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: _wcscpy$__itow__swprintf_memset_wcstok
              • String ID: X
              • API String ID: 774024439-3081909835
              • Opcode ID: 61bf10e0073bf6107d66326ce5115685e69588aa2eb9e9a317d3b41b1fe73295
              • Instruction ID: 9d25df2575fb0143dca32b672d207f4f30f778a1eeb2e20aa2f17889f3028467
              • Opcode Fuzzy Hash: 61bf10e0073bf6107d66326ce5115685e69588aa2eb9e9a317d3b41b1fe73295
              • Instruction Fuzzy Hash: 55C18E755043029FD755EF28C880A9ABBE8FF95324F00496DF9D99B2A1DB30ED45CB82
              APIs
              • __WSAFDIsSet.WSOCK32(00000000,?,00000000,00000000,?,00000064,00000000), ref: 01076C00
              • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 01076C21
              • WSAGetLastError.WSOCK32(00000000), ref: 01076C34
              • htons.WSOCK32(?,?,?,00000000,?), ref: 01076CEA
              • inet_ntoa.WSOCK32(?), ref: 01076CA7
                • Part of subcall function 0105A7E9: _strlen.LIBCMT ref: 0105A7F3
                • Part of subcall function 0105A7E9: _memmove.LIBCMT ref: 0105A815
              • _strlen.LIBCMT ref: 01076D44
              • _memmove.LIBCMT ref: 01076DAD
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: _memmove_strlen$ErrorLasthtonsinet_ntoa
              • String ID:
              • API String ID: 3619996494-0
              • Opcode ID: ed5a0e329fa8e9c3bf8beecbe53d39810fce6ceaf1f44a902cf6b43da5656e58
              • Instruction ID: 6629914f28b82314c813c53fd872dec8eb5a8a36eb9174c042266fc65ca46463
              • Opcode Fuzzy Hash: ed5a0e329fa8e9c3bf8beecbe53d39810fce6ceaf1f44a902cf6b43da5656e58
              • Instruction Fuzzy Hash: A581F071904702AFE711FB24CC80EAFB7E8AF95314F408919FAC69B2D1DA71AD40CB95
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 3661c0795a23fcb1a859983b8b6b087785cde26d2eb93801005c42f3b1efa6ad
              • Instruction ID: 920a7005f9e7f4ce34ad0acdb14cbef962e5d74a999b793f92f5626f4c45d20b
              • Opcode Fuzzy Hash: 3661c0795a23fcb1a859983b8b6b087785cde26d2eb93801005c42f3b1efa6ad
              • Instruction Fuzzy Hash: A7718E30904109EFEB16CF98C884ABEBFB9FF85314F148159F995AA291C734EA51CF60
              APIs
              • _memset.LIBCMT ref: 0107F448
              • _memset.LIBCMT ref: 0107F511
              • ShellExecuteExW.SHELL32(?), ref: 0107F556
                • Part of subcall function 01009837: __itow.LIBCMT ref: 01009862
                • Part of subcall function 01009837: __swprintf.LIBCMT ref: 010098AC
                • Part of subcall function 0101FC86: _wcscpy.LIBCMT ref: 0101FCA9
              • GetProcessId.KERNEL32(00000000), ref: 0107F5CD
              • CloseHandle.KERNEL32(00000000), ref: 0107F5FC
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: _memset$CloseExecuteHandleProcessShell__itow__swprintf_wcscpy
              • String ID: @
              • API String ID: 3522835683-2766056989
              • Opcode ID: 2d91a3a9b4b020105c08260f8e044245e533a99acd823aa81907c4b552d35acc
              • Instruction ID: e94f4d4605ffb5414af612ec9dce870a9aaab0c2f9e01dea0b93b9fc5bc1ea56
              • Opcode Fuzzy Hash: 2d91a3a9b4b020105c08260f8e044245e533a99acd823aa81907c4b552d35acc
              • Instruction Fuzzy Hash: 93618FB5E0061ADFDB15DF68C4809AEBBF5FF48314F148059D9A9AB391CB30AE41CB94
              APIs
              • GetParent.USER32(?), ref: 01060F8C
              • GetKeyboardState.USER32(?), ref: 01060FA1
              • SetKeyboardState.USER32(?), ref: 01061002
              • PostMessageW.USER32(?,00000101,00000010,?), ref: 01061030
              • PostMessageW.USER32(?,00000101,00000011,?), ref: 0106104F
              • PostMessageW.USER32(?,00000101,00000012,?), ref: 01061095
              • PostMessageW.USER32(?,00000101,0000005B,?), ref: 010610B8
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: MessagePost$KeyboardState$Parent
              • String ID:
              • API String ID: 87235514-0
              • Opcode ID: 6aa9b7258b6920c7c9c539245a48360a51cd433369faba231f2c8becb5ab4aab
              • Instruction ID: 8894a9990ac26f7a5044af1e999be3688dc6001c427bc80efc5196d43b90e9f1
              • Opcode Fuzzy Hash: 6aa9b7258b6920c7c9c539245a48360a51cd433369faba231f2c8becb5ab4aab
              • Instruction Fuzzy Hash: AE51D1B06486D63DFB7642388805BBABEED5B46304F0885C9F2D4898D3C2E9E8D4D751
              APIs
              • GetParent.USER32(00000000), ref: 01060DA5
              • GetKeyboardState.USER32(?), ref: 01060DBA
              • SetKeyboardState.USER32(?), ref: 01060E1B
              • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 01060E47
              • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 01060E64
              • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 01060EA8
              • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 01060EC9
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: MessagePost$KeyboardState$Parent
              • String ID:
              • API String ID: 87235514-0
              • Opcode ID: 29fa33ced8bf63aa798af0cfdf8103735ff284c86fc012a81d034e3fd9a191d4
              • Instruction ID: 98b42c63e9b3316432c6bae3e6b202a84ee5966b6ccbfb9cdbfeaf5128fff083
              • Opcode Fuzzy Hash: 29fa33ced8bf63aa798af0cfdf8103735ff284c86fc012a81d034e3fd9a191d4
              • Instruction Fuzzy Hash: D851E6B05887D63DFB7683388C45BBA7FED5B06300F0885C9F2D5468C6D3A5A898D760
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: _wcsncpy$LocalTime
              • String ID:
              • API String ID: 2945705084-0
              • Opcode ID: d20d9df344d8605f9d4de32e4552c3168b022097b97d7d5f4b89456c30d669ad
              • Instruction ID: bb4adc7bacfd90e230fe733efaf0ff59d308d97c52adb6ffacfc393eae1c5170
              • Opcode Fuzzy Hash: d20d9df344d8605f9d4de32e4552c3168b022097b97d7d5f4b89456c30d669ad
              • Instruction Fuzzy Hash: 2B419365C1022576CB11EBF49C859CFB7BCAF18310F508956F598E3220FB38A695C7AA
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID:
              • String ID: @U=u
              • API String ID: 0-2594219639
              • Opcode ID: 26fca6c63de2f5236d3d1ba29b2cbb4a761a737bc28fc446cf6af94085329082
              • Instruction ID: 5764c1f25e71a97479c2a8a53daf67062ca3087e417f83c56666dfaff18914e9
              • Opcode Fuzzy Hash: 26fca6c63de2f5236d3d1ba29b2cbb4a761a737bc28fc446cf6af94085329082
              • Instruction Fuzzy Hash: 85419235B08104EFEB60EA78CC48FA9BFE4EB09350F1502A6FAD5A76D1C734A951DB50
              APIs
                • Part of subcall function 0106466E: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,01063697,?), ref: 0106468B
                • Part of subcall function 0106466E: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,01063697,?), ref: 010646A4
              • lstrcmpiW.KERNEL32(?,?), ref: 010636B7
              • _wcscmp.LIBCMT ref: 010636D3
              • MoveFileW.KERNEL32(?,?), ref: 010636EB
              • _wcscat.LIBCMT ref: 01063733
              • SHFileOperationW.SHELL32(?), ref: 0106379F
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: FileFullNamePath$MoveOperation_wcscat_wcscmplstrcmpi
              • String ID: \*.*
              • API String ID: 1377345388-1173974218
              • Opcode ID: 6eafc0106a0cade2db5407317443479dea2db9c5521151696f2671a6243d7d02
              • Instruction ID: 7743cd8fd7a4de8a24333a57dd06425fce7b19c052d6c16aeac98d2391c38456
              • Opcode Fuzzy Hash: 6eafc0106a0cade2db5407317443479dea2db9c5521151696f2671a6243d7d02
              • Instruction Fuzzy Hash: 02416F71508345AED762EF64D4419DFBBECBF98280F00496EF4DAC7250EA34D689C752
              APIs
              • _memset.LIBCMT ref: 010872AA
              • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 01087351
              • IsMenu.USER32(?), ref: 01087369
              • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 010873B1
              • DrawMenuBar.USER32 ref: 010873C4
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: Menu$Item$DrawInfoInsert_memset
              • String ID: 0
              • API String ID: 3866635326-4108050209
              • Opcode ID: 2540ea83951bb802bf006c3ea580e0032dfa79550583620b7da8f2e9448a1bb5
              • Instruction ID: 347e1d4a46f859fcc16919ab35e9cda1ffbf8e4916ff4770f92f6d819b61daae
              • Opcode Fuzzy Hash: 2540ea83951bb802bf006c3ea580e0032dfa79550583620b7da8f2e9448a1bb5
              • Instruction Fuzzy Hash: 8B415875A04209EFDB21EF64D885A9EBBF8FB04310F248069FEC5A7254C731A950CF61
              APIs
              • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?), ref: 01080FD4
              • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 01080FFE
              • FreeLibrary.KERNEL32(00000000), ref: 010810B5
                • Part of subcall function 01080FA5: RegCloseKey.ADVAPI32(?), ref: 0108101B
                • Part of subcall function 01080FA5: FreeLibrary.KERNEL32(?), ref: 0108106D
                • Part of subcall function 01080FA5: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 01081090
              • RegDeleteKeyW.ADVAPI32(?,?), ref: 01081058
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: EnumFreeLibrary$CloseDeleteOpen
              • String ID:
              • API String ID: 395352322-0
              • Opcode ID: b9b6669e892507326399f8bf340e0a13f5a2627ba13de04d7f32fc8732f5dadc
              • Instruction ID: 782c7ab80a2b4bfa7d555f996d716f2fbfd0ccf92f04d48da9602c9831bedf52
              • Opcode Fuzzy Hash: b9b6669e892507326399f8bf340e0a13f5a2627ba13de04d7f32fc8732f5dadc
              • Instruction Fuzzy Hash: B3312171A04119BFEB259FA4DC85EFFBBBCEF08310F1001A9F581E2140D6755A869F60
              APIs
              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 0105DB2E
              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 0105DB54
              • SysAllocString.OLEAUT32(00000000), ref: 0105DB57
              • SysAllocString.OLEAUT32(?), ref: 0105DB75
              • SysFreeString.OLEAUT32(?), ref: 0105DB7E
              • StringFromGUID2.OLE32(?,?,00000028), ref: 0105DBA3
              • SysAllocString.OLEAUT32(?), ref: 0105DBB1
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
              • String ID:
              • API String ID: 3761583154-0
              • Opcode ID: 928c9f57c7db1bf4efde947700a4c46a07595254f603c3392657e6540f9735a2
              • Instruction ID: 2f6b6b79b9ee57e71b2c60ff8bda75acdf019c150dba3b9102c5fe3b7d9b8cef
              • Opcode Fuzzy Hash: 928c9f57c7db1bf4efde947700a4c46a07595254f603c3392657e6540f9735a2
              • Instruction Fuzzy Hash: 1B21713660421AEFEF50AEF8DC88CBF77EDEB09260B008166FD94DB251DA749C418760
              APIs
                • Part of subcall function 01077D8B: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 01077DB6
              • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 010761C6
              • WSAGetLastError.WSOCK32(00000000), ref: 010761D5
              • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 0107620E
              • connect.WSOCK32(00000000,?,00000010), ref: 01076217
              • WSAGetLastError.WSOCK32 ref: 01076221
              • closesocket.WSOCK32(00000000), ref: 0107624A
              • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 01076263
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: ErrorLastioctlsocket$closesocketconnectinet_addrsocket
              • String ID:
              • API String ID: 910771015-0
              • Opcode ID: 67d88dad8b1cb9a38e1c37e517faa0be672454b6ead37289c1e2856f3b11fa60
              • Instruction ID: ee18e44304a962e44cb746e2948dcf9755f57e2fbe23b3a84b0897ba3a3345d9
              • Opcode Fuzzy Hash: 67d88dad8b1cb9a38e1c37e517faa0be672454b6ead37289c1e2856f3b11fa60
              • Instruction Fuzzy Hash: CB31D571A00519AFFF50AF64C888FBE7BACEF44754F048059FD86E7281CB75A9048B65
              APIs
                • Part of subcall function 01007DE1: _memmove.LIBCMT ref: 01007E22
                • Part of subcall function 0105AA99: GetClassNameW.USER32(?,?,000000FF), ref: 0105AABC
              • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 01058F14
              • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 01058F27
              • SendMessageW.USER32(?,00000189,?,00000000), ref: 01058F57
                • Part of subcall function 01007BCC: _memmove.LIBCMT ref: 01007C06
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: MessageSend$_memmove$ClassName
              • String ID: @U=u$ComboBox$ListBox
              • API String ID: 365058703-2258501812
              • Opcode ID: 3f7d8df04ff107bcbc6cd688da015e44cd2e062dbc1f98d97e5b531108673dab
              • Instruction ID: bb4e70e1051deb094d4e37ac2e7a95e02384178b6f776653bf682f441bc14e66
              • Opcode Fuzzy Hash: 3f7d8df04ff107bcbc6cd688da015e44cd2e062dbc1f98d97e5b531108673dab
              • Instruction Fuzzy Hash: 1721F571A00105BEEB55AB758C84DFF7B69DB19360F00821AFDD5971E0DB3918098B10
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: __wcsnicmp
              • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
              • API String ID: 1038674560-2734436370
              • Opcode ID: f943f2cb7c56b0035621571be8fa5bb222092fa646294fac6896136dfbc7f009
              • Instruction ID: 0d01db56407f7f496af2d337c61ce3795c83ddfb9817e35c444ac47fe1cda4f5
              • Opcode Fuzzy Hash: f943f2cb7c56b0035621571be8fa5bb222092fa646294fac6896136dfbc7f009
              • Instruction Fuzzy Hash: FB2149722046236AE771A6399C01EFB73DCFF69340F00442AFDC6CB050EB599D41C2A5
              APIs
              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 0105DC09
              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 0105DC2F
              • SysAllocString.OLEAUT32(00000000), ref: 0105DC32
              • SysAllocString.OLEAUT32 ref: 0105DC53
              • SysFreeString.OLEAUT32 ref: 0105DC5C
              • StringFromGUID2.OLE32(?,?,00000028), ref: 0105DC76
              • SysAllocString.OLEAUT32(?), ref: 0105DC84
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
              • String ID:
              • API String ID: 3761583154-0
              • Opcode ID: 45164b4f745f82cf1c3392e2f014a17dbae6e54fc1a1d1b26c03feda8808075e
              • Instruction ID: 7d90eaa0f1f8780b1ae362bbe5d9ced6d2ab3d8aab3dda0343df68e140005972
              • Opcode Fuzzy Hash: 45164b4f745f82cf1c3392e2f014a17dbae6e54fc1a1d1b26c03feda8808075e
              • Instruction Fuzzy Hash: 3121623560821AAF9B50EBFCDC88DAB7BECEB09260B108166FD94CB255DA74DC41C764
              APIs
              • IsWindowVisible.USER32(?), ref: 0105B204
              • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 0105B221
              • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 0105B259
              • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 0105B27F
              • _wcsstr.LIBCMT ref: 0105B289
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: MessageSend$BuffCharUpperVisibleWindow_wcsstr
              • String ID: @U=u
              • API String ID: 3902887630-2594219639
              • Opcode ID: 683bd1f02ce362e1fe640bbd9465ae275592146934af60c5f819aef37c58a963
              • Instruction ID: 0393ff10235aceed1788e4a95910fdd773a1e23c099ad1ad384bd772875e1f61
              • Opcode Fuzzy Hash: 683bd1f02ce362e1fe640bbd9465ae275592146934af60c5f819aef37c58a963
              • Instruction Fuzzy Hash: 252107312042117BEB655B799C08E7F7B9DDF49790F004169FC85DA151EE65E8409770
              APIs
              • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 01059320
                • Part of subcall function 01007BCC: _memmove.LIBCMT ref: 01007C06
              • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 01059352
              • __itow.LIBCMT ref: 0105936A
              • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 01059392
              • __itow.LIBCMT ref: 010593A3
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: MessageSend$__itow$_memmove
              • String ID: @U=u
              • API String ID: 2983881199-2594219639
              • Opcode ID: 65a0972c2d422f372105d7e1f487f3f1baaa41f58344e290250e7f55bfdd393c
              • Instruction ID: 4a0668e4d5fe5fcc4692bc0f9392f2828546d8a2a2ea42dc7996e72d870216f0
              • Opcode Fuzzy Hash: 65a0972c2d422f372105d7e1f487f3f1baaa41f58344e290250e7f55bfdd393c
              • Instruction Fuzzy Hash: BF210731700209FBEB11AA748C89EEF3FA8EF58758F049069FEC4AB1C1D6B49D518791
              APIs
                • Part of subcall function 01001D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 01001D73
                • Part of subcall function 01001D35: GetStockObject.GDI32(00000011), ref: 01001D87
                • Part of subcall function 01001D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 01001D91
              • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 01087632
              • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 0108763F
              • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 0108764A
              • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 01087659
              • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 01087665
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: MessageSend$CreateObjectStockWindow
              • String ID: Msctls_Progress32
              • API String ID: 1025951953-3636473452
              • Opcode ID: 5149c78030f255402e56ff2c2e8cee0779f70816e2b3addd5ad10cfb513035b1
              • Instruction ID: cea86b6f5601342bc459c1b792198df5c5dd349afc96dd3fe25e516ebb108afd
              • Opcode Fuzzy Hash: 5149c78030f255402e56ff2c2e8cee0779f70816e2b3addd5ad10cfb513035b1
              • Instruction Fuzzy Hash: 5811B6B1110119BFEF159F64CC85EEB7F5DEF0C798F114215B684A6150CA729C21DBA4
              APIs
              • __init_pointers.LIBCMT ref: 01029AE6
                • Part of subcall function 01023187: EncodePointer.KERNEL32(00000000), ref: 0102318A
                • Part of subcall function 01023187: __initp_misc_winsig.LIBCMT ref: 010231A5
                • Part of subcall function 01023187: GetModuleHandleW.KERNEL32(kernel32.dll), ref: 01029EA0
                • Part of subcall function 01023187: GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 01029EB4
                • Part of subcall function 01023187: GetProcAddress.KERNEL32(00000000,FlsFree), ref: 01029EC7
                • Part of subcall function 01023187: GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 01029EDA
                • Part of subcall function 01023187: GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 01029EED
                • Part of subcall function 01023187: GetProcAddress.KERNEL32(00000000,InitializeCriticalSectionEx), ref: 01029F00
                • Part of subcall function 01023187: GetProcAddress.KERNEL32(00000000,CreateEventExW), ref: 01029F13
                • Part of subcall function 01023187: GetProcAddress.KERNEL32(00000000,CreateSemaphoreExW), ref: 01029F26
                • Part of subcall function 01023187: GetProcAddress.KERNEL32(00000000,SetThreadStackGuarantee), ref: 01029F39
                • Part of subcall function 01023187: GetProcAddress.KERNEL32(00000000,CreateThreadpoolTimer), ref: 01029F4C
                • Part of subcall function 01023187: GetProcAddress.KERNEL32(00000000,SetThreadpoolTimer), ref: 01029F5F
                • Part of subcall function 01023187: GetProcAddress.KERNEL32(00000000,WaitForThreadpoolTimerCallbacks), ref: 01029F72
                • Part of subcall function 01023187: GetProcAddress.KERNEL32(00000000,CloseThreadpoolTimer), ref: 01029F85
                • Part of subcall function 01023187: GetProcAddress.KERNEL32(00000000,CreateThreadpoolWait), ref: 01029F98
                • Part of subcall function 01023187: GetProcAddress.KERNEL32(00000000,SetThreadpoolWait), ref: 01029FAB
                • Part of subcall function 01023187: GetProcAddress.KERNEL32(00000000,CloseThreadpoolWait), ref: 01029FBE
              • __mtinitlocks.LIBCMT ref: 01029AEB
              • __mtterm.LIBCMT ref: 01029AF4
                • Part of subcall function 01029B5C: DeleteCriticalSection.KERNEL32(00000000,00000000,?,?,01029AF9,01027CD0,010BA0B8,00000014), ref: 01029C56
                • Part of subcall function 01029B5C: _free.LIBCMT ref: 01029C5D
                • Part of subcall function 01029B5C: DeleteCriticalSection.KERNEL32(010BEC00,?,?,01029AF9,01027CD0,010BA0B8,00000014), ref: 01029C7F
              • __calloc_crt.LIBCMT ref: 01029B19
              • __initptd.LIBCMT ref: 01029B3B
              • GetCurrentThreadId.KERNEL32 ref: 01029B42
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: AddressProc$CriticalDeleteSection$CurrentEncodeHandleModulePointerThread__calloc_crt__init_pointers__initp_misc_winsig__initptd__mtinitlocks__mtterm_free
              • String ID:
              • API String ID: 3567560977-0
              • Opcode ID: 038c551d80b1e7a6da1dd1c6a17310235aa5c5ab672523be1d3986c572dacb30
              • Instruction ID: 9db062bb2f8b41ee43b18e86da5f3f0e03155e69ecc4205c499cd48d0f7caeb7
              • Opcode Fuzzy Hash: 038c551d80b1e7a6da1dd1c6a17310235aa5c5ab672523be1d3986c572dacb30
              • Instruction Fuzzy Hash: A9F0B4325197335AFA757678BC016CA3AD0EF1273CF614A5AE5E4D91C4FF61804146A4
              APIs
              • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,01023F85), ref: 01024085
              • GetProcAddress.KERNEL32(00000000), ref: 0102408C
              • EncodePointer.KERNEL32(00000000), ref: 01024097
              • DecodePointer.KERNEL32(01023F85), ref: 010240B2
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
              • String ID: RoUninitialize$combase.dll
              • API String ID: 3489934621-2819208100
              • Opcode ID: 8715ea38de66b16508fa7c5a5d44258b73b724aed7aaaabb33c9abad6b2e9cd5
              • Instruction ID: d3d61c316288f1970ea2f0cbbc6a59e8df5a6e890b4c8bdd48d78831d4284136
              • Opcode Fuzzy Hash: 8715ea38de66b16508fa7c5a5d44258b73b724aed7aaaabb33c9abad6b2e9cd5
              • Instruction Fuzzy Hash: F9E092705AA311AFEB70AF72E90DB493AB4B744742F108018F9C1E9188CBBF41409F14
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: _memmove$__itow__swprintf
              • String ID:
              • API String ID: 3253778849-0
              • Opcode ID: 18f37e5838f230a4906ee6e141b0ce789e5d02281ac6c14e15c7cdddf16319b8
              • Instruction ID: 8e9c85bec9d4014a4d24cfe6c0d52a202c63b51be1daf8f62850b5dd5a7e889e
              • Opcode Fuzzy Hash: 18f37e5838f230a4906ee6e141b0ce789e5d02281ac6c14e15c7cdddf16319b8
              • Instruction Fuzzy Hash: 1E615A7050025B9BDF02EF64CC80AFE3BA9AF29208F444559FDD96B292DB35AE45CB50
              APIs
                • Part of subcall function 01007DE1: _memmove.LIBCMT ref: 01007E22
                • Part of subcall function 01080E1A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0107FDAD,?,?), ref: 01080E31
              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 010802BD
              • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 010802FD
              • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 01080320
              • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 01080349
              • RegCloseKey.ADVAPI32(?,?,00000000), ref: 0108038C
              • RegCloseKey.ADVAPI32(00000000), ref: 01080399
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: Close$BuffCharConnectEnumOpenRegistryUpperValue_memmove
              • String ID:
              • API String ID: 4046560759-0
              • Opcode ID: 484449f6f3a53e26ab1e578689b85102b2ff82e4fe5831d3e081c363353419dc
              • Instruction ID: a223c7b90bbfe22bc536004be3bd6e03806bdb2272e877eaa75633578ca2d1e7
              • Opcode Fuzzy Hash: 484449f6f3a53e26ab1e578689b85102b2ff82e4fe5831d3e081c363353419dc
              • Instruction Fuzzy Hash: 2A513831208202AFD711EB64C884EAFBBE9FF95314F04491DF9D58B2A5DB71E909CB52
              APIs
              • GetMenu.USER32(?), ref: 010857FB
              • GetMenuItemCount.USER32(00000000), ref: 01085832
              • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 0108585A
              • GetMenuItemID.USER32(?,?), ref: 010858C9
              • GetSubMenu.USER32(?,?), ref: 010858D7
              • PostMessageW.USER32(?,00000111,?,00000000), ref: 01085928
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: Menu$Item$CountMessagePostString
              • String ID:
              • API String ID: 650687236-0
              • Opcode ID: 8a08465820c51420bf37e1eed52806b8c0baa1108ca0947ef7acd43ecd00b6a8
              • Instruction ID: 1be10b4663756338d07dee827238f1b7d97bc418905cf707d99630b4c01444ea
              • Opcode Fuzzy Hash: 8a08465820c51420bf37e1eed52806b8c0baa1108ca0947ef7acd43ecd00b6a8
              • Instruction Fuzzy Hash: 86515C35A04616EFDF11EF68C8449EEBBB4EF58320F104096E9C5BB351CB75AE418B90
              APIs
              • VariantInit.OLEAUT32(?), ref: 0105EF06
              • VariantClear.OLEAUT32(00000013), ref: 0105EF78
              • VariantClear.OLEAUT32(00000000), ref: 0105EFD3
              • _memmove.LIBCMT ref: 0105EFFD
              • VariantClear.OLEAUT32(?), ref: 0105F04A
              • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 0105F078
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: Variant$Clear$ChangeInitType_memmove
              • String ID:
              • API String ID: 1101466143-0
              • Opcode ID: 49a3743d6df548566021ebb712637622e441eeb77e3592665dd458f6d23799b0
              • Instruction ID: 521edcd912dacfe5837dd11fdec920fa07991c4e55366593ab94c36785b8c3d0
              • Opcode Fuzzy Hash: 49a3743d6df548566021ebb712637622e441eeb77e3592665dd458f6d23799b0
              • Instruction Fuzzy Hash: 8A513C75A0020A9FDB14CF58C884AAAB7F8FF4C314B15855AFE99DB305E735E911CB90
              APIs
              • _memset.LIBCMT ref: 01062258
              • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 010622A3
              • IsMenu.USER32(00000000), ref: 010622C3
              • CreatePopupMenu.USER32 ref: 010622F7
              • GetMenuItemCount.USER32(000000FF), ref: 01062355
              • InsertMenuItemW.USER32(00000000,?,00000001,00000030), ref: 01062386
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: Menu$Item$CountCreateInfoInsertPopup_memset
              • String ID:
              • API String ID: 3311875123-0
              • Opcode ID: 600d395b86719369bf8d6faab3fc1aca22c28189df29c70c37cbcac598635420
              • Instruction ID: 93a026ec3425142e5922559a325bebb5570a1ef110b819a3f6f96cc3cae955e7
              • Opcode Fuzzy Hash: 600d395b86719369bf8d6faab3fc1aca22c28189df29c70c37cbcac598635420
              • Instruction Fuzzy Hash: 6851A07060035AEFDF21CF68D888BADBBF9BF45314F1081A9E9D1A7290D7719944CB51
              APIs
                • Part of subcall function 01002612: GetWindowLongW.USER32(?,000000EB), ref: 01002623
              • BeginPaint.USER32(?,?,?,?,?,?), ref: 0100179A
              • GetWindowRect.USER32(?,?), ref: 010017FE
              • ScreenToClient.USER32(?,?), ref: 0100181B
              • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 0100182C
              • EndPaint.USER32(?,?), ref: 01001876
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: PaintWindow$BeginClientLongRectScreenViewport
              • String ID:
              • API String ID: 1827037458-0
              • Opcode ID: 56e1b77c40661e00ca679c83a8419b196ec8b75792b5badb24cd0f9287ef3667
              • Instruction ID: 680970bfb15ceac45e5cb55c0bb5be8e48ef716c29505831f27311d5ceab8b98
              • Opcode Fuzzy Hash: 56e1b77c40661e00ca679c83a8419b196ec8b75792b5badb24cd0f9287ef3667
              • Instruction Fuzzy Hash: AA418134604301AFE722DF24C884BBA7BE8FB4A724F044669F5D4861E1C735E945CB61
              APIs
              • GetForegroundWindow.USER32(?,?,?,?,?,?,01074E41,?,?,00000000,00000001), ref: 010770AC
                • Part of subcall function 010739A0: GetWindowRect.USER32(?,?), ref: 010739B3
              • GetDesktopWindow.USER32 ref: 010770D6
              • GetWindowRect.USER32(00000000), ref: 010770DD
              • mouse_event.USER32(00008001,?,?,00000001,00000001), ref: 0107710F
                • Part of subcall function 01065244: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 010652BC
              • GetCursorPos.USER32(?), ref: 0107713B
              • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 01077199
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: Window$Rectmouse_event$CursorDesktopForegroundSleep
              • String ID:
              • API String ID: 4137160315-0
              • Opcode ID: c0285c971f65016bc68da37f310cad18a36afa45aca08d65e97942f00094947f
              • Instruction ID: ec5781d0f0ea5f6d1bdc54d8d038f668cb25909b25caf10f8baa3a547032b33c
              • Opcode Fuzzy Hash: c0285c971f65016bc68da37f310cad18a36afa45aca08d65e97942f00094947f
              • Instruction Fuzzy Hash: DB31D472505306ABD720DF28D848B9FBBEAFF88354F000919F5C597181C775E915CB96
              APIs
                • Part of subcall function 010580A9: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 010580C0
                • Part of subcall function 010580A9: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 010580CA
                • Part of subcall function 010580A9: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 010580D9
                • Part of subcall function 010580A9: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 010580E0
                • Part of subcall function 010580A9: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 010580F6
              • GetLengthSid.ADVAPI32(?,00000000,0105842F), ref: 010588CA
              • GetProcessHeap.KERNEL32(00000008,00000000), ref: 010588D6
              • HeapAlloc.KERNEL32(00000000), ref: 010588DD
              • CopySid.ADVAPI32(00000000,00000000,?), ref: 010588F6
              • GetProcessHeap.KERNEL32(00000000,00000000,0105842F), ref: 0105890A
              • HeapFree.KERNEL32(00000000), ref: 01058911
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
              • String ID:
              • API String ID: 3008561057-0
              • Opcode ID: 2ec9409976bb5730d3f3acc8b0da4237cd45b17f241ccfcaaf5b47cd1fd2455e
              • Instruction ID: c99131188261ef24df1ace3e3ac6a2f268bf2e881a791e71edf8e1a416d883aa
              • Opcode Fuzzy Hash: 2ec9409976bb5730d3f3acc8b0da4237cd45b17f241ccfcaaf5b47cd1fd2455e
              • Instruction Fuzzy Hash: 7711AF3150120AFFEBA09FA9DC09BAFBBB8EB45315F14805AEDC597204C736A911CB61
              APIs
              • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 010585E2
              • OpenProcessToken.ADVAPI32(00000000), ref: 010585E9
              • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 010585F8
              • CloseHandle.KERNEL32(00000004), ref: 01058603
              • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 01058632
              • DestroyEnvironmentBlock.USERENV(00000000), ref: 01058646
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
              • String ID:
              • API String ID: 1413079979-0
              • Opcode ID: c6200b9879071fe725ca0bea43b0466732a978b5b935f007828b25b2893986c4
              • Instruction ID: 9ea6090346d16f2590f7e4b216e7cc8d365da09754dbab534dacc09c1c22fb9e
              • Opcode Fuzzy Hash: c6200b9879071fe725ca0bea43b0466732a978b5b935f007828b25b2893986c4
              • Instruction Fuzzy Hash: A5115C7250520AABEF519EA9DD49BDF7BA9EF08308F048055FE84A2150C3768E61EB60
              APIs
              • GetDC.USER32(00000000), ref: 0105B7B5
              • GetDeviceCaps.GDI32(00000000,00000058), ref: 0105B7C6
              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0105B7CD
              • ReleaseDC.USER32(00000000,00000000), ref: 0105B7D5
              • MulDiv.KERNEL32(000009EC,?,00000000), ref: 0105B7EC
              • MulDiv.KERNEL32(000009EC,?,?), ref: 0105B7FE
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: CapsDevice$Release
              • String ID:
              • API String ID: 1035833867-0
              • Opcode ID: c0bd3a706f1e2526db852f667646790e020ad16833b70008119b0d2f4f854f44
              • Instruction ID: 4bfb309f29d0f500911ffdaf75214704968dee3e63ae6e8ffd1e8c524225d742
              • Opcode Fuzzy Hash: c0bd3a706f1e2526db852f667646790e020ad16833b70008119b0d2f4f854f44
              • Instruction Fuzzy Hash: 49018475E00209BBEF509BB69C49A5FBFB8EB48351F044065FE84A7281D6319810CF90
              APIs
              • MapVirtualKeyW.USER32(0000005B,00000000), ref: 01020193
              • MapVirtualKeyW.USER32(00000010,00000000), ref: 0102019B
              • MapVirtualKeyW.USER32(000000A0,00000000), ref: 010201A6
              • MapVirtualKeyW.USER32(000000A1,00000000), ref: 010201B1
              • MapVirtualKeyW.USER32(00000011,00000000), ref: 010201B9
              • MapVirtualKeyW.USER32(00000012,00000000), ref: 010201C1
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: Virtual
              • String ID:
              • API String ID: 4278518827-0
              • Opcode ID: 67e96c0c948ad92216e6b5e373dc8456091696cac2375c8d513141f302b9339f
              • Instruction ID: 91cbab9d9e42bd343fb1d676507316e048d48ca3e1f39763221024f5d1b1736a
              • Opcode Fuzzy Hash: 67e96c0c948ad92216e6b5e373dc8456091696cac2375c8d513141f302b9339f
              • Instruction Fuzzy Hash: FF016CB090175A7DE3008F6A8C85B56FFA8FF19354F00411BA15C87941C7F5A864CBE5
              APIs
              • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 010653F9
              • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 0106540F
              • GetWindowThreadProcessId.USER32(?,?), ref: 0106541E
              • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 0106542D
              • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 01065437
              • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 0106543E
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
              • String ID:
              • API String ID: 839392675-0
              • Opcode ID: fafa22f7832b1f59ad0c6355a4f6ff8fb4520968309edf125e85d53080992b8c
              • Instruction ID: 6bfd52e686c6882c37a1d2dd053641b10bf7de9553ad8b94a3ed99038a1eb992
              • Opcode Fuzzy Hash: fafa22f7832b1f59ad0c6355a4f6ff8fb4520968309edf125e85d53080992b8c
              • Instruction Fuzzy Hash: 5CF06D32244159BBE7315AB29C0DEAF7A7CEFCAB15F000259FA84D1041DAAA1A1187B5
              APIs
              • InterlockedExchange.KERNEL32(?,?), ref: 01067243
              • EnterCriticalSection.KERNEL32(?,?,01010EE4,?,?), ref: 01067254
              • TerminateThread.KERNEL32(00000000,000001F6,?,01010EE4,?,?), ref: 01067261
              • WaitForSingleObject.KERNEL32(00000000,000003E8,?,01010EE4,?,?), ref: 0106726E
                • Part of subcall function 01066C35: CloseHandle.KERNEL32(00000000,?,0106727B,?,01010EE4,?,?), ref: 01066C3F
              • InterlockedExchange.KERNEL32(?,000001F6), ref: 01067281
              • LeaveCriticalSection.KERNEL32(?,?,01010EE4,?,?), ref: 01067288
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
              • String ID:
              • API String ID: 3495660284-0
              • Opcode ID: 5e0af448653e6a5b2880d0ffb90228f54ced7070e7d13fad6091c26fc1dfdf6e
              • Instruction ID: 131ccdece18a1ab0634d9acac408d16185f6334a80f0aed0f647998bfaa26bfc
              • Opcode Fuzzy Hash: 5e0af448653e6a5b2880d0ffb90228f54ced7070e7d13fad6091c26fc1dfdf6e
              • Instruction Fuzzy Hash: 3AF0BE36444603ABE7612B74EC4C9EF3B29EF15302B100121F2C3E0098CB7F1410CB50
              APIs
              • WaitForSingleObject.KERNEL32(?,000000FF), ref: 0105899D
              • UnloadUserProfile.USERENV(?,?), ref: 010589A9
              • CloseHandle.KERNEL32(?), ref: 010589B2
              • CloseHandle.KERNEL32(?), ref: 010589BA
              • GetProcessHeap.KERNEL32(00000000,?), ref: 010589C3
              • HeapFree.KERNEL32(00000000), ref: 010589CA
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
              • String ID:
              • API String ID: 146765662-0
              • Opcode ID: 19632949825b561391f360e168d21723c76fdd480b5d1cbd5528f6db546b7f50
              • Instruction ID: 01a20ec3c9734e479e550c134589d23fd727cb58149c23f865fb29b14f034ea0
              • Opcode Fuzzy Hash: 19632949825b561391f360e168d21723c76fdd480b5d1cbd5528f6db546b7f50
              • Instruction Fuzzy Hash: 84E0C236008002BBDA112FF1EC0C90ABB69FB8A322B108220F299C1068CB3B9420DB50
              APIs
              • VariantInit.OLEAUT32(?), ref: 01078613
              • CharUpperBuffW.USER32(?,?), ref: 01078722
              • VariantClear.OLEAUT32(?), ref: 0107889A
                • Part of subcall function 01067562: VariantInit.OLEAUT32(00000000), ref: 010675A2
                • Part of subcall function 01067562: VariantCopy.OLEAUT32(00000000,?), ref: 010675AB
                • Part of subcall function 01067562: VariantClear.OLEAUT32(00000000), ref: 010675B7
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: Variant$ClearInit$BuffCharCopyUpper
              • String ID: AUTOIT.ERROR$Incorrect Parameter format
              • API String ID: 4237274167-1221869570
              • Opcode ID: e64b51922ff958bd85eaffb8831c8161100e6f7aaa91051f9902a242d9e9446c
              • Instruction ID: 902e254b9a83f2a325cd6fa01735d617390e1be2c903070ddb8289f32fc5d0b5
              • Opcode Fuzzy Hash: e64b51922ff958bd85eaffb8831c8161100e6f7aaa91051f9902a242d9e9446c
              • Instruction Fuzzy Hash: DB917F74A043029FC750DF28C48499ABBE4FF99714F04896EF9DA9B3A1DB31E905CB52
              APIs
                • Part of subcall function 0101FC86: _wcscpy.LIBCMT ref: 0101FCA9
              • _memset.LIBCMT ref: 01062B87
              • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 01062BB6
              • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 01062C69
              • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 01062C97
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: ItemMenu$Info$Default_memset_wcscpy
              • String ID: 0
              • API String ID: 4152858687-4108050209
              • Opcode ID: c987de2857778022d85b70c3b927b88d595633518413f27a03de729e5779efd6
              • Instruction ID: 2e728f3c22f7a45dff4d2ad5a4b4cd13a02e37f2149ea69c9b73c945f227cb93
              • Opcode Fuzzy Hash: c987de2857778022d85b70c3b927b88d595633518413f27a03de729e5779efd6
              • Instruction Fuzzy Hash: 9351ED712083069EE765DFACC844AAFBBECEF99320F040A6DF9C496194DB60D9048B52
              APIs
              • GetWindowRect.USER32(0158E978,?), ref: 01089863
              • ScreenToClient.USER32(00000002,00000002), ref: 01089896
              • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,00000002,?,?), ref: 01089903
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: Window$ClientMoveRectScreen
              • String ID: @U=u
              • API String ID: 3880355969-2594219639
              • Opcode ID: a2fc261022ec491769772d8ec320c990446b6f763e791b76ccf6c0c282d1f63f
              • Instruction ID: 05011191e1728ec317e9977f1557ca660a7fa1d95407cd8dadacfd4629820665
              • Opcode Fuzzy Hash: a2fc261022ec491769772d8ec320c990446b6f763e791b76ccf6c0c282d1f63f
              • Instruction Fuzzy Hash: 5F515F34A04206EFDB21EF68C884ABE7BF5FF85364F108299F9D59B291D731A941CB50
              APIs
              • SendMessageW.USER32(?,0000110A,00000004,00000000), ref: 01059AD2
              • __itow.LIBCMT ref: 01059B03
                • Part of subcall function 01059D53: SendMessageW.USER32(?,0000113E,00000000,00000000), ref: 01059DBE
              • SendMessageW.USER32(?,0000110A,00000001,?), ref: 01059B6C
              • __itow.LIBCMT ref: 01059BC3
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: MessageSend$__itow
              • String ID: @U=u
              • API String ID: 3379773720-2594219639
              • Opcode ID: 9fb1109d77dee65e9b6dfe4391074fc93d368e664750200c596f40f6d5092e18
              • Instruction ID: 4e303def151b04a0cc25e18ea113fef49c74de2d3be8848872dce3f7dfbda20b
              • Opcode Fuzzy Hash: 9fb1109d77dee65e9b6dfe4391074fc93d368e664750200c596f40f6d5092e18
              • Instruction Fuzzy Hash: 12417274A00209ABFF52EF54C844FEE7FB9EF58718F400059EE85A7290DB74A944CBA1
              APIs
                • Part of subcall function 010614BC: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,01059296,?,?,00000034,00000800,?,00000034), ref: 010614E6
              • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 0105983F
                • Part of subcall function 01061487: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,010592C5,?,?,00000800,?,00001073,00000000,?,?), ref: 010614B1
                • Part of subcall function 010613DE: GetWindowThreadProcessId.USER32(?,?), ref: 01061409
                • Part of subcall function 010613DE: OpenProcess.KERNEL32(00000438,00000000,?,?,?,0105925A,00000034,?,?,00001004,00000000,00000000), ref: 01061419
                • Part of subcall function 010613DE: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,0105925A,00000034,?,?,00001004,00000000,00000000), ref: 0106142F
              • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 010598AC
              • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 010598F9
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
              • String ID: @$@U=u
              • API String ID: 4150878124-826235744
              • Opcode ID: c499c1250738882bc601ee1354f24c144fc4b41e58c1605215412d79aca23258
              • Instruction ID: bb7c2c8fd8e6823dd952b4c18f2fb1f09bd497a8b4a3322688fdc91775e94a35
              • Opcode Fuzzy Hash: c499c1250738882bc601ee1354f24c144fc4b41e58c1605215412d79aca23258
              • Instruction Fuzzy Hash: F241507690021DBFDB50DFA8CC81ADEBBB8EF59300F104195EA85B7180DA716E45CBA0
              APIs
              • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 0105D5D4
              • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 0105D60A
              • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 0105D61B
              • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 0105D69D
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: ErrorMode$AddressCreateInstanceProc
              • String ID: DllGetClassObject
              • API String ID: 753597075-1075368562
              • Opcode ID: 35f1dc52118627285ca1c142dcba8e33e5fbbeec158ca565b4fcdfde58ca4a23
              • Instruction ID: a22331fd4ea2c2088b749c5ab9b476afa6679f1b71bfd89c59a58fb89c6b2eef
              • Opcode Fuzzy Hash: 35f1dc52118627285ca1c142dcba8e33e5fbbeec158ca565b4fcdfde58ca4a23
              • Instruction Fuzzy Hash: 3A418CB1600205EFDF55DFA4C884A9BBBE9EF48314F0580AAED89DF205D7B1D941CBA0
              APIs
              • _memset.LIBCMT ref: 010627C0
              • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 010627DC
              • DeleteMenu.USER32(?,00000007,00000000), ref: 01062822
              • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,010C5890,00000000), ref: 0106286B
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: Menu$Delete$InfoItem_memset
              • String ID: 0
              • API String ID: 1173514356-4108050209
              • Opcode ID: 6e040ade3e5b121cd7fd4d9cc45218c70c14e308db85fdabd2bc0eb7b916608f
              • Instruction ID: 976742c10be85e8204d3e1b558c77bd5bca1340c5a681d35327830393b45d979
              • Opcode Fuzzy Hash: 6e040ade3e5b121cd7fd4d9cc45218c70c14e308db85fdabd2bc0eb7b916608f
              • Instruction Fuzzy Hash: F941AE716053029FD720DF28CC44B6ABBE8EF95314F04496DF9E59B291D734A405CB62
              APIs
              • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 010888DE
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: InvalidateRect
              • String ID: @U=u
              • API String ID: 634782764-2594219639
              • Opcode ID: 4c52efae912b7d8e4774ff1e7e56365ba1d007f84d9709918077d7956ca9e536
              • Instruction ID: ff356e05f3dc63c7833d94542c261da930ce0442e08b18a6c1f8dc29f721ab75
              • Opcode Fuzzy Hash: 4c52efae912b7d8e4774ff1e7e56365ba1d007f84d9709918077d7956ca9e536
              • Instruction Fuzzy Hash: 2A31F234618109FFEB71BA28DC44BAD7BA1FB0A310F98C153FAD1E62E1C631E5408B52
              APIs
              • CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 0107D7C5
                • Part of subcall function 0100784B: _memmove.LIBCMT ref: 01007899
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: BuffCharLower_memmove
              • String ID: cdecl$none$stdcall$winapi
              • API String ID: 3425801089-567219261
              • Opcode ID: cbecd16c7ac9e2127048ee184ed745f5d5f393b08b401d4acf47a49bb8507ca6
              • Instruction ID: 4dcfc472a1ed9c23532856febeaf9b9d8a0d7b5cf52caf72a791929ad8191d10
              • Opcode Fuzzy Hash: cbecd16c7ac9e2127048ee184ed745f5d5f393b08b401d4acf47a49bb8507ca6
              • Instruction Fuzzy Hash: D9317071900216ABDF41EF98CC909EEB7B4FF15724F008669E8E9976D1DB71E905CB80
              APIs
              • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0107184C
              • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 01071872
              • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 010718A2
              • InternetCloseHandle.WININET(00000000), ref: 010718E9
                • Part of subcall function 01072483: GetLastError.KERNEL32(?,?,01071817,00000000,00000000,00000001), ref: 01072498
                • Part of subcall function 01072483: SetEvent.KERNEL32(?,?,01071817,00000000,00000000,00000001), ref: 010724AD
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
              • String ID:
              • API String ID: 3113390036-3916222277
              • Opcode ID: 3662dbef0fd2e23cf9507a86bb5173390e3cf94b246ea242af06551a3d985d4d
              • Instruction ID: 52e5b653f95bfdec943afabfe508f14808c5375fe03b3bddadcca4e056765331
              • Opcode Fuzzy Hash: 3662dbef0fd2e23cf9507a86bb5173390e3cf94b246ea242af06551a3d985d4d
              • Instruction Fuzzy Hash: F921B0B1A04209BFEB519E64DC84EBF7BEDEB48644F00412AF5C5D6180DA758D0557A8
              APIs
                • Part of subcall function 01001D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 01001D73
                • Part of subcall function 01001D35: GetStockObject.GDI32(00000011), ref: 01001D87
                • Part of subcall function 01001D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 01001D91
              • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 01086461
              • LoadLibraryW.KERNEL32(?), ref: 01086468
              • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 0108647D
              • DestroyWindow.USER32(?), ref: 01086485
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: MessageSend$Window$CreateDestroyLibraryLoadObjectStock
              • String ID: SysAnimate32
              • API String ID: 4146253029-1011021900
              • Opcode ID: a52a49eab83b6d8b9a9b0df1b4b314c18c5a73bf9aedfe547b181e5df073136b
              • Instruction ID: 9f740222876e89266f6a046aa9025c8486fb09c100b517e0f1a55127731e1e3e
              • Opcode Fuzzy Hash: a52a49eab83b6d8b9a9b0df1b4b314c18c5a73bf9aedfe547b181e5df073136b
              • Instruction Fuzzy Hash: C021AF71118205ABEF116E68DC80EBF37EAEB48328F115629FAD093191CA3298519720
              APIs
              • GetStdHandle.KERNEL32(0000000C), ref: 01066DBC
              • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 01066DEF
              • GetStdHandle.KERNEL32(0000000C), ref: 01066E01
              • CreateFileW.KERNEL32(nul,40000000,00000002,0000000C,00000003,00000080,00000000), ref: 01066E3B
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: CreateHandle$FilePipe
              • String ID: nul
              • API String ID: 4209266947-2873401336
              • Opcode ID: aea20b477f398f879b2131449b32d95659c54d1cb4734cec85c65d9520093bf2
              • Instruction ID: 2656781647940ba33637705bf96711c5500c70413f44aa2f0d5ef517ecfde18e
              • Opcode Fuzzy Hash: aea20b477f398f879b2131449b32d95659c54d1cb4734cec85c65d9520093bf2
              • Instruction Fuzzy Hash: 5A215E71A0020AABDB20AF29DC44A9E7BECEF55720F104A59FDE1D72D0DB729954CB50
              APIs
              • GetStdHandle.KERNEL32(000000F6), ref: 01066E89
              • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 01066EBB
              • GetStdHandle.KERNEL32(000000F6), ref: 01066ECC
              • CreateFileW.KERNEL32(nul,80000000,00000001,0000000C,00000003,00000080,00000000), ref: 01066F06
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: CreateHandle$FilePipe
              • String ID: nul
              • API String ID: 4209266947-2873401336
              • Opcode ID: ac6f6902f3ef6f3671c960e2ef08f86ad26bab36eaefdb7030ac48cd5be3ffb5
              • Instruction ID: 5c68a97e4bdff24e1868b6227f61c8263df27dcb50d8f1aa0a57f5458819312b
              • Opcode Fuzzy Hash: ac6f6902f3ef6f3671c960e2ef08f86ad26bab36eaefdb7030ac48cd5be3ffb5
              • Instruction Fuzzy Hash: 8B219D756003069BEB209F6DCC44AAA7BECAF45730F200B59F9E0D72D0DB72A4508B50
              APIs
              • SetErrorMode.KERNEL32(00000001), ref: 0106AC54
              • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 0106ACA8
              • __swprintf.LIBCMT ref: 0106ACC1
              • SetErrorMode.KERNEL32(00000000,00000001,00000000,0108F910), ref: 0106ACFF
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: ErrorMode$InformationVolume__swprintf
              • String ID: %lu
              • API String ID: 3164766367-685833217
              • Opcode ID: 0fd3beb3488fa187c5eed0fac51389edffd12e8ecb6ba117468bf9b3817dad43
              • Instruction ID: a7feda862f2589b9dfa0a5abc9a7b0be0fdfea6476fbe7d0b9a95a63dd78f5e0
              • Opcode Fuzzy Hash: 0fd3beb3488fa187c5eed0fac51389edffd12e8ecb6ba117468bf9b3817dad43
              • Instruction Fuzzy Hash: BE21537460010AAFDB10EF65C984DEE7BB8FF89714F0040A9E989EB251DB35EA51CB61
              APIs
              • CharUpperBuffW.USER32(?,?), ref: 01061B19
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: BuffCharUpper
              • String ID: APPEND$EXISTS$KEYS$REMOVE
              • API String ID: 3964851224-769500911
              • Opcode ID: ad515e116471658713eaa1d55ff83def6f6207d869866e1f714a30bd0c8e6cbb
              • Instruction ID: ef4b2f4369ab165c66d9cd0cd81d842d8e43c0dff518e1e536d7be3011edcef1
              • Opcode Fuzzy Hash: ad515e116471658713eaa1d55ff83def6f6207d869866e1f714a30bd0c8e6cbb
              • Instruction Fuzzy Hash: 0D1184309001198F8F40EF64D8908FEB7B8FF65304F5485A5D8D5A7295EB325906CF50
              APIs
              • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 0107EC07
              • GetProcessIoCounters.KERNEL32(00000000,?), ref: 0107EC37
              • GetProcessMemoryInfo.PSAPI(00000000,?,00000028), ref: 0107ED6A
              • CloseHandle.KERNEL32(?), ref: 0107EDEB
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: Process$CloseCountersHandleInfoMemoryOpen
              • String ID:
              • API String ID: 2364364464-0
              • Opcode ID: 93fa13fa322b08b369e8cb1cd7c9d5cc4a8e49328c73d252ad27c2f69160b29e
              • Instruction ID: ec6d16fa88405c8c47f8c83a2669e346c40c1383acda5ad9d3e4e303b10e2060
              • Opcode Fuzzy Hash: 93fa13fa322b08b369e8cb1cd7c9d5cc4a8e49328c73d252ad27c2f69160b29e
              • Instruction Fuzzy Hash: 3181AEB1A007019FE761EF28C885F6AB7E5AF54714F04885DFAD99B3C2D6B0AD00CB55
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: _memset$__filbuf__getptd_noexit__read_nolock_memcpy_s
              • String ID:
              • API String ID: 1559183368-0
              • Opcode ID: 1d92f2bce51b0a0de234b56dfad0c5d103c922ba67c2ed527f53aae8e5802bd0
              • Instruction ID: 4faab697c6029a8b527b9027a2feccc73acde7f87451e75fbc974b0c8e1ada8b
              • Opcode Fuzzy Hash: 1d92f2bce51b0a0de234b56dfad0c5d103c922ba67c2ed527f53aae8e5802bd0
              • Instruction Fuzzy Hash: B251C530B00325DBDB248F6DDC506EEBBE6AF50325F148769F8A5D62D0DB7099508B49
              APIs
                • Part of subcall function 01007DE1: _memmove.LIBCMT ref: 01007E22
                • Part of subcall function 01080E1A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0107FDAD,?,?), ref: 01080E31
              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 010800FD
              • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 0108013C
              • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 01080183
              • RegCloseKey.ADVAPI32(?,?), ref: 010801AF
              • RegCloseKey.ADVAPI32(00000000), ref: 010801BC
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: Close$BuffCharConnectEnumOpenRegistryUpper_memmove
              • String ID:
              • API String ID: 3440857362-0
              • Opcode ID: 89aea61304a8ade6da55b4b49b7097c97a9cfa785dd6a9010c41955d25d3f7de
              • Instruction ID: 7c2cc0d04d75fff9a5bef7e2358e36d0619f9230c3735aac4fdce2b872276c73
              • Opcode Fuzzy Hash: 89aea61304a8ade6da55b4b49b7097c97a9cfa785dd6a9010c41955d25d3f7de
              • Instruction Fuzzy Hash: 36516931208205AFDB15EF68C880EAEB7E8FF94314F40491DF5D587291DB31E949CB52
              APIs
                • Part of subcall function 01009837: __itow.LIBCMT ref: 01009862
                • Part of subcall function 01009837: __swprintf.LIBCMT ref: 010098AC
              • LoadLibraryW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,?,?), ref: 0107D927
              • GetProcAddress.KERNEL32(00000000,?), ref: 0107D9AA
              • GetProcAddress.KERNEL32(00000000,00000000), ref: 0107D9C6
              • GetProcAddress.KERNEL32(00000000,?), ref: 0107DA07
              • FreeLibrary.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,?,?), ref: 0107DA21
                • Part of subcall function 01005A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,01067896,?,?,00000000), ref: 01005A2C
                • Part of subcall function 01005A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,01067896,?,?,00000000,?,?), ref: 01005A50
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad__itow__swprintf
              • String ID:
              • API String ID: 327935632-0
              • Opcode ID: c59e76b7a791e17f32046fcc6b8e037e034663547fa0a2d88552e26194f94df7
              • Instruction ID: ddc7f6d5451f57229b44bd6b22479499baaf1e0e5a4cba4f43fadce774c58074
              • Opcode Fuzzy Hash: c59e76b7a791e17f32046fcc6b8e037e034663547fa0a2d88552e26194f94df7
              • Instruction Fuzzy Hash: B9512635A0420ADFDB01EFA8C4849ADBBF5FF19224F048095E899AB352D731EE45CF90
              APIs
              • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 0106E61F
              • GetPrivateProfileSectionW.KERNEL32(?,00000001,00000003,?), ref: 0106E648
              • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 0106E687
                • Part of subcall function 01009837: __itow.LIBCMT ref: 01009862
                • Part of subcall function 01009837: __swprintf.LIBCMT ref: 010098AC
              • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 0106E6AC
              • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 0106E6B4
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: PrivateProfile$SectionWrite$String$__itow__swprintf
              • String ID:
              • API String ID: 1389676194-0
              • Opcode ID: 7c766c61f52d34cd21764c84eaf1a67a175e965a36423b53f9f6f2550efc4eb3
              • Instruction ID: ad2258b89faee2ec9d0572ad7ad37300fd543ac2ae71ed950fcba1682076138e
              • Opcode Fuzzy Hash: 7c766c61f52d34cd21764c84eaf1a67a175e965a36423b53f9f6f2550efc4eb3
              • Instruction Fuzzy Hash: 91510D79A00206DFDB01EF64C980AADBBF5EF19314F148095E989AB3A5CB31EE11DF51
              APIs
              • GetCursorPos.USER32(?), ref: 01002357
              • ScreenToClient.USER32(010C57B0,?), ref: 01002374
              • GetAsyncKeyState.USER32(00000001), ref: 01002399
              • GetAsyncKeyState.USER32(00000002), ref: 010023A7
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: AsyncState$ClientCursorScreen
              • String ID:
              • API String ID: 4210589936-0
              • Opcode ID: 2cc13d3950616cb075b703d6c2b7e7ef674b14bcbc85f05cf7b678fb0817cbb5
              • Instruction ID: 18c851d09437a0e0a2ad8eceb19183f8ac227e73c4cf55dc44f08f1c5991ec15
              • Opcode Fuzzy Hash: 2cc13d3950616cb075b703d6c2b7e7ef674b14bcbc85f05cf7b678fb0817cbb5
              • Instruction Fuzzy Hash: 43418235508116FBEF269E68C848AEDFBB8FB45364F10835AF9A8A21D0C7319950DF90
              APIs
              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 010563E7
              • TranslateAcceleratorW.USER32(?,?,?), ref: 01056433
              • TranslateMessage.USER32(?), ref: 0105645C
              • DispatchMessageW.USER32(?), ref: 01056466
              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 01056475
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: Message$PeekTranslate$AcceleratorDispatch
              • String ID:
              • API String ID: 2108273632-0
              • Opcode ID: 7768f0dc480f325cbf551dd12809f6cd1eca2912a2a8efcee67c37e5211b4589
              • Instruction ID: 6f8c1c374904b6cbe52dbad4e6f14f323526f81748b473c941b67c03f4c4a568
              • Opcode Fuzzy Hash: 7768f0dc480f325cbf551dd12809f6cd1eca2912a2a8efcee67c37e5211b4589
              • Instruction Fuzzy Hash: FB31C8316002469FEBF58F74D844BBB7FE9AB05304F9441A5E9D1C2195DB2BA485CF50
              APIs
              • GetWindowRect.USER32(?,?), ref: 01058A30
              • PostMessageW.USER32(?,00000201,00000001), ref: 01058ADA
              • Sleep.KERNEL32(00000000,?,00000201,00000001,?,?,?), ref: 01058AE2
              • PostMessageW.USER32(?,00000202,00000000), ref: 01058AF0
              • Sleep.KERNEL32(00000000,?,00000202,00000000,?,?,00000201,00000001,?,?,?), ref: 01058AF8
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: MessagePostSleep$RectWindow
              • String ID:
              • API String ID: 3382505437-0
              • Opcode ID: 03867f2c1bba3e6ade6f497523dae592fda936fdc6d69c90b16b39a417d6f41e
              • Instruction ID: ca85a5fc1a71ac30417dfbd90eafc49f8e23a984eda6d688f23c090d801f40b6
              • Opcode Fuzzy Hash: 03867f2c1bba3e6ade6f497523dae592fda936fdc6d69c90b16b39a417d6f41e
              • Instruction Fuzzy Hash: 6131CB7150021AEBEF54CFA9D94CA9E3BA5EB04315F00825AFDA4EA2C1C3B09920CB90
              APIs
                • Part of subcall function 01002612: GetWindowLongW.USER32(?,000000EB), ref: 01002623
              • GetWindowLongW.USER32(?,000000F0), ref: 0108B192
              • SetWindowLongW.USER32(00000000,000000F0,00000001), ref: 0108B1B7
              • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 0108B1CF
              • GetSystemMetrics.USER32(00000004), ref: 0108B1F8
              • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000047,?,?,?,?,?,?,?,01070E90,00000000), ref: 0108B216
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: Window$Long$MetricsSystem
              • String ID:
              • API String ID: 2294984445-0
              • Opcode ID: 7d098b196dab50669791a90a7cdd0669dfa2c5147798b86a6afbd2c5d9e0d93b
              • Instruction ID: 6021b5c1a25e2a57cb67ebc254fec27854d3d5aa4caed7a254e5921978ca5826
              • Opcode Fuzzy Hash: 7d098b196dab50669791a90a7cdd0669dfa2c5147798b86a6afbd2c5d9e0d93b
              • Instruction Fuzzy Hash: 1F219171A18652AFDB60AF3CDC04A6E3BA4FB05321F144768FAF2D71D0D73198618B90
              APIs
              • IsWindow.USER32(00000000), ref: 01075A6E
              • GetForegroundWindow.USER32 ref: 01075A85
              • GetDC.USER32(00000000), ref: 01075AC1
              • GetPixel.GDI32(00000000,?,00000003), ref: 01075ACD
              • ReleaseDC.USER32(00000000,00000003), ref: 01075B08
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: Window$ForegroundPixelRelease
              • String ID:
              • API String ID: 4156661090-0
              • Opcode ID: a17a665a895aad46a26b5aad3bbba0e538c7541bc87f0353c386fbaedff562e1
              • Instruction ID: 9e5a06a0fe34b8385d0b5b5a587f48d1d011b7d6f18e30b5215bf883025b6db1
              • Opcode Fuzzy Hash: a17a665a895aad46a26b5aad3bbba0e538c7541bc87f0353c386fbaedff562e1
              • Instruction Fuzzy Hash: AC218175A00205AFDB14EF75C984A9EBBE9EF58310F14C479E889D7351CA35ED10DB90
              APIs
              • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 0100134D
              • SelectObject.GDI32(?,00000000), ref: 0100135C
              • BeginPath.GDI32(?), ref: 01001373
              • SelectObject.GDI32(?,00000000), ref: 0100139C
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: ObjectSelect$BeginCreatePath
              • String ID:
              • API String ID: 3225163088-0
              • Opcode ID: 29a54bd6e184999c035620e035455614899bc039864336844e8e1dbb42ee707b
              • Instruction ID: ea5aa49ff3e9366b61da0e2e2cdf2eed8bd096c53bfef320a5adea9429cd8e09
              • Opcode Fuzzy Hash: 29a54bd6e184999c035620e035455614899bc039864336844e8e1dbb42ee707b
              • Instruction Fuzzy Hash: 55216034900309EFEB229F29DC0476E7BE8FB04361F648256F8D0A61D4D77AA499DF91
              APIs
              • GetCurrentThreadId.KERNEL32 ref: 01064ABA
              • __beginthreadex.LIBCMT ref: 01064AD8
              • MessageBoxW.USER32(?,?,?,?), ref: 01064AED
              • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 01064B03
              • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 01064B0A
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: CloseCurrentHandleMessageObjectSingleThreadWait__beginthreadex
              • String ID:
              • API String ID: 3824534824-0
              • Opcode ID: cb49b2e972fda28069b687c56777480ba8ce192495ed06aed7eb70a2bbc356c8
              • Instruction ID: 06c2e5b82e895f360b2a59f365932dbe1f1ab2a1d5a840620e85ebd80a23929b
              • Opcode Fuzzy Hash: cb49b2e972fda28069b687c56777480ba8ce192495ed06aed7eb70a2bbc356c8
              • Instruction Fuzzy Hash: 69114C76A082057FC7208FB8DC04A9F7FEDEB46320F144255F894D3240D67A99008BA0
              APIs
              • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 0105821E
              • GetLastError.KERNEL32(?,01057CE2,?,?,?), ref: 01058228
              • GetProcessHeap.KERNEL32(00000008,?,?,01057CE2,?,?,?), ref: 01058237
              • HeapAlloc.KERNEL32(00000000,?,01057CE2,?,?,?), ref: 0105823E
              • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 01058255
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
              • String ID:
              • API String ID: 842720411-0
              • Opcode ID: 203eb43ea4bcc42445a6dc1a2d604bd2993f8e52d668bb4e68c45522879913dd
              • Instruction ID: ddcee8bbc1285090530bc911193b3ad031353299b05f3e78b5ee90ffcbeb4721
              • Opcode Fuzzy Hash: 203eb43ea4bcc42445a6dc1a2d604bd2993f8e52d668bb4e68c45522879913dd
              • Instruction Fuzzy Hash: A1016D71204205BFDB605FBADC48D6B7FACFF8A6A4B50456AFDC9C2214DA328C10CB60
              APIs
              • CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,01057044,80070057,?,?,?,01057455), ref: 01057127
              • ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,01057044,80070057,?,?), ref: 01057142
              • lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,01057044,80070057,?,?), ref: 01057150
              • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,01057044,80070057,?), ref: 01057160
              • CLSIDFromString.OLE32(?,?,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,01057044,80070057,?,?), ref: 0105716C
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: From$Prog$FreeStringTasklstrcmpi
              • String ID:
              • API String ID: 3897988419-0
              • Opcode ID: 99be320c51a570a112e5d10de4e92d4a56d65b14f373967758101c5094d07808
              • Instruction ID: df14a2ed8205a49257cdd2e2aefc604b4100f1210125201d471a62b67067b4e1
              • Opcode Fuzzy Hash: 99be320c51a570a112e5d10de4e92d4a56d65b14f373967758101c5094d07808
              • Instruction Fuzzy Hash: AF01BC72610215ABDB604E68DC44AAE7FEEEB44691F1000A4FE84D2204DB36D900ABA0
              APIs
              • QueryPerformanceCounter.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 01065260
              • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 0106526E
              • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?), ref: 01065276
              • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 01065280
              • Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 010652BC
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: PerformanceQuery$CounterSleep$Frequency
              • String ID:
              • API String ID: 2833360925-0
              • Opcode ID: e3b57538afb49d6814c645a3171b803f81cff4af88f0f88deaa7082049978bd0
              • Instruction ID: 94902982a19212b3059d72cec923bc3d8fe91f8ba2c285fe1b5ad896d98f7c84
              • Opcode Fuzzy Hash: e3b57538afb49d6814c645a3171b803f81cff4af88f0f88deaa7082049978bd0
              • Instruction Fuzzy Hash: 42011731D0561ADBCF10EFE4EC889EDBB7CBB0A751F440556E9C1F2248CB35555087A1
              APIs
              • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 010580C0
              • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 010580CA
              • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 010580D9
              • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 010580E0
              • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 010580F6
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: HeapInformationToken$AllocErrorLastProcess
              • String ID:
              • API String ID: 44706859-0
              • Opcode ID: 0698fd5aff3c5bbd5e036246430e2b4612b818216c54c579987870b8bbf762a8
              • Instruction ID: 5a7f002d9a2a8be5b323cc63ade150484de89aca5e445b89ae2cf1cd95df2fdc
              • Opcode Fuzzy Hash: 0698fd5aff3c5bbd5e036246430e2b4612b818216c54c579987870b8bbf762a8
              • Instruction Fuzzy Hash: BBF0C230204305AFEB615FB9EC8CE6B3FACEF4A654B104016FDC5C2140DB669841DB60
              APIs
              • GetDlgItem.USER32(?,000003E9), ref: 0105C1F7
              • GetWindowTextW.USER32(00000000,?,00000100), ref: 0105C20E
              • MessageBeep.USER32(00000000), ref: 0105C226
              • KillTimer.USER32(?,0000040A), ref: 0105C242
              • EndDialog.USER32(?,00000001), ref: 0105C25C
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: BeepDialogItemKillMessageTextTimerWindow
              • String ID:
              • API String ID: 3741023627-0
              • Opcode ID: ea6aa3be085cd8dc107779f4e6a045e121c093c934cec622aa846ab13c616263
              • Instruction ID: 338ae3efe65bf8e7060f710d442dbd5e85f2fc516e7dd7a58a4de8703b1c6f48
              • Opcode Fuzzy Hash: ea6aa3be085cd8dc107779f4e6a045e121c093c934cec622aa846ab13c616263
              • Instruction Fuzzy Hash: C401A73040470597FB715B74DD4DB9B7BBCBB04705F000259AAC6E14D0DBE965948B50
              APIs
              • EndPath.GDI32(?), ref: 010013BF
              • StrokeAndFillPath.GDI32(?,?,0103B888,00000000,?), ref: 010013DB
              • SelectObject.GDI32(?,00000000), ref: 010013EE
              • DeleteObject.GDI32 ref: 01001401
              • StrokePath.GDI32(?), ref: 0100141C
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: Path$ObjectStroke$DeleteFillSelect
              • String ID:
              • API String ID: 2625713937-0
              • Opcode ID: 64d28a35085bd228dec82d0bb31e7587185e691ebb3b4bbebd17089496e3b96f
              • Instruction ID: b519486b2d91f1931351fd8de2942bb12db200a6bf0927bf004664c68e1ed9bc
              • Opcode Fuzzy Hash: 64d28a35085bd228dec82d0bb31e7587185e691ebb3b4bbebd17089496e3b96f
              • Instruction Fuzzy Hash: 13F01934104209AFEB325F2AEC4C7593FE4A701326F188214F5E9980F8CB3A959ADF10
              APIs
                • Part of subcall function 01020DB6: std::exception::exception.LIBCMT ref: 01020DEC
                • Part of subcall function 01020DB6: __CxxThrowException@8.LIBCMT ref: 01020E01
                • Part of subcall function 01007DE1: _memmove.LIBCMT ref: 01007E22
                • Part of subcall function 01007A51: _memmove.LIBCMT ref: 01007AAB
              • __swprintf.LIBCMT ref: 01012ECD
              Strings
              • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 01012D66
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: _memmove$Exception@8Throw__swprintfstd::exception::exception
              • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
              • API String ID: 1943609520-557222456
              • Opcode ID: 12f0d26c433d7d1974e2a82b1652044339a1c85ae97799e2d1c963cd5fd474f2
              • Instruction ID: 0566f8a925c72b6ce6e5b8c2d7f98289e22308c17abf75fe35113c5e4e9b1990
              • Opcode Fuzzy Hash: 12f0d26c433d7d1974e2a82b1652044339a1c85ae97799e2d1c963cd5fd474f2
              • Instruction Fuzzy Hash: A8916E711043169FDB15EF28C884CAEBBE8EF96710F00486DF5C59B2A4EA35ED44CB92
              APIs
                • Part of subcall function 01004750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,01004743,?,?,010037AE,?), ref: 01004770
              • CoInitialize.OLE32(00000000), ref: 0106B9BB
              • CoCreateInstance.OLE32(01092D6C,00000000,00000001,01092BDC,?), ref: 0106B9D4
              • CoUninitialize.OLE32 ref: 0106B9F1
                • Part of subcall function 01009837: __itow.LIBCMT ref: 01009862
                • Part of subcall function 01009837: __swprintf.LIBCMT ref: 010098AC
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: CreateFullInitializeInstanceNamePathUninitialize__itow__swprintf
              • String ID: .lnk
              • API String ID: 2126378814-24824748
              • Opcode ID: 0ab3c27fbdd245802d6cbc8926517a0c01dfc4fd2143877e0004d93ba07a47f9
              • Instruction ID: 04460876a52da78da1e13780d4bdc41874b6412a630dac0eb65d3b29385bc4ba
              • Opcode Fuzzy Hash: 0ab3c27fbdd245802d6cbc8926517a0c01dfc4fd2143877e0004d93ba07a47f9
              • Instruction Fuzzy Hash: 8FA135B56043069FDB11DF14C884D6ABBE9FF89314F148988E8D99B3A1CB31ED45CB91
              APIs
              • __startOneArgErrorHandling.LIBCMT ref: 010250AD
                • Part of subcall function 010300F0: __87except.LIBCMT ref: 0103012B
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: ErrorHandling__87except__start
              • String ID: pow
              • API String ID: 2905807303-2276729525
              • Opcode ID: 6195e48848775851e5af80441cdf0f811fd6c82a53d29bada61fb28a0cfd256b
              • Instruction ID: ba34b2e09ccf5979c72ffceb731ffa984c78a65ba8d06759679134ed008aa7bd
              • Opcode Fuzzy Hash: 6195e48848775851e5af80441cdf0f811fd6c82a53d29bada61fb28a0cfd256b
              • Instruction Fuzzy Hash: 31515D7191A10296EB61761CCD513FE3BD8AB80710F208DD9F4D58629EEF3D85C4CB8A
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: _memset$_memmove
              • String ID: ERCP
              • API String ID: 2532777613-1384759551
              • Opcode ID: b394f43c9036b364b80db52df6d18afe975fb3d2964b0d099cf7df75aa14b0d6
              • Instruction ID: 1e24b12898fb36dcd9f046c21e7aa3d35d478449e01b11249619445bc751d0bf
              • Opcode Fuzzy Hash: b394f43c9036b364b80db52df6d18afe975fb3d2964b0d099cf7df75aa14b0d6
              • Instruction Fuzzy Hash: 32518E71A00706DBDB64DF69C9807EEBBF4EF04304F2085AEE98ADB244E775A644CB50
              APIs
              • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,0108F910,00000000,?,?,?,?), ref: 010879DF
              • GetWindowLongW.USER32 ref: 010879FC
              • SetWindowLongW.USER32(?,000000F0,00000000), ref: 01087A0C
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: Window$Long
              • String ID: SysTreeView32
              • API String ID: 847901565-1698111956
              • Opcode ID: 93f7c5172e70c19a4a6ad60e868328348081f5e9ff3b9aa2b7a923b5f3f3547f
              • Instruction ID: 13b0235679a0d298748b737418b443623fa98c517fcce5d81b2822efed964567
              • Opcode Fuzzy Hash: 93f7c5172e70c19a4a6ad60e868328348081f5e9ff3b9aa2b7a923b5f3f3547f
              • Instruction Fuzzy Hash: 12310131204206AFEB62AE38CC44BEA7BA8FB48324F204715F9F5A32D4D731E9508B50
              APIs
              • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 01087461
              • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 01087475
              • SendMessageW.USER32(?,00001002,00000000,?), ref: 01087499
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: MessageSend$Window
              • String ID: SysMonthCal32
              • API String ID: 2326795674-1439706946
              • Opcode ID: 6a3bebba5d1da956f0e0bb5845ee4fc879388eb3c8e14ab580b9c3079acfd510
              • Instruction ID: 71488841cc393956d2ae4b878a722e857ff224204f1f2be4dd6e6f1dd9e435f7
              • Opcode Fuzzy Hash: 6a3bebba5d1da956f0e0bb5845ee4fc879388eb3c8e14ab580b9c3079acfd510
              • Instruction Fuzzy Hash: 1821F632100219AFDF12DE68CC41FEE3BA9EF48724F110214FE946B1C4DB75A850CBA0
              APIs
              • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 01087C4A
              • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 01087C58
              • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 01087C5F
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: MessageSend$DestroyWindow
              • String ID: msctls_updown32
              • API String ID: 4014797782-2298589950
              • Opcode ID: 20b5791a7f4229157ffd04395690a89fe3b2fa9f3f87152cb28b6d653db4ce83
              • Instruction ID: 817942c41dfb3c8a2c8e0ba6edc0c5b4fd73f8340ecd174031cff7110910e667
              • Opcode Fuzzy Hash: 20b5791a7f4229157ffd04395690a89fe3b2fa9f3f87152cb28b6d653db4ce83
              • Instruction Fuzzy Hash: 4C218EB5204209AFEB11EF28DCC1DAB37EDEF59254B14005DFA819B3A5CA32EC118B60
              APIs
              • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 01086D3B
              • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 01086D4B
              • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 01086D70
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: MessageSend$MoveWindow
              • String ID: Listbox
              • API String ID: 3315199576-2633736733
              • Opcode ID: b07fd8a997c0315ad7362be26d592c26160f36dbdffb9be31448ce571eecfa86
              • Instruction ID: e6708ef934b0d62be39fc3aeba849fdfa35598ccf73fc11e9c249375eb76fa56
              • Opcode Fuzzy Hash: b07fd8a997c0315ad7362be26d592c26160f36dbdffb9be31448ce571eecfa86
              • Instruction Fuzzy Hash: 5421B332604118BFEF12AF58DC44FBB3BAAEF89750F018124F9C59B190CA729C5187A0
              APIs
              • SendMessageW.USER32(?,000000B0,?,?), ref: 01058C6D
              • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 01058C84
              • SendMessageW.USER32(?,0000000D,?,00000000), ref: 01058CBC
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: MessageSend
              • String ID: @U=u
              • API String ID: 3850602802-2594219639
              • Opcode ID: 9a9acf3db69eb6d95dbdbc78bbb79a8d2d683b7c61f38088546c4586e3cfe642
              • Instruction ID: 69f7daf7419d54c9fc3ccd75287f129351c1ce165733e9ebf768714d4e2ea0ac
              • Opcode Fuzzy Hash: 9a9acf3db69eb6d95dbdbc78bbb79a8d2d683b7c61f38088546c4586e3cfe642
              • Instruction Fuzzy Hash: A321CF3260121DBBEB60DAA9C841DEFBBAEEF44350F10405BEE85E3250DA71A9408B94
              APIs
              • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 01087772
              • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 01087787
              • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 01087794
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: MessageSend
              • String ID: msctls_trackbar32
              • API String ID: 3850602802-1010561917
              • Opcode ID: 732f26d27bda009b2e84ce97b2cbb4224279ea963ac674b465520864679fb4ff
              • Instruction ID: be1138489cbdd296fde5faa347729d9d85409a23a69f2fb59ef1fe9383d90118
              • Opcode Fuzzy Hash: 732f26d27bda009b2e84ce97b2cbb4224279ea963ac674b465520864679fb4ff
              • Instruction Fuzzy Hash: 6711C172244209BAEB216F65CC45FEB7BA9FF89B54F114229FAC1A6090C672E451CB20
              APIs
              • GetWindowTextLengthW.USER32(00000000), ref: 010869A2
              • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 010869B1
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: LengthMessageSendTextWindow
              • String ID: @U=u$edit
              • API String ID: 2978978980-590756393
              • Opcode ID: dc679c4258a445a28ae340871587be2c7780b5dd5af9e979d9f539ad944a4036
              • Instruction ID: 1daf9140798a11d610d2ed789649b8b8c1263b809e7fe675d4e42bb2458b5b6b
              • Opcode Fuzzy Hash: dc679c4258a445a28ae340871587be2c7780b5dd5af9e979d9f539ad944a4036
              • Instruction Fuzzy Hash: 1811BF71108105ABEB51AE78DC40AEB37ADEB05374F114714F9E1972D0C636DC509760
              APIs
                • Part of subcall function 01007DE1: _memmove.LIBCMT ref: 01007E22
                • Part of subcall function 0105AA99: GetClassNameW.USER32(?,?,000000FF), ref: 0105AABC
              • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 01058E73
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: ClassMessageNameSend_memmove
              • String ID: @U=u$ComboBox$ListBox
              • API String ID: 372448540-2258501812
              • Opcode ID: d6fa3b9f4fae10034ad687e1f2fddbb81721546a4b2e29b45e954de9672b49e3
              • Instruction ID: b76fb796c9fc3a00ca6c7b3c54d4d9580e5c5152f82f84c795ee26ced397a100
              • Opcode Fuzzy Hash: d6fa3b9f4fae10034ad687e1f2fddbb81721546a4b2e29b45e954de9672b49e3
              • Instruction Fuzzy Hash: D901F17164121AABAF55FBA5CC408FF7778AB16320F004A1AECE16B2D0EA355808DA50
              APIs
                • Part of subcall function 01007DE1: _memmove.LIBCMT ref: 01007E22
                • Part of subcall function 0105AA99: GetClassNameW.USER32(?,?,000000FF), ref: 0105AABC
              • SendMessageW.USER32(?,00000180,00000000,?), ref: 01058D6B
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: ClassMessageNameSend_memmove
              • String ID: @U=u$ComboBox$ListBox
              • API String ID: 372448540-2258501812
              • Opcode ID: c9f82468bb3433c8c07c67354acfb050fabb6193566c0b5928e361443e9a3cfa
              • Instruction ID: 5c3e4a7a89d3cb8092d4b955b0b6017ef04669235f655ab1d7629f709c1194ac
              • Opcode Fuzzy Hash: c9f82468bb3433c8c07c67354acfb050fabb6193566c0b5928e361443e9a3cfa
              • Instruction Fuzzy Hash: 5101F271B4110AABEF15FBA1C991EFF77E8DF25240F10002AADC66B2D0DE255A088671
              APIs
                • Part of subcall function 01007DE1: _memmove.LIBCMT ref: 01007E22
                • Part of subcall function 0105AA99: GetClassNameW.USER32(?,?,000000FF), ref: 0105AABC
              • SendMessageW.USER32(?,00000182,?,00000000), ref: 01058DEE
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: ClassMessageNameSend_memmove
              • String ID: @U=u$ComboBox$ListBox
              • API String ID: 372448540-2258501812
              • Opcode ID: a3638a7ac5859312917a4de0d21c58f76f95f2735027162d45d64cb08d676c7b
              • Instruction ID: b33a0895d6533c7540aa85f5d78c6f51259d4bee55079a9dabac046f292f545b
              • Opcode Fuzzy Hash: a3638a7ac5859312917a4de0d21c58f76f95f2735027162d45d64cb08d676c7b
              • Instruction Fuzzy Hash: 4A01D672B4110ABBEF11FAA5C981EFF77ECDB25240F10411AADC6772D0DA255E08D671
              APIs
              • GetForegroundWindow.USER32(?,010C57B0,0108D809,000000FC,?,00000000,00000000,?,?,?,0103B969,?,?,?,?,?), ref: 0108ACD1
              • GetFocus.USER32 ref: 0108ACD9
                • Part of subcall function 01002612: GetWindowLongW.USER32(?,000000EB), ref: 01002623
                • Part of subcall function 010025DB: GetWindowLongW.USER32(?,000000EB), ref: 010025EC
              • SendMessageW.USER32(0158E978,000000B0,000001BC,000001C0), ref: 0108AD4B
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: Window$Long$FocusForegroundMessageSend
              • String ID: @U=u
              • API String ID: 3601265619-2594219639
              • Opcode ID: 913686b4f69ce1ba2b610b5a29272808c783cb19b39ca361de987c06696c650d
              • Instruction ID: b0cad9b196906b2405a4e36564708f60481e9bc0b6057dbe6afcb3a7026ec8fc
              • Opcode Fuzzy Hash: 913686b4f69ce1ba2b610b5a29272808c783cb19b39ca361de987c06696c650d
              • Instruction Fuzzy Hash: 4B018435704200CFD725BF38D898AA637E5FB89325F180269E5D6C72A4CB36AC468F50
              APIs
                • Part of subcall function 0101603A: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 01016051
              • SendMessageW.USER32(?,0000000C,00000000,?), ref: 0101607F
              • GetParent.USER32(?), ref: 01050D46
              • InvalidateRect.USER32(00000000,?,01013A4F,?,00000000,00000001), ref: 01050D4D
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: MessageSend$InvalidateParentRectTimeout
              • String ID: @U=u
              • API String ID: 3648793173-2594219639
              • Opcode ID: d5a35e7eb038af697c921892ccea3c20affe1cd82822075aceb7fe120bb66cdc
              • Instruction ID: b6c2651eac48f906a8d60947ad3fde81ca53a5727aba4f66a2b7a721ab4937d8
              • Opcode Fuzzy Hash: d5a35e7eb038af697c921892ccea3c20affe1cd82822075aceb7fe120bb66cdc
              • Instruction Fuzzy Hash: F3F0A730104200FBFF321F74DC09F9A7BA5AB05388F104464F9C45A06AC6FB64509B50
              APIs
              • LoadLibraryA.KERNEL32(advapi32.dll,?,01081039), ref: 01080DF5
              • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 01080E07
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: AddressLibraryLoadProc
              • String ID: RegDeleteKeyExW$advapi32.dll
              • API String ID: 2574300362-4033151799
              • Opcode ID: 1ee2e8ba844517f273856a9bb0609fe293ee3f7358d96cd4b8b9ce1a316096de
              • Instruction ID: 9c1f15d29546a808a1b6b5bac4f777cafc807d4e8a967f6ae8130fd121f0a970
              • Opcode Fuzzy Hash: 1ee2e8ba844517f273856a9bb0609fe293ee3f7358d96cd4b8b9ce1a316096de
              • Instruction Fuzzy Hash: 8DD0C7B0544323CFDB20AF7AC8482CB7AE4AF05342F008C2EA6C2C6144E6B5D090CB00
              APIs
              • LoadLibraryA.KERNEL32(kernel32.dll,?,01004BD0,?,01004DEF,?,010C52F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 01004C11
              • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 01004C23
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: AddressLibraryLoadProc
              • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
              • API String ID: 2574300362-3689287502
              • Opcode ID: e91667ec9a826868ba54f33a90aac67c9ed6c2c83f671bc6e323b049d8cb0967
              • Instruction ID: e29360890cfa75af1e96c97ab4c1ddebb7212c50283e2b4a4ade57bb1bb4a7c3
              • Opcode Fuzzy Hash: e91667ec9a826868ba54f33a90aac67c9ed6c2c83f671bc6e323b049d8cb0967
              • Instruction Fuzzy Hash: D7D0C230500313CFEB216F75C91860ABAD5EF09252F008C6D94C1C6140E6F4C480C710
              APIs
              • LoadLibraryA.KERNEL32(kernel32.dll,?,01004B83,?), ref: 01004C44
              • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 01004C56
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: AddressLibraryLoadProc
              • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
              • API String ID: 2574300362-1355242751
              • Opcode ID: 387ba1b345e360757028fe326ad7bc35b78564d69144cf827c2b2cc241885bfd
              • Instruction ID: 158c9410914b3e3c7930d4bbe83cf3812aac329a5ab65aa86330cef3f38ad19d
              • Opcode Fuzzy Hash: 387ba1b345e360757028fe326ad7bc35b78564d69144cf827c2b2cc241885bfd
              • Instruction Fuzzy Hash: 41D0C230500713CFEB215F36C81860A76D4AF01251F10886D95D1CA154E674D4C0C710
              APIs
              • LoadLibraryA.KERNEL32(kernel32.dll,00000001,01078CF4,?,0108F910), ref: 010790EE
              • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 01079100
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: AddressLibraryLoadProc
              • String ID: GetModuleHandleExW$kernel32.dll
              • API String ID: 2574300362-199464113
              • Opcode ID: 660c3bce4e8759f92ff73bc492bd5b82d33514b2ce00b8f8ccfd114e8bc543f6
              • Instruction ID: 2d101b41a5374cfeae8270cade962dd6f858f327250b57e769140f4d15d2ae00
              • Opcode Fuzzy Hash: 660c3bce4e8759f92ff73bc492bd5b82d33514b2ce00b8f8ccfd114e8bc543f6
              • Instruction Fuzzy Hash: 6ED0C230914313CFDB209F39D41820676D4AF01261B01C83E94C1C6100E674C4C0C750
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: LocalTime__swprintf
              • String ID: %.3d$WIN_XPe
              • API String ID: 2070861257-2409531811
              • Opcode ID: dcd101e844535dfc188127bc280fd30e86a817b54a1e98892c832a0a9f6d1b20
              • Instruction ID: 336995df190165f9cb12126a9a9566dea92c94c584955ab21451078a6d4ef250
              • Opcode Fuzzy Hash: dcd101e844535dfc188127bc280fd30e86a817b54a1e98892c832a0a9f6d1b20
              • Instruction Fuzzy Hash: 81D017F1848119EBCB20DA9098C88FD737CBB1C101F000562F5D2A2080E23ABBD4CA21
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 90f0a78251c04df1571b9ff582af06a4fee65e9d41f5ee3a09ac08709f1113dd
              • Instruction ID: 53c740ec6453f9bd535cd73a7e960a77013bb7859bc24613899dbe99751e2774
              • Opcode Fuzzy Hash: 90f0a78251c04df1571b9ff582af06a4fee65e9d41f5ee3a09ac08709f1113dd
              • Instruction Fuzzy Hash: DEC15974A00206AFDB54CFA8C884AAFBBB5FF48710B548598E945EB251DB30ED81DB90
              APIs
              • CharLowerBuffW.USER32(?,?), ref: 0107E0BE
              • CharLowerBuffW.USER32(?,?), ref: 0107E101
                • Part of subcall function 0107D7A5: CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 0107D7C5
              • VirtualAlloc.KERNEL32(00000000,00000077,00003000,00000040), ref: 0107E301
              • _memmove.LIBCMT ref: 0107E314
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: BuffCharLower$AllocVirtual_memmove
              • String ID:
              • API String ID: 3659485706-0
              • Opcode ID: 3bb3275440d7b8f12ae23f120ebeb96c58beceaefe3cd01556726c9d3a11051e
              • Instruction ID: 2a95dbddc658e9fd23cb4950fb53d2c1c13b6cd8a317c83e1385d3afd5d3015a
              • Opcode Fuzzy Hash: 3bb3275440d7b8f12ae23f120ebeb96c58beceaefe3cd01556726c9d3a11051e
              • Instruction Fuzzy Hash: 5BC15971A043029FC745DF28C48096ABBE4FF89714F0489ADF9D99B351D731E946CB86
              APIs
              • CoInitialize.OLE32(00000000), ref: 010780C3
              • CoUninitialize.OLE32 ref: 010780CE
                • Part of subcall function 0105D56C: CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 0105D5D4
              • VariantInit.OLEAUT32(?), ref: 010780D9
              • VariantClear.OLEAUT32(?), ref: 010783AA
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: Variant$ClearCreateInitInitializeInstanceUninitialize
              • String ID:
              • API String ID: 780911581-0
              • Opcode ID: 3e15fb3abe9edf9ad77f60c6e2b5f13d53e3197193ece9a93d42d8692f6a336d
              • Instruction ID: d0d6ee0eccb221ed1f20202b8125856195cd173d6250467214a8aba485caf265
              • Opcode Fuzzy Hash: 3e15fb3abe9edf9ad77f60c6e2b5f13d53e3197193ece9a93d42d8692f6a336d
              • Instruction Fuzzy Hash: D7A15975604702DFDB51DF28C484A6EB7E4BF98728F048449E9D99B3A1CB30EE01CB96
              APIs
              • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,01092C7C,?), ref: 010576EA
              • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,01092C7C,?), ref: 01057702
              • CLSIDFromProgID.OLE32(?,?,00000000,0108FB80,000000FF,?,00000000,00000800,00000000,?,01092C7C,?), ref: 01057727
              • _memcmp.LIBCMT ref: 01057748
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: FromProg$FreeTask_memcmp
              • String ID:
              • API String ID: 314563124-0
              • Opcode ID: 9e59ea876547c7d50fa6825693b5fc6b2d3fec11adaea2c7bfe358b0bf4a790c
              • Instruction ID: a71465f812371888f6ab8d3bcd74460210f21e2e3c7dd3ae1f1c9926f1d04fac
              • Opcode Fuzzy Hash: 9e59ea876547c7d50fa6825693b5fc6b2d3fec11adaea2c7bfe358b0bf4a790c
              • Instruction Fuzzy Hash: B2814E71A0010AEFCB44DFA8C984DEEB7B9FF89315F204598E545AB250DB71AE06DB60
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: Variant$AllocClearCopyInitString
              • String ID:
              • API String ID: 2808897238-0
              • Opcode ID: b13a4bbcb551931b5539089d75773cdfc55b6d2f73773a1a5e0475ddbed143d0
              • Instruction ID: f96db0e592f5443b62f7659ca5ccb8e3ec4fa3f13209c0ff3d61ea38467cadab
              • Opcode Fuzzy Hash: b13a4bbcb551931b5539089d75773cdfc55b6d2f73773a1a5e0475ddbed143d0
              • Instruction Fuzzy Hash: A551C5746003029ADFA4AF6AC490ABFB7E9AF55310F50D81FD9D6CB291DA36D880CB10
              APIs
              • socket.WSOCK32(00000002,00000002,00000011), ref: 010769D1
              • WSAGetLastError.WSOCK32(00000000), ref: 010769E1
                • Part of subcall function 01009837: __itow.LIBCMT ref: 01009862
                • Part of subcall function 01009837: __swprintf.LIBCMT ref: 010098AC
              • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 01076A45
              • WSAGetLastError.WSOCK32(00000000), ref: 01076A51
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: ErrorLast$__itow__swprintfsocket
              • String ID:
              • API String ID: 2214342067-0
              • Opcode ID: cd2160f4e921f6ffb0f2cbdacdd2bca2fc225175a6a5e3eb903f1bbe834c1adc
              • Instruction ID: c0cdee7d4fe5eb7b3b3314b4f0e446335c90f061df02effa36e5db8e78cf4414
              • Opcode Fuzzy Hash: cd2160f4e921f6ffb0f2cbdacdd2bca2fc225175a6a5e3eb903f1bbe834c1adc
              • Instruction Fuzzy Hash: 6241B174A40601AFFB61BF24CC85FAE77E4AB14B14F04C159FA999B3C2DA719D008B91
              APIs
              • #16.WSOCK32(?,?,00000000,00000000,00000000,00000000,?,?,00000000,0108F910), ref: 010764A7
              • _strlen.LIBCMT ref: 010764D9
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: _strlen
              • String ID:
              • API String ID: 4218353326-0
              • Opcode ID: 89241fd5e1c0be146a1fb7266852b1322e946ecb8a96b9f74c50324fe993766d
              • Instruction ID: f182334f85fb3525bf109c39e5b0ddf5a0bda20160eb3cc5c56f6fac3971f220
              • Opcode Fuzzy Hash: 89241fd5e1c0be146a1fb7266852b1322e946ecb8a96b9f74c50324fe993766d
              • Instruction Fuzzy Hash: 50411731A00106AFDB15EB68DC84FFEB7A9AF14314F008155E9DA9B2D2DB31AD04CB54
              APIs
              • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 0106B89E
              • GetLastError.KERNEL32(?,00000000), ref: 0106B8C4
              • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 0106B8E9
              • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 0106B915
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: CreateHardLink$DeleteErrorFileLast
              • String ID:
              • API String ID: 3321077145-0
              • Opcode ID: 97d7e99aafb762d5bcb4ef482af6fa1d96731bb940aac48def590b4eba438753
              • Instruction ID: 8fc09b49c72412e385871ec37cd96f769f7ff4d0e245d4a0c16924611128ee31
              • Opcode Fuzzy Hash: 97d7e99aafb762d5bcb4ef482af6fa1d96731bb940aac48def590b4eba438753
              • Instruction Fuzzy Hash: F1411A75600512DFDB12EF15C184A9DBBE5AF59714F09C088EC8AAB3A2CB34FE01CB91
              APIs
              • ClientToScreen.USER32(?,?), ref: 0108AB60
              • GetWindowRect.USER32(?,?), ref: 0108ABD6
              • PtInRect.USER32(?,?,0108C014), ref: 0108ABE6
              • MessageBeep.USER32(00000000), ref: 0108AC57
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: Rect$BeepClientMessageScreenWindow
              • String ID:
              • API String ID: 1352109105-0
              • Opcode ID: b696187515d5a6449b968137531f361bc99612908dcb12857e78ab878096783f
              • Instruction ID: 3584b6cae55abf578c59d754f5bbdb589f3706304f00e13af982f00524e3da05
              • Opcode Fuzzy Hash: b696187515d5a6449b968137531f361bc99612908dcb12857e78ab878096783f
              • Instruction Fuzzy Hash: ED419D34B08109DFCB21EF58C884BAE7BF5FB48300F1884AAE9D49B655D735A841CF90
              APIs
              • GetKeyboardState.USER32(?,00000000,?,00000001), ref: 01060B27
              • SetKeyboardState.USER32(00000080,?,00000001), ref: 01060B43
              • PostMessageW.USER32(00000000,00000102,00000001,00000001), ref: 01060BA9
              • SendInput.USER32(00000001,00000000,0000001C,00000000,?,00000001), ref: 01060BFB
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: KeyboardState$InputMessagePostSend
              • String ID:
              • API String ID: 432972143-0
              • Opcode ID: f6b31226abb51228aae20e0368771336a5ad01ede8183d6c6325736c946aebe2
              • Instruction ID: 6259b211e704b1e228b0687ad74dac5d00f65ad9dbf3362f3bfff13f4d3e6f4f
              • Opcode Fuzzy Hash: f6b31226abb51228aae20e0368771336a5ad01ede8183d6c6325736c946aebe2
              • Instruction Fuzzy Hash: 1F314B30A84209AEFB718E2DC805BFEBBEDEB45318F08929AF6C1511D9C77985508761
              APIs
              • GetKeyboardState.USER32(?,753DC0D0,?,00008000), ref: 01060C66
              • SetKeyboardState.USER32(00000080,?,00008000), ref: 01060C82
              • PostMessageW.USER32(00000000,00000101,00000000), ref: 01060CE1
              • SendInput.USER32(00000001,?,0000001C,753DC0D0,?,00008000), ref: 01060D33
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: KeyboardState$InputMessagePostSend
              • String ID:
              • API String ID: 432972143-0
              • Opcode ID: e431429e1e56cfddf97b7af7d9b8b9a705f5b4b761b1974c35e4cb6ff1eab982
              • Instruction ID: 4ed8d1fc75b51d7317d32328d5745cb87ba8574974dfafc326b7c51f296d2863
              • Opcode Fuzzy Hash: e431429e1e56cfddf97b7af7d9b8b9a705f5b4b761b1974c35e4cb6ff1eab982
              • Instruction Fuzzy Hash: B331243098030DAEFB758B28C804BFEBBAEEB45320F04439AF5C1521D9C3799555C7A2
              APIs
              • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 010361FB
              • __isleadbyte_l.LIBCMT ref: 01036229
              • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 01036257
              • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 0103628D
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
              • String ID:
              • API String ID: 3058430110-0
              • Opcode ID: 9cafbccffa02552e31e004d27eb413f92a6c4125a2c4a1ef99019d224531532a
              • Instruction ID: a0da3e252f1186492e0ad8c64b931f23496b8f701f6262286f4281b6bc7f57a2
              • Opcode Fuzzy Hash: 9cafbccffa02552e31e004d27eb413f92a6c4125a2c4a1ef99019d224531532a
              • Instruction Fuzzy Hash: F031C030604656BFEF228E69CC44BAA7FF9BF82310F164069E8A487191D732DA50C790
              APIs
              • GetForegroundWindow.USER32 ref: 01084F02
                • Part of subcall function 01063641: GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0106365B
                • Part of subcall function 01063641: GetCurrentThreadId.KERNEL32 ref: 01063662
                • Part of subcall function 01063641: AttachThreadInput.USER32(00000000,?,01065005), ref: 01063669
              • GetCaretPos.USER32(?), ref: 01084F13
              • ClientToScreen.USER32(00000000,?), ref: 01084F4E
              • GetForegroundWindow.USER32 ref: 01084F54
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
              • String ID:
              • API String ID: 2759813231-0
              • Opcode ID: 6ec32fb5c3afd499142a6be84b4c844e5af9bc6b2651d40b7a1bb1f9f1f7880a
              • Instruction ID: d8de46116c83296efed474bfe72eaae3cc655a9393b72a4e5c4d4060495f6f32
              • Opcode Fuzzy Hash: 6ec32fb5c3afd499142a6be84b4c844e5af9bc6b2651d40b7a1bb1f9f1f7880a
              • Instruction Fuzzy Hash: 9E310DB1D00109AFDB11EFB5C8849EFB7FDEF98304F10806AE495E7241DA759E058BA1
              APIs
                • Part of subcall function 01002612: GetWindowLongW.USER32(?,000000EB), ref: 01002623
              • GetCursorPos.USER32(?), ref: 0108C4D2
              • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,0103B9AB,?,?,?,?,?), ref: 0108C4E7
              • GetCursorPos.USER32(?), ref: 0108C534
              • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,0103B9AB,?,?,?), ref: 0108C56E
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: Cursor$LongMenuPopupProcTrackWindow
              • String ID:
              • API String ID: 2864067406-0
              • Opcode ID: 55b816b28a0937745c98f67bf665620890733d34ee2578c69720c646324976bd
              • Instruction ID: 60efa896642df6dc1d6d2146933f7533007bc36ad96923a9f4c981687e255424
              • Opcode Fuzzy Hash: 55b816b28a0937745c98f67bf665620890733d34ee2578c69720c646324976bd
              • Instruction Fuzzy Hash: F0318F35604018AFEF259F58C858EEE7BF5EB09320F044199FAC59B251CB36A990DFB4
              APIs
                • Part of subcall function 0105810A: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 01058121
                • Part of subcall function 0105810A: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 0105812B
                • Part of subcall function 0105810A: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 0105813A
                • Part of subcall function 0105810A: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 01058141
                • Part of subcall function 0105810A: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 01058157
              • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 010586A3
              • _memcmp.LIBCMT ref: 010586C6
              • GetProcessHeap.KERNEL32(00000000,00000000), ref: 010586FC
              • HeapFree.KERNEL32(00000000), ref: 01058703
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
              • String ID:
              • API String ID: 1592001646-0
              • Opcode ID: 39039fb51c3640fc31cdb70f1f2f8ed16c091da3f372e436f925573bb9d1c9c2
              • Instruction ID: 3cc04a0ed2ba35e94ad11f5f39d1960a8cdddc1f2205cc3bdf7b358b32534f0a
              • Opcode Fuzzy Hash: 39039fb51c3640fc31cdb70f1f2f8ed16c091da3f372e436f925573bb9d1c9c2
              • Instruction Fuzzy Hash: 3D219F31E00109EFDB50DFA9C948BEEB7F8EF44314F15809ADD84A7244D731AA05CB60
              APIs
              • __setmode.LIBCMT ref: 010209AE
                • Part of subcall function 01005A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,01067896,?,?,00000000), ref: 01005A2C
                • Part of subcall function 01005A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,01067896,?,?,00000000,?,?), ref: 01005A50
              • _fprintf.LIBCMT ref: 010209E5
              • OutputDebugStringW.KERNEL32(?), ref: 01055DBB
                • Part of subcall function 01024AAA: _flsall.LIBCMT ref: 01024AC3
              • __setmode.LIBCMT ref: 01020A1A
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: ByteCharMultiWide__setmode$DebugOutputString_flsall_fprintf
              • String ID:
              • API String ID: 521402451-0
              • Opcode ID: 65fd4417cd53b50bf18a24bf7d769ffe7be4dc243efa904d55d602d1b390b9d1
              • Instruction ID: e43833ad4916b85cb37090c00c76ae30f17905e4ca3771fc072241e5d72349fa
              • Opcode Fuzzy Hash: 65fd4417cd53b50bf18a24bf7d769ffe7be4dc243efa904d55d602d1b390b9d1
              • Instruction Fuzzy Hash: 95118C32A042267FEB05B3B49C489FEB7AC9F65220F100055F1C9971C1EF70494287A1
              APIs
              • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 010717A3
                • Part of subcall function 0107182D: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0107184C
                • Part of subcall function 0107182D: InternetCloseHandle.WININET(00000000), ref: 010718E9
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: Internet$CloseConnectHandleOpen
              • String ID:
              • API String ID: 1463438336-0
              • Opcode ID: eb19d8ad3319c9e24bc2d8de4eab78e5dbad875ac5f645e70aebe003b2546157
              • Instruction ID: c8713c8caf39f8dee7b698b0f7d6d4f63192324673760897bf5c515461023d6d
              • Opcode Fuzzy Hash: eb19d8ad3319c9e24bc2d8de4eab78e5dbad875ac5f645e70aebe003b2546157
              • Instruction Fuzzy Hash: 12219231A04606BFEB529F649C00FBEBBE9FF48710F10401AFA91D6590DB71D41197A8
              APIs
              • GetFileAttributesW.KERNEL32(?,0108FAC0), ref: 01063A64
              • GetLastError.KERNEL32 ref: 01063A73
              • CreateDirectoryW.KERNEL32(?,00000000), ref: 01063A82
              • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,0108FAC0), ref: 01063ADF
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: CreateDirectory$AttributesErrorFileLast
              • String ID:
              • API String ID: 2267087916-0
              • Opcode ID: 76944f5acb4231ff3152cf1417a522504b3f57704b9e56f8798883b5f36b3742
              • Instruction ID: c379865f36c3f1d966e40fe327b5c3c433391aa7b77ba9dd748f5852d49922cd
              • Opcode Fuzzy Hash: 76944f5acb4231ff3152cf1417a522504b3f57704b9e56f8798883b5f36b3742
              • Instruction Fuzzy Hash: 01217F749082029F9710EF38C8818AFBBE8BE55264F144A5DF4DDCB2D1DB319946DB92
              APIs
              • _free.LIBCMT ref: 01035101
                • Part of subcall function 0102571C: __FF_MSGBANNER.LIBCMT ref: 01025733
                • Part of subcall function 0102571C: __NMSG_WRITE.LIBCMT ref: 0102573A
                • Part of subcall function 0102571C: RtlAllocateHeap.NTDLL(01570000,00000000,00000001,00000000,?,?,?,01020DD3,?), ref: 0102575F
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: AllocateHeap_free
              • String ID:
              • API String ID: 614378929-0
              • Opcode ID: 8a27cac3bb438d0c4ae623e528aab3b5eea69f776a565a549987ae2b63d9b724
              • Instruction ID: e66b48da7e7c89d043063d265e9db137c585bf833d2e32490110b7c82d2180e1
              • Opcode Fuzzy Hash: 8a27cac3bb438d0c4ae623e528aab3b5eea69f776a565a549987ae2b63d9b724
              • Instruction Fuzzy Hash: E011E972504227AFCF323F78EC4469E3BDCAFA5261B10896EF9C49A264DE3584408790
              APIs
              • _memset.LIBCMT ref: 010044CF
                • Part of subcall function 0100407C: _memset.LIBCMT ref: 010040FC
                • Part of subcall function 0100407C: _wcscpy.LIBCMT ref: 01004150
                • Part of subcall function 0100407C: Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 01004160
              • KillTimer.USER32(?,00000001,?,?), ref: 01004524
              • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 01004533
              • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 0103D4B9
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: IconNotifyShell_Timer_memset$Kill_wcscpy
              • String ID:
              • API String ID: 1378193009-0
              • Opcode ID: aa4d09b8d85b2f8fe704b757643ed01ee9838a42d8678a6e7955b54b14eb8122
              • Instruction ID: 0b6eae4e8fc4ffb66ac94349a2807b970d3476738b3c52bd31769d341b47ac45
              • Opcode Fuzzy Hash: aa4d09b8d85b2f8fe704b757643ed01ee9838a42d8678a6e7955b54b14eb8122
              • Instruction Fuzzy Hash: C521F574908384AFF7739B688855BEABBECAB42319F0400CDE7DA96182C7752684CB45
              APIs
                • Part of subcall function 01005A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,01067896,?,?,00000000), ref: 01005A2C
                • Part of subcall function 01005A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,01067896,?,?,00000000,?,?), ref: 01005A50
              • gethostbyname.WSOCK32(?,?,?), ref: 01076399
              • WSAGetLastError.WSOCK32(00000000), ref: 010763A4
              • _memmove.LIBCMT ref: 010763D1
              • inet_ntoa.WSOCK32(?), ref: 010763DC
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: ByteCharMultiWide$ErrorLast_memmovegethostbynameinet_ntoa
              • String ID:
              • API String ID: 1504782959-0
              • Opcode ID: 07f98ca4ce1d645cf9b5d30f02d62000f8f0ad0917aa8e0328d9d8e1d12d47b9
              • Instruction ID: b37ec33b7b886b3e5b6e66b4b132669d94124165f46e374b8df069b23b5fb010
              • Opcode Fuzzy Hash: 07f98ca4ce1d645cf9b5d30f02d62000f8f0ad0917aa8e0328d9d8e1d12d47b9
              • Instruction Fuzzy Hash: 1F11603190010AAFDF01FBA4DD45CEEB7B8AF15214F144065E586B72A1DB31AE54CBA1
              APIs
              • SendMessageW.USER32(?,000000B0,?,?), ref: 01058B61
              • SendMessageW.USER32(?,000000C9,?,00000000), ref: 01058B73
              • SendMessageW.USER32(?,000000C9,?,00000000), ref: 01058B89
              • SendMessageW.USER32(?,000000C9,?,00000000), ref: 01058BA4
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: MessageSend
              • String ID:
              • API String ID: 3850602802-0
              • Opcode ID: 80a388f9a12afe5b89f5c6cc9a5a81f7b6be765ea24314d2b34983f15fe7ce99
              • Instruction ID: 5ee2dd55866a553f8e825ec278d8bdb8cb90482053bb1c4222560456a2354ee4
              • Opcode Fuzzy Hash: 80a388f9a12afe5b89f5c6cc9a5a81f7b6be765ea24314d2b34983f15fe7ce99
              • Instruction Fuzzy Hash: 6C114C79900219FFEB11DFA5C884FAEBBB8FB48710F204196EE40B7250D6716E10DB94
              APIs
                • Part of subcall function 01002612: GetWindowLongW.USER32(?,000000EB), ref: 01002623
              • DefDlgProcW.USER32(?,00000020,?), ref: 010012D8
              • GetClientRect.USER32(?,?), ref: 0103B5FB
              • GetCursorPos.USER32(?), ref: 0103B605
              • ScreenToClient.USER32(?,?), ref: 0103B610
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: Client$CursorLongProcRectScreenWindow
              • String ID:
              • API String ID: 4127811313-0
              • Opcode ID: bf3fd1e85c2cfe9c9ad1832df177874947874565f39b78c3da3aa76721d2a3d8
              • Instruction ID: 22060fc0521ca1478f2f3ce60b49dfa56fd1a93150d551b7458b80369d268a3c
              • Opcode Fuzzy Hash: bf3fd1e85c2cfe9c9ad1832df177874947874565f39b78c3da3aa76721d2a3d8
              • Instruction Fuzzy Hash: 65113D7560001AEFDB11EFA8D8899FE7BB8FB05300F400555FA81E7280C735FA618BA5
              APIs
              • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,0105FCED,?,01060D40,?,00008000), ref: 0106115F
              • Sleep.KERNEL32(00000000,?,?,?,?,?,?,0105FCED,?,01060D40,?,00008000), ref: 01061184
              • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,0105FCED,?,01060D40,?,00008000), ref: 0106118E
              • Sleep.KERNEL32(?,?,?,?,?,?,?,0105FCED,?,01060D40,?,00008000), ref: 010611C1
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: CounterPerformanceQuerySleep
              • String ID:
              • API String ID: 2875609808-0
              • Opcode ID: 51efbdcf148a8110130b8c194fb934256f36f8e4c1c676e4577875cf32ebb1ba
              • Instruction ID: d7b71a6ca0c616fc173d90f4d6cf0079e4dfaddc61ac90dd40c567757df7afcf
              • Opcode Fuzzy Hash: 51efbdcf148a8110130b8c194fb934256f36f8e4c1c676e4577875cf32ebb1ba
              • Instruction Fuzzy Hash: FD115A31C0461DD7CF109FA4D888AEEBBB8FF49711F004046EAC0BA244CB359550CBD1
              APIs
              • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000,00000000), ref: 0105D84D
              • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 0105D864
              • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 0105D879
              • RegisterTypeLibForUser.OLEAUT32(?,?,00000000), ref: 0105D897
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: Type$Register$FileLoadModuleNameUser
              • String ID:
              • API String ID: 1352324309-0
              • Opcode ID: e66128ac73156f1fa40b71291f73ca9c938748c133290eaa5a0728612ed4add5
              • Instruction ID: 396d566eeb0d24fd151e782a43c391717359b436bd2d955f6a96a1c81f429c20
              • Opcode Fuzzy Hash: e66128ac73156f1fa40b71291f73ca9c938748c133290eaa5a0728612ed4add5
              • Instruction Fuzzy Hash: A711A571605305DBF3208F90DC08FA7BBBCEB00700F00455BAA99C6040D7B5E9048BA1
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
              • String ID:
              • API String ID: 3016257755-0
              • Opcode ID: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
              • Instruction ID: fb1c0fa57074dbacb2156ae8b681eaa5e6954d0b456b60372ce124904d59632e
              • Opcode Fuzzy Hash: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
              • Instruction Fuzzy Hash: BC014CBA44014AFBDF165F88CC45CEE7F6ABB68250F488455FE9858030D237C5B1AB81
              APIs
              • GetWindowRect.USER32(?,?), ref: 0108B2E4
              • ScreenToClient.USER32(?,?), ref: 0108B2FC
              • ScreenToClient.USER32(?,?), ref: 0108B320
              • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 0108B33B
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: ClientRectScreen$InvalidateWindow
              • String ID:
              • API String ID: 357397906-0
              • Opcode ID: e1d0c8698fb23201d6b5e268fe095587075f5d11a8aa143f679d69e575597457
              • Instruction ID: 6183ce7b78b470d14d426c40110373a28d304b5fe0df35f48fafae4eb39eaf89
              • Opcode Fuzzy Hash: e1d0c8698fb23201d6b5e268fe095587075f5d11a8aa143f679d69e575597457
              • Instruction Fuzzy Hash: 141174B9D0420AEFDB51DFA9C4849EEBBF9FF08214F108156E954E3210D735AA618F50
              APIs
              • _memset.LIBCMT ref: 0108B644
              • _memset.LIBCMT ref: 0108B653
              • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,010C6F20,010C6F64), ref: 0108B682
              • CloseHandle.KERNEL32 ref: 0108B694
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: _memset$CloseCreateHandleProcess
              • String ID:
              • API String ID: 3277943733-0
              • Opcode ID: 0b912af71dec3da1be0449826b9395f4a0e39769a139150d49746f7c9064e100
              • Instruction ID: dcf83b52cb03ae76439f4766faf3cf39747c4a1428ab3baf4b1cd121b31c3e98
              • Opcode Fuzzy Hash: 0b912af71dec3da1be0449826b9395f4a0e39769a139150d49746f7c9064e100
              • Instruction Fuzzy Hash: 98F05EB25403127EE2302765AC05FBB3A9CEB08695F804020FAC9E9285D77B88118BA8
              APIs
              • EnterCriticalSection.KERNEL32(?), ref: 01066BE6
                • Part of subcall function 010676C4: _memset.LIBCMT ref: 010676F9
              • _memmove.LIBCMT ref: 01066C09
              • _memset.LIBCMT ref: 01066C16
              • LeaveCriticalSection.KERNEL32(?), ref: 01066C26
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: CriticalSection_memset$EnterLeave_memmove
              • String ID:
              • API String ID: 48991266-0
              • Opcode ID: b64f819e9127dc7ac78dcf31b57d6e09fc829c0aa00bcebeb07d2367fd487cba
              • Instruction ID: b19bee410f42baa2c1bd0d80e1d66104bd7bac587a4f471f3415cf9d3c5a9cb1
              • Opcode Fuzzy Hash: b64f819e9127dc7ac78dcf31b57d6e09fc829c0aa00bcebeb07d2367fd487cba
              • Instruction Fuzzy Hash: 28F0543A100211ABCF016F55DC84A8ABB29EF55320F04C051FE489E21AD735E811CBB4
              APIs
              • GetSysColor.USER32(00000008), ref: 01002231
              • SetTextColor.GDI32(?,000000FF), ref: 0100223B
              • SetBkMode.GDI32(?,00000001), ref: 01002250
              • GetStockObject.GDI32(00000005), ref: 01002258
              • GetWindowDC.USER32(?,00000000), ref: 0103BE83
              • GetPixel.GDI32(00000000,00000000,00000000), ref: 0103BE90
              • GetPixel.GDI32(00000000,?,00000000), ref: 0103BEA9
              • GetPixel.GDI32(00000000,00000000,?), ref: 0103BEC2
              • GetPixel.GDI32(00000000,?,?), ref: 0103BEE2
              • ReleaseDC.USER32(?,00000000), ref: 0103BEED
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: Pixel$Color$ModeObjectReleaseStockTextWindow
              • String ID:
              • API String ID: 1946975507-0
              • Opcode ID: f2fd82375a045d0451d272ffeea2dddeb9b9f65e62f6186fd148bf67a0341fee
              • Instruction ID: 606c0a323cd8f4ab8861e97f21f483cc4b7802def50af11ca4f609ad74c67ac2
              • Opcode Fuzzy Hash: f2fd82375a045d0451d272ffeea2dddeb9b9f65e62f6186fd148bf67a0341fee
              • Instruction Fuzzy Hash: 6FE03031108145AAEF615F78E84D7D83F54EB46336F108396FBE9480D5C7764590DB21
              APIs
              • GetCurrentThread.KERNEL32 ref: 0105871B
              • OpenThreadToken.ADVAPI32(00000000,?,?,?,010582E6), ref: 01058722
              • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,010582E6), ref: 0105872F
              • OpenProcessToken.ADVAPI32(00000000,?,?,?,010582E6), ref: 01058736
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: CurrentOpenProcessThreadToken
              • String ID:
              • API String ID: 3974789173-0
              • Opcode ID: 79004e96d539497dd5cb368e8e9210d26ce4f12fddbd1e135fbb016edab3da53
              • Instruction ID: 01b1db4a919ed5ebc81633c2102b71703a89bbc1ffa49c60f222a63cd4cd7b9b
              • Opcode Fuzzy Hash: 79004e96d539497dd5cb368e8e9210d26ce4f12fddbd1e135fbb016edab3da53
              • Instruction Fuzzy Hash: 24E086366193129FDBB05FB55D0CB5B3BACEF54791F148858BAC5C9044D63D8052CB50
              APIs
              • OleSetContainedObject.OLE32(?,00000001), ref: 0105B4BE
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: ContainedObject
              • String ID: AutoIt3GUI$Container
              • API String ID: 3565006973-3941886329
              • Opcode ID: 2d0589e7f0aed0e4f96b00b58014b21742e15e594d748217961381a8220d06b5
              • Instruction ID: 265b8ffac1d756d00a41809014354f605ebee9d7139b56ee7b352072584a153a
              • Opcode Fuzzy Hash: 2d0589e7f0aed0e4f96b00b58014b21742e15e594d748217961381a8220d06b5
              • Instruction Fuzzy Hash: 37914C70600601AFDB94DF68C884BABBBE5FF49714F10856DED86DB291DB71E841CB50
              APIs
                • Part of subcall function 0101FC86: _wcscpy.LIBCMT ref: 0101FCA9
                • Part of subcall function 01009837: __itow.LIBCMT ref: 01009862
                • Part of subcall function 01009837: __swprintf.LIBCMT ref: 010098AC
              • __wcsnicmp.LIBCMT ref: 0106B02D
              • WNetUseConnectionW.MPR(00000000,?,?,00000000,?,?,00000100,?), ref: 0106B0F6
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: Connection__itow__swprintf__wcsnicmp_wcscpy
              • String ID: LPT
              • API String ID: 3222508074-1350329615
              • Opcode ID: 1f1ebadac092de2ccba98ec990d6b2badd291c60bd4f3dc64208d8933966b2ec
              • Instruction ID: a35fc6b1f2bbcd97994e16a4badb0142db7bac73c727c37a3bf3188b95731acf
              • Opcode Fuzzy Hash: 1f1ebadac092de2ccba98ec990d6b2badd291c60bd4f3dc64208d8933966b2ec
              • Instruction Fuzzy Hash: 7E616FB5A00215EFDB15DF98C890EEEB7F8EB08710F404099F996EB291D670AE44CB50
              APIs
              • Sleep.KERNEL32(00000000), ref: 01012968
              • GlobalMemoryStatusEx.KERNEL32(?), ref: 01012981
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: GlobalMemorySleepStatus
              • String ID: @
              • API String ID: 2783356886-2766056989
              • Opcode ID: c8a27486a0bab28337a8f3daaf580aae9d1b799779b03b0fcb41e5434bc1bbb7
              • Instruction ID: 6764b0cdede51319a5e228dae01ed856625d484f297fb0a555937ff96dbddf48
              • Opcode Fuzzy Hash: c8a27486a0bab28337a8f3daaf580aae9d1b799779b03b0fcb41e5434bc1bbb7
              • Instruction Fuzzy Hash: A8516772408B459BE321EF14D885BEFBBE8FF94344F81884DF2D881195DB718928CB66
              APIs
                • Part of subcall function 01004F0B: __fread_nolock.LIBCMT ref: 01004F29
              • _wcscmp.LIBCMT ref: 01069824
              • _wcscmp.LIBCMT ref: 01069837
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: _wcscmp$__fread_nolock
              • String ID: FILE
              • API String ID: 4029003684-3121273764
              • Opcode ID: a4abbee88f2d2830a3ca7fc17a5b74c4a7cf5ea9d3d92cc6a21a58bfe4c54886
              • Instruction ID: ed0bb9527a6fc646a0620fa471e49101a2258b495c6f710009838ef998f90020
              • Opcode Fuzzy Hash: a4abbee88f2d2830a3ca7fc17a5b74c4a7cf5ea9d3d92cc6a21a58bfe4c54886
              • Instruction Fuzzy Hash: 1741DB71A0021ABEEF219EA5CC45FEFBBFDDF85714F000469FA44EB180DA71A9048B65
              APIs
              • _memset.LIBCMT ref: 0107259E
              • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 010725D4
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: CrackInternet_memset
              • String ID: |
              • API String ID: 1413715105-2343686810
              • Opcode ID: 2752e260ff3a1e893db07823d21eab101867663d9410bd521b37f700ce50db39
              • Instruction ID: 5b8e9d56f6cc42b1cf33fec3304a4654a329cda16220df2d023117e880832e7c
              • Opcode Fuzzy Hash: 2752e260ff3a1e893db07823d21eab101867663d9410bd521b37f700ce50db39
              • Instruction Fuzzy Hash: 79310A71D0011AABDF11EFA4CC84EEEBFB8FF18350F10005AE999A6161DB355955DB60
              APIs
              • SendMessageW.USER32(?,00001132,00000000,?), ref: 01087B61
              • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 01087B76
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: MessageSend
              • String ID: '
              • API String ID: 3850602802-1997036262
              • Opcode ID: dab12c4a4c568ae90e3ebb05c3039ee816d6adeb8e54d05ebd5626f2dfeb7812
              • Instruction ID: 5fd9140f36cf5afd2d263762be17bd37cdc57261143e86d6d4cf3655827cee01
              • Opcode Fuzzy Hash: dab12c4a4c568ae90e3ebb05c3039ee816d6adeb8e54d05ebd5626f2dfeb7812
              • Instruction Fuzzy Hash: D5411B74A0520A9FDB54DFA8C880BDABBF5FF49300F20016AEA84AB345D771A951CF90
              APIs
              • DestroyWindow.USER32(?,?,?,?), ref: 01086B17
              • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 01086B53
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: Window$DestroyMove
              • String ID: static
              • API String ID: 2139405536-2160076837
              • Opcode ID: e4c7521e492f623b7cc25ec3110c662926b4a4c085eb80ad3514453e58699ad1
              • Instruction ID: 73ff5ead170af180e3d1b0ebe4e356b236a00f591075bf341cffcf092d13c2c9
              • Opcode Fuzzy Hash: e4c7521e492f623b7cc25ec3110c662926b4a4c085eb80ad3514453e58699ad1
              • Instruction Fuzzy Hash: 50319071200605AEEB11AF79CC40BFB77E9FF48764F118619F9E997190DA31A891CB60
              APIs
              • SendMessageW.USER32(?,0000110A,00000000,00000000), ref: 01059965
              • SendMessageW.USER32(?,0000110A,00000004,00000000), ref: 0105999F
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: MessageSend
              • String ID: @U=u
              • API String ID: 3850602802-2594219639
              • Opcode ID: 977fe32f97f92b296f386bcee45e3678d966bd7b14af8ae7bfca83518083b273
              • Instruction ID: c2ee12cc289216d46dbd767399ba82e0fa61035206e3200a170ceec4e3efe5b1
              • Opcode Fuzzy Hash: 977fe32f97f92b296f386bcee45e3678d966bd7b14af8ae7bfca83518083b273
              • Instruction Fuzzy Hash: E521EB31D00206EBDF52EB68C880DFFBBB9EF98614F144059EED5A7290DA755841C7A0
              APIs
              • _memset.LIBCMT ref: 01062911
              • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 0106294C
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: InfoItemMenu_memset
              • String ID: 0
              • API String ID: 2223754486-4108050209
              • Opcode ID: c1cfa7e2f436488f59eab151dcccd4d8a4c6880076bb9fabde5439a78315c89b
              • Instruction ID: 54247fb588db29eda0f7b208200d9d88bd9954670e1d9edd0e407f3765f5b378
              • Opcode Fuzzy Hash: c1cfa7e2f436488f59eab151dcccd4d8a4c6880076bb9fabde5439a78315c89b
              • Instruction Fuzzy Hash: 35316F31A003069FEB65DE5CCD85BEEBFEDEF85390F180059EAC5A61A0DB709544CB61
              APIs
              • __snwprintf.LIBCMT ref: 01073A66
                • Part of subcall function 01007DE1: _memmove.LIBCMT ref: 01007E22
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: __snwprintf_memmove
              • String ID: , $$AUTOITCALLVARIABLE%d
              • API String ID: 3506404897-2584243854
              • Opcode ID: 200fa91a3a1d30cb3514119d937feec5fb925ccaccc1df45ffd319eeb64e79b0
              • Instruction ID: 89672f3cf59cd77323c6f74f5a56701c91fff5cad995d57fedb8827e66ce3d86
              • Opcode Fuzzy Hash: 200fa91a3a1d30cb3514119d937feec5fb925ccaccc1df45ffd319eeb64e79b0
              • Instruction Fuzzy Hash: F7218C71A0021EBADF15FF64CC81EEE7BB9BB54300F404459E985AB180DA34E941CBA9
              APIs
                • Part of subcall function 0101603A: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 01016051
              • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 0105AA10
              • _strlen.LIBCMT ref: 0105AA1B
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: MessageSend$Timeout_strlen
              • String ID: @U=u
              • API String ID: 2777139624-2594219639
              • Opcode ID: 7dc46deb01b442653e1b0f0b11a521b6842061575c5030ff4d9311f60f68813e
              • Instruction ID: 1350bb64f08de89f07ca5b2b0d66632281bacbab707727fb4c0b63f5a0e4c585
              • Opcode Fuzzy Hash: 7dc46deb01b442653e1b0f0b11a521b6842061575c5030ff4d9311f60f68813e
              • Instruction Fuzzy Hash: 40112732700207AADF95BE78DC819FF7BB99F59240F00016EEE868B192DE2598458660
              APIs
                • Part of subcall function 010655FD: GetLocalTime.KERNEL32 ref: 0106560A
                • Part of subcall function 010655FD: _wcsncpy.LIBCMT ref: 0106563F
                • Part of subcall function 010655FD: _wcsncpy.LIBCMT ref: 01065671
                • Part of subcall function 010655FD: _wcsncpy.LIBCMT ref: 010656A4
                • Part of subcall function 010655FD: _wcsncpy.LIBCMT ref: 010656E6
              • SendMessageW.USER32(?,00001002,00000000,?), ref: 010868FF
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: _wcsncpy$LocalMessageSendTime
              • String ID: @U=u$SysDateTimePick32
              • API String ID: 2466184910-2530228043
              • Opcode ID: 0c69845497b974dc528c465265312b4df69e2ec42cd26976390d868b6b419692
              • Instruction ID: dd642c12e4e32c6ae93a60cc5f169c36c140be3b8f2ec2f47ed229af753059db
              • Opcode Fuzzy Hash: 0c69845497b974dc528c465265312b4df69e2ec42cd26976390d868b6b419692
              • Instruction Fuzzy Hash: 86215C71354219AFEF22AE68DC81FFE33A9EB44350F210619F9D4AB1C0D676EC808760
              APIs
              • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0105923E
                • Part of subcall function 010613DE: GetWindowThreadProcessId.USER32(?,?), ref: 01061409
                • Part of subcall function 010613DE: OpenProcess.KERNEL32(00000438,00000000,?,?,?,0105925A,00000034,?,?,00001004,00000000,00000000), ref: 01061419
                • Part of subcall function 010613DE: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,0105925A,00000034,?,?,00001004,00000000,00000000), ref: 0106142F
                • Part of subcall function 010614BC: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,01059296,?,?,00000034,00000800,?,00000034), ref: 010614E6
              • SendMessageW.USER32(?,00001073,00000000,?), ref: 010592A5
                • Part of subcall function 01061487: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,010592C5,?,?,00000800,?,00001073,00000000,?,?), ref: 010614B1
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: Process$MemoryMessageSend$AllocOpenReadThreadVirtualWindowWrite
              • String ID: @U=u
              • API String ID: 1045663743-2594219639
              • Opcode ID: 2cec2c190ef06adc1d1d22db58ba782407e78bbbecc812070929dec212828e26
              • Instruction ID: ffd10c88169ce2dc33d5ba67ab88354ecdf2d9b08024f1739674ee87b997de33
              • Opcode Fuzzy Hash: 2cec2c190ef06adc1d1d22db58ba782407e78bbbecc812070929dec212828e26
              • Instruction Fuzzy Hash: 40218331901129EBEF61DBA8DC80FDEBBB8FF19354F1001A5F988A7190DA715A44CF90
              APIs
              • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 01086761
              • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 0108676C
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: MessageSend
              • String ID: Combobox
              • API String ID: 3850602802-2096851135
              • Opcode ID: 395b78d8b7c79ea8eeec6f35871670da59fbaaddc3228ba9a198946fb8d0da31
              • Instruction ID: 32c214650e0cb78d7f274a07bf63b68ceaf482a1eef8c5d171594eb9797bdb5a
              • Opcode Fuzzy Hash: 395b78d8b7c79ea8eeec6f35871670da59fbaaddc3228ba9a198946fb8d0da31
              • Instruction Fuzzy Hash: D8119375204209AFEF62AF58DC80EEB37AAFB48364F110129F9D497291E6369C5187A0
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID:
              • String ID: @U=u
              • API String ID: 0-2594219639
              • Opcode ID: 63d7f6ca863a8b22e13b6553ffc87fb005ad288b5641fc0e50ed49855ef25982
              • Instruction ID: 51a2f4a9eea9c7decdf42c599fc5e979ab50516a8aa5ed71010f1ad9e6226b37
              • Opcode Fuzzy Hash: 63d7f6ca863a8b22e13b6553ffc87fb005ad288b5641fc0e50ed49855ef25982
              • Instruction Fuzzy Hash: 10218C35218118BFEB11BE68CC45FBE37E4FB49318F404195FAD2DA1D0C672A910CB60
              APIs
                • Part of subcall function 01001D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 01001D73
                • Part of subcall function 01001D35: GetStockObject.GDI32(00000011), ref: 01001D87
                • Part of subcall function 01001D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 01001D91
              • GetWindowRect.USER32(00000000,?), ref: 01086C71
              • GetSysColor.USER32(00000012), ref: 01086C8B
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: Window$ColorCreateMessageObjectRectSendStock
              • String ID: static
              • API String ID: 1983116058-2160076837
              • Opcode ID: 6c4fd730c8ba193efcea820bddc51d292ca39ebc6a0da5225936447811646466
              • Instruction ID: 78e373819bd225e189f22d51e42ef4d16637e4fbaba989ce4a652ee29e077be7
              • Opcode Fuzzy Hash: 6c4fd730c8ba193efcea820bddc51d292ca39ebc6a0da5225936447811646466
              • Instruction Fuzzy Hash: D0214A72A1420AAFDB14EFB8C845AFA7BA8FB08304F014619FA95D2240D635E8509B60
              APIs
              • _memset.LIBCMT ref: 01062A22
              • GetMenuItemInfoW.USER32(00000030,?,00000000,00000030), ref: 01062A41
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: InfoItemMenu_memset
              • String ID: 0
              • API String ID: 2223754486-4108050209
              • Opcode ID: d12e78596358b06575f27887f6c24ab4c25098680f8a5f80cede82665f7a0ee2
              • Instruction ID: f4fd8e4c38c0bddda5b6564e1b6cbcfcf31fee6ca0c3b719369165ad4f2d48ec
              • Opcode Fuzzy Hash: d12e78596358b06575f27887f6c24ab4c25098680f8a5f80cede82665f7a0ee2
              • Instruction Fuzzy Hash: 4A11E632A01214ABEB70DF9CDC44BEE7BFCAB45204F044061EAD5F7290D7B0A90ACB91
              APIs
              • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 0107222C
              • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 01072255
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: Internet$OpenOption
              • String ID: <local>
              • API String ID: 942729171-4266983199
              • Opcode ID: b8207128b9e471d1e2079035e9c1ecd5e8995521d9a74f31755d6b14ef0dc3f8
              • Instruction ID: 29a005dab2c7df7b6f29fc7e1c8a94d6908e1a0f923180ea3a256f82d236d35a
              • Opcode Fuzzy Hash: b8207128b9e471d1e2079035e9c1ecd5e8995521d9a74f31755d6b14ef0dc3f8
              • Instruction Fuzzy Hash: 4411E970941225FAEB258F558C98EFBFFECFF06651F00826AF59586100D3709552C6F4
              APIs
              • SendMessageW.USER32(?,?,?,?), ref: 01088530
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: MessageSend
              • String ID: @U=u
              • API String ID: 3850602802-2594219639
              • Opcode ID: 809c87b6574719135b89e03c5c74246eb4223e136caff5e2f3dd0a48016588f8
              • Instruction ID: 779e3d610bfb443fb6c453141d1826485106093de558343f24051a590b28e26b
              • Opcode Fuzzy Hash: 809c87b6574719135b89e03c5c74246eb4223e136caff5e2f3dd0a48016588f8
              • Instruction Fuzzy Hash: 0021EA7560410AEF8B15DFA8D8408EE7BB5FB4C350B408195FD85A7354D631A961DBA0
              APIs
              • SendMessageW.USER32(?,00000401,?,00000000), ref: 0108662C
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: MessageSend
              • String ID: @U=u$button
              • API String ID: 3850602802-1762282863
              • Opcode ID: 156e58d4d10675074bfa6c5b6525ffc6eeaf0c22721acd9c68389d102e8ce5f5
              • Instruction ID: 72f48950d45be31cd6283e1317741b055430ca74400fde4d0731d4ac18888989
              • Opcode Fuzzy Hash: 156e58d4d10675074bfa6c5b6525ffc6eeaf0c22721acd9c68389d102e8ce5f5
              • Instruction Fuzzy Hash: 9A11E572154205ABDF11AF64DC11FEA37A9FF0C318F114218FAD1A7190C677E8619B60
              APIs
              • SendMessageW.USER32(?,0000133E,00000000,?), ref: 010878D8
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: MessageSend
              • String ID: @U=u
              • API String ID: 3850602802-2594219639
              • Opcode ID: 36d092bae9815223683b059b44ab87020db7a3054c1b9f2a85c61659fd6fd247
              • Instruction ID: b346b56d7a6de22852e6ea8943714b1519fa93c0448b4933223d270b21fdd614
              • Opcode Fuzzy Hash: 36d092bae9815223683b059b44ab87020db7a3054c1b9f2a85c61659fd6fd247
              • Instruction Fuzzy Hash: 1E11B130508744AFD721DF38C891AE7BBE9BF09310F20864DE9EA47385DB7169419B60
              APIs
                • Part of subcall function 010614BC: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,01059296,?,?,00000034,00000800,?,00000034), ref: 010614E6
              • SendMessageW.USER32(?,0000102B,?,00000000), ref: 01059509
              • SendMessageW.USER32(?,0000102B,?,00000000), ref: 0105952E
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: MessageSend$MemoryProcessWrite
              • String ID: @U=u
              • API String ID: 1195347164-2594219639
              • Opcode ID: 7382065dec64f1833da41a7b33d27896b6576a63fe8efd21a0d030520673eb74
              • Instruction ID: 040304d757640733aca5cbf2f8e4611b7d7f4c4307da68dc2c4d12a245bb352e
              • Opcode Fuzzy Hash: 7382065dec64f1833da41a7b33d27896b6576a63fe8efd21a0d030520673eb74
              • Instruction Fuzzy Hash: C5012B32900219EBDB21AF28DC45FEEBB7CDB14314F10416AF995A70C0DBB56D64CB60
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: __fread_nolock_memmove
              • String ID: EA06
              • API String ID: 1988441806-3962188686
              • Opcode ID: 4b549098b0a6ff846ee483c956ef226111cf928608051ebf5e753c360ea50915
              • Instruction ID: 57107b80fb6f1018f4b4cdf1e72080bd600c12b164688d6980b2885231a77601
              • Opcode Fuzzy Hash: 4b549098b0a6ff846ee483c956ef226111cf928608051ebf5e753c360ea50915
              • Instruction Fuzzy Hash: E001B9719042287EDB28DAA8DC55EFE7BFCDB15211F00419FE592D6181E575E6048760
              APIs
              • SendMessageW.USER32(?,00000406,00000000,00000000), ref: 010595FB
              • SendMessageW.USER32(?,0000040D,?,00000000), ref: 0105962E
                • Part of subcall function 01061487: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,010592C5,?,?,00000800,?,00001073,00000000,?,?), ref: 010614B1
                • Part of subcall function 01007BCC: _memmove.LIBCMT ref: 01007C06
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: MessageSend$MemoryProcessRead_memmove
              • String ID: @U=u
              • API String ID: 339422723-2594219639
              • Opcode ID: 59ae8b642faa87a2c7048ae798d04f9052b7ac5fd990f9cbf58ad5f09f8b2ed8
              • Instruction ID: ec320dafb98c7924ac501cc93f0c8c11b7da428856066a95a04ff8a5779b1a8a
              • Opcode Fuzzy Hash: 59ae8b642faa87a2c7048ae798d04f9052b7ac5fd990f9cbf58ad5f09f8b2ed8
              • Instruction Fuzzy Hash: 47016171900119EFDB60AE60DC80EDA777CFB28244F80C0A6F6C997150DE715E99CF90
              APIs
                • Part of subcall function 01002612: GetWindowLongW.USER32(?,000000EB), ref: 01002623
              • DefDlgProcW.USER32(?,0000002B,?,?,?,?,?,?,?,0103B93A,?,?,?), ref: 0108C5F1
                • Part of subcall function 010025DB: GetWindowLongW.USER32(?,000000EB), ref: 010025EC
              • SendMessageW.USER32(?,00000401,00000000,00000000), ref: 0108C5D7
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: LongWindow$MessageProcSend
              • String ID: @U=u
              • API String ID: 982171247-2594219639
              • Opcode ID: 4d3824e4e16d0bbf6258d902502878a8fcbeacb035c9e73c191fcc8acd034fb0
              • Instruction ID: a6f1e81d90d2c72e48287f10377479f46296f3171a2a6be9054dcba6d62e76ee
              • Opcode Fuzzy Hash: 4d3824e4e16d0bbf6258d902502878a8fcbeacb035c9e73c191fcc8acd034fb0
              • Instruction Fuzzy Hash: 5601B935204204AFEB216F18DD58EAF3BB6FB85764F040168FAC11B2D0CB326851DB70
              APIs
              • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0105954C
              • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 01059564
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: MessageSend
              • String ID: @U=u
              • API String ID: 3850602802-2594219639
              • Opcode ID: a49c2fc8fcbe784f11ff87607a28b398af4f4c325af11602caaa6519c0764e8f
              • Instruction ID: f5e6aba5be2e8e84fc5705c01c2ba52d4b55449551f81607b7f323570bf1abac
              • Opcode Fuzzy Hash: a49c2fc8fcbe784f11ff87607a28b398af4f4c325af11602caaa6519c0764e8f
              • Instruction Fuzzy Hash: 01E0E535342212F6F37015758C49FDB2F4ADB88BA9F150024BF81590C4C9D2096183A0
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: ClassName_wcscmp
              • String ID: #32770
              • API String ID: 2292705959-463685578
              • Opcode ID: cf263d5e92986afccae17cb2af41b7085205fd95e6324015294dead016eb9508
              • Instruction ID: d6eb33ff40e9e900a5e06697a5e0a1d8b7a0da6b9487e4793f3e10f17cbd304a
              • Opcode Fuzzy Hash: cf263d5e92986afccae17cb2af41b7085205fd95e6324015294dead016eb9508
              • Instruction Fuzzy Hash: B3E061325002392BE3309B599C49FE7F7ECEB55B30F000057FD84D7000D560964187E0
              APIs
                • Part of subcall function 0103B314: _memset.LIBCMT ref: 0103B321
                • Part of subcall function 01020940: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,0103B2F0,?,?,?,0100100A), ref: 01020945
              • IsDebuggerPresent.KERNEL32(?,?,?,0100100A), ref: 0103B2F4
              • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,0100100A), ref: 0103B303
              Strings
              • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 0103B2FE
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString_memset
              • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
              • API String ID: 3158253471-631824599
              • Opcode ID: 546bb4272da06eba9cbc7fb7b28b35e2347c9b1ce01529e0590f4d26a2e318a1
              • Instruction ID: 9859e8b1f208e4dd660cae2f5285ffdbbfa327a78e4f094c34bf54451a241e05
              • Opcode Fuzzy Hash: 546bb4272da06eba9cbc7fb7b28b35e2347c9b1ce01529e0590f4d26a2e318a1
              • Instruction Fuzzy Hash: 43E06D702003128FE731EF69E4043867AE8AF50308F008A6CE8C6C7244EBB9E444CBA1
              APIs
              • GetSystemDirectoryW.KERNEL32(?), ref: 01041775
                • Part of subcall function 0107BFF0: LoadLibraryA.KERNEL32(kernel32.dll,?,0104195E,?), ref: 0107BFFE
                • Part of subcall function 0107BFF0: GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 0107C010
              • FreeLibrary.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,00000104), ref: 0104196D
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: Library$AddressDirectoryFreeLoadProcSystem
              • String ID: WIN_XPe
              • API String ID: 582185067-3257408948
              • Opcode ID: f24ef3fed71846a16c96f2768702e800b44e8a95afb2f81a16c4754b8d33eb43
              • Instruction ID: 5657014d9cb0f64dee42eddd7d3b359cfb65ba405a9bec929dffa810e6fe46a8
              • Opcode Fuzzy Hash: f24ef3fed71846a16c96f2768702e800b44e8a95afb2f81a16c4754b8d33eb43
              • Instruction Fuzzy Hash: 12F0EDB0804109DFEB25DBA5C9D8AECBBF8BB18301F5400D5E192A2194DB766F84CF64
              APIs
              • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0108596E
              • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 01085981
                • Part of subcall function 01065244: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 010652BC
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: FindMessagePostSleepWindow
              • String ID: Shell_TrayWnd
              • API String ID: 529655941-2988720461
              • Opcode ID: 32c0d5e9d2150d0699205902c7035d3c23031e1186c3092b046023fdc0f15214
              • Instruction ID: 1e4ff5d75f165a1f1abc2381ce5b0102b5f0da629dbeb98a5d0e1a8ad48b4bd2
              • Opcode Fuzzy Hash: 32c0d5e9d2150d0699205902c7035d3c23031e1186c3092b046023fdc0f15214
              • Instruction Fuzzy Hash: F7D0C931388312B6E674BA709C4EFDA7A58AB14B50F000829B3C9AA1D4C9E5A800C764
              APIs
              • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 010859AE
              • PostMessageW.USER32(00000000), ref: 010859B5
                • Part of subcall function 01065244: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 010652BC
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: FindMessagePostSleepWindow
              • String ID: Shell_TrayWnd
              • API String ID: 529655941-2988720461
              • Opcode ID: 1bf2bafd91b7587e117f7261bdaab346bbde8aa0294a38be6a88e58ad032c49b
              • Instruction ID: a6daf8fa24942ad1c9a773220e9f328634d7757295a87d2062df92ab46479987
              • Opcode Fuzzy Hash: 1bf2bafd91b7587e117f7261bdaab346bbde8aa0294a38be6a88e58ad032c49b
              • Instruction Fuzzy Hash: A8D0C9313843127AE674BA709C4EFDA7A58AB15B50F000829B3C5AA1D4C9E5A800C764
              APIs
              • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 010593E9
              • SendMessageW.USER32(00000000,00001200,00000000,00000000), ref: 010593F7
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1365772127.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
              • Associated: 00000000.00000002.1365710763.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.000000000108F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365822734.00000000010B4000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1365999447.00000000010BE000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1366037954.00000000010C7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1000000_FJRUb5lb9m.jbxd
              Similarity
              • API ID: MessageSend
              • String ID: @U=u
              • API String ID: 3850602802-2594219639
              • Opcode ID: 327e51c886fd6151e9d35ec7c8331fb97bd7df9e83ca5e5a3d9ceb1c409b550b
              • Instruction ID: de232310734ec920216e33186768838e1455f3b68d61708d3e0287293dd3545a
              • Opcode Fuzzy Hash: 327e51c886fd6151e9d35ec7c8331fb97bd7df9e83ca5e5a3d9ceb1c409b550b
              • Instruction Fuzzy Hash: 6CC04C311551C1BAEB311A77BC0DD8B3F3DE7CFF96721026CB291950A9C66A00A5D734