Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1522716
MD5:52f3d33b2ce1ae6640a20e19506b7acb
SHA1:09833b92ef643b687fc0e51c7bc6316011e30604
SHA256:0d42c76532e1f811ba1e34911976f04fa2616dbe9af1f6f9cdf75193ad9f482b
Tags:exesigneduser-jstrosch
Infos:

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found potential string decryption / allocating functions
PE / OLE file has an invalid certificate
Queries the volume information (name, serial number etc) of a device
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • file.exe (PID: 2360 cmdline: "C:\Users\user\Desktop\file.exe" MD5: 52F3D33B2CE1AE6640A20E19506B7ACB)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: file.exeReversingLabs: Detection: 50%
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00403B58 CryptAcquireContextW,CryptAcquireContextW,CryptAcquireContextW,CryptCreateHash,CryptReleaseContext,CryptHashData,CryptDestroyHash,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,0_2_00403B58
Source: file.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: unknownDNS traffic detected: query: info.pillowkidguest.ru replaycode: Name error (3)
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: s.itorrent.bz
Source: global trafficDNS traffic detected: DNS query: info.pillowkidguest.ru
Source: global trafficDNS traffic detected: DNS query: cdn.itorrent.bz
Source: file.exe, 00000000.00000003.1887029003.00000000006EB000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.3001891613.00000000006EB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cdn.itorrent.bz/
Source: file.exeString found in binary or memory: http://cdn.itorrent.bz/itorrent-application/itorrent.zip
Source: file.exe, 00000000.00000002.3001735411.0000000000668000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cdn.itorrent.bz/itorrent-application/itorrent.zip5
Source: file.exeString found in binary or memory: http://cdn.itorrent.bz/itorrent-application/itorrent.zipFreeSpacer_setup.exe.
Source: file.exeString found in binary or memory: http://crl.comodoca.com/COMODORSACertificationAuthority.crl0q
Source: file.exeString found in binary or memory: http://crl.comodoca.com/COMODORSACodeSigningCA.crl0t
Source: file.exeString found in binary or memory: http://g.itorrent.bz/support.i
Source: file.exeString found in binary or memory: http://g.itorrent.bz/support.ilbad
Source: file.exe, 00000000.00000003.1887309756.00000000006CF000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.3001835622.00000000006CF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://info.pillowkidguest.ru/Ts
Source: file.exeString found in binary or memory: http://info.pillowkidguest.ru/logo.png
Source: file.exe, 00000000.00000003.1887029003.00000000006EB000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.3001891613.00000000006EB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://info.pillowkidguest.ru/logo.pngU
Source: file.exeString found in binary or memory: http://info.pillowkidguest.ru/logo.pnga8b13a8ef5c233e82e7c47bb5977f38a
Source: file.exe, 00000000.00000003.1887029003.00000000006EB000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.3001891613.00000000006EB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://info.pillowkidguest.ru/logo.pngm
Source: file.exe, 00000000.00000003.1887029003.00000000006EB000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.3001891613.00000000006EB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://info.pillowkidguest.ru/logo.pngs2
Source: file.exeString found in binary or memory: http://ocsp.comodoca.com0
Source: file.exe, 00000000.00000003.1887029003.00000000006EB000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.3001891613.00000000006EB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://s.itorrent.bz/
Source: file.exe, 00000000.00000003.1887029003.00000000006EB000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.3001891613.00000000006EB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://s.itorrent.bz//
Source: file.exe, 00000000.00000003.1887029003.00000000006EB000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.3001891613.00000000006EB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://s.itorrent.bz//95
Source: file.exeString found in binary or memory: http://s.itorrent.bz/i/
Source: file.exe, 00000000.00000002.3001735411.0000000000668000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://s.itorrent.bz/i/44e838831f4e7f2973ae42fab2828498/df%
Source: file.exe, 00000000.00000003.1887029003.00000000006EB000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.3001891613.00000000006EB000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.3001735411.0000000000668000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://s.itorrent.bz/i/44e838831f4e7f2973ae42fab2828498/df/?version=1.0.0.404
Source: file.exe, 00000000.00000003.1887608203.00000000006A4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.3001735411.00000000006A4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://s.itorrent.bz/i/44e838831f4e7f2973ae42fab2828498/df/?version=1.0.0.404/
Source: file.exe, 00000000.00000003.1887608203.00000000006A4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.3001735411.00000000006A4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://s.itorrent.bz/i/44e838831f4e7f2973ae42fab2828498/df/?version=1.0.0.404T
Source: file.exe, 00000000.00000003.1887608203.00000000006A4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.3001735411.00000000006A4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://s.itorrent.bz/i/44e838831f4e7f2973ae42fab2828498/df/?version=1.0.0.404j
Source: file.exe, 00000000.00000003.1887608203.00000000006A4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.3001735411.00000000006A4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.3001735411.0000000000668000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://s.itorrent.bz/i/44e838831f4e7f2973ae42fab2828498/s/?version=1.0.0.404
Source: file.exeString found in binary or memory: http://s.itorrent.bz/i/BUTTON###image/pngCan
Source: file.exe, 00000000.00000002.3001835622.00000000006C3000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1887309756.00000000006C3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://s.itorrent.bz/l$J
Source: file.exe, 00000000.00000003.1887029003.00000000006EB000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.3001891613.00000000006EB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://s.itorrent.bz/w5
Source: file.exeString found in binary or memory: http://tfile.me/forum/download.php?id=706491&ak=11xxxxxxxx
Source: file.exeString found in binary or memory: http://tfile.me/forum/download.php?id=706491&ak=11xxxxxxxxF
Source: file.exe, 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpString found in binary or memory: http://tfile.me/forum/download.php?id=706491&ak=11xxxxxxxxJ
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00411CFB0_2_00411CFB
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004360B30_2_004360B3
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004371350_2_00437135
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004341AD0_2_004341AD
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0042D2E30_2_0042D2E3
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004345E20_2_004345E2
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004366250_2_00436625
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0041E68F0_2_0041E68F
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004338A10_2_004338A1
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004249500_2_00424950
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00434A170_2_00434A17
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00437B4C0_2_00437B4C
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0041DC2B0_2_0041DC2B
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0042DCCB0_2_0042DCCB
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00425C8F0_2_00425C8F
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00433D950_2_00433D95
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00426F5F0_2_00426F5F
Source: C:\Users\user\Desktop\file.exeCode function: String function: 00439BBF appears 33 times
Source: C:\Users\user\Desktop\file.exeCode function: String function: 00438F67 appears 41 times
Source: C:\Users\user\Desktop\file.exeCode function: String function: 004261A0 appears 61 times
Source: C:\Users\user\Desktop\file.exeCode function: String function: 00439B56 appears 46 times
Source: C:\Users\user\Desktop\file.exeCode function: String function: 00439B89 appears 68 times
Source: C:\Users\user\Desktop\file.exeCode function: String function: 0040792F appears 31 times
Source: file.exeStatic PE information: invalid certificate
Source: file.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: mal48.winEXE@1/1@11/0
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00406633 __EH_prolog3_GS,_memset,SHGetFolderPathW,CoCreateInstance,CoTaskMemFree,0_2_00406633
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00405D6E LoadResource,LockResource,SizeofResource,GlobalAlloc,GlobalLock,_memmove,GlobalUnlock,CreateStreamOnHGlobal,GlobalFree,GdipAlloc,0_2_00405D6E
Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1003\7ec63eecc011967c28496572961d2a7c_9e146be9-c76a-4720-bcdb-53011b87bd06Jump to behavior
Source: C:\Users\user\Desktop\file.exeMutant created: NULL
Source: C:\Users\user\Desktop\file.exeCommand line argument: Debug0_2_00412753
Source: C:\Users\user\Desktop\file.exeCommand line argument: xD0_2_00412753
Source: C:\Users\user\Desktop\file.exeCommand line argument: $C0_2_00412753
Source: C:\Users\user\Desktop\file.exeCommand line argument: LyD0_2_00412753
Source: C:\Users\user\Desktop\file.exeCommand line argument: @yD0_2_00412753
Source: C:\Users\user\Desktop\file.exeCommand line argument: DyD0_2_00412753
Source: C:\Users\user\Desktop\file.exeCommand line argument: HyD0_2_00412753
Source: C:\Users\user\Desktop\file.exeCommand line argument: LhD0_2_00412753
Source: C:\Users\user\Desktop\file.exeCommand line argument: prf0_2_00412753
Source: C:\Users\user\Desktop\file.exeCommand line argument: NB0_2_0042E7A0
Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: file.exeReversingLabs: Detection: 50%
Source: file.exeString found in binary or memory: --start
Source: file.exeString found in binary or memory: //d/ps/p/installed/i
Source: file.exeString found in binary or memory: --install
Source: file.exeString found in binary or memory: //d/ps/p/installed/i
Source: file.exeString found in binary or memory: @openhttpieoperalauncheroperaoldyandexgooglechromeinternet explorerfirefoxffamigo01HKLMHKEY_LOCAL_MACHINE\DisplayNameSOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\UninstallSOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall<?xml version="1.0"?><d></d>//d/ps/p/rs/rname//d/ps/p/fs/f//d/ps/p/installed/i//d/machineid//d/guid//d/defbrowser//d/osexceptionl
Source: file.exeString found in binary or memory: iTorrent.--installset-autoloadset-defaultset-firewall --
Source: file.exeString found in binary or memory: dftsttfdp%ib%ipdfif--startpifip%ib%iContent-Type: application/xml;
Source: C:\Users\user\Desktop\file.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: dpapi.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: windowscodecs.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: webio.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4df0c730-df9d-4ae3-9153-aa6b82e9795a}\InProcServer32Jump to behavior
Source: C:\Users\user\Desktop\file.exeWindow detected: Number of UI elements: 31
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004261E5 push ecx; ret 0_2_004261F8
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00439B24 push ecx; ret 0_2_00439B37
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00425C8F EncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00425C8F
Source: file.exe, 00000000.00000003.1887608203.00000000006A4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.3001735411.00000000006A4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Users\user\Desktop\file.exeAPI call chain: ExitProcess graph end nodegraph_0-31674
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004265DC _memset,IsDebuggerPresent,0_2_004265DC
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0042EC02 EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_0042EC02
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00425B2B GetProcessHeap,0_2_00425B2B
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004278D8 SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_004278D8
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004278A7 SetUnhandledExceptionFilter,0_2_004278A7
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0042687D cpuid 0_2_0042687D
Source: C:\Users\user\Desktop\file.exeCode function: _LocaleUpdate::_LocaleUpdate,__crtGetLocaleInfoA_stat,0_2_0042F095
Source: C:\Users\user\Desktop\file.exeCode function: GetLocaleInfoW,0_2_0042F249
Source: C:\Users\user\Desktop\file.exeCode function: EnumSystemLocalesW,0_2_0042F20C
Source: C:\Users\user\Desktop\file.exeCode function: ___crtGetLocaleInfoA,GetLastError,___crtGetLocaleInfoA,__calloc_crt,___crtGetLocaleInfoA,__calloc_crt,_free,_free,__calloc_crt,_free,__invoke_watson,0_2_004263F6
Source: C:\Users\user\Desktop\file.exeCode function: _TranslateName,_GetLocaleNameFromLangCountry,_GetLocaleNameFromLanguage,_TranslateName,_GetLocaleNameFromLangCountry,_GetLocaleNameFromLanguage,_GetLocaleNameFromDefault,IsValidCodePage,_wcschr,_wcschr,__itow_s,__invoke_watson,_LcidFromHexString,GetLocaleInfoW,0_2_00435614
Source: C:\Users\user\Desktop\file.exeCode function: _GetPrimaryLen,EnumSystemLocalesW,0_2_004358C8
Source: C:\Users\user\Desktop\file.exeCode function: EnumSystemLocalesW,0_2_00435888
Source: C:\Users\user\Desktop\file.exeCode function: _GetPrimaryLen,EnumSystemLocalesW,0_2_00435945
Source: C:\Users\user\Desktop\file.exeCode function: _LcidFromHexString,GetLocaleInfoW,GetLocaleInfoW,__wcsnicmp,GetLocaleInfoW,_TestDefaultLanguage,0_2_004359C8
Source: C:\Users\user\Desktop\file.exeCode function: _LcidFromHexString,GetLocaleInfoW,_TestDefaultLanguage,0_2_00435BBD
Source: C:\Users\user\Desktop\file.exeCode function: _wcscmp,_wcscmp,GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_00435CE7
Source: C:\Users\user\Desktop\file.exeCode function: GetLocaleInfoW,_GetPrimaryLen,0_2_00435D94
Source: C:\Users\user\Desktop\file.exeCode function: _memset,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_GetLcidFromCountry,GetUserDefaultLCID,IsValidCodePage,IsValidLocale,___crtDownlevelLCIDToLocaleName,___crtDownlevelLCIDToLocaleName,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,__itow_s,0_2_00435E68
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00424662 GetSystemTimeAsFileTime,0_2_00424662
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004038C5 __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z,__EH_prolog3,LookupAccountNameW,GetLastError,LookupAccountNameW,0_2_004038C5
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040A723 __EH_prolog3_GS,_memset,GetVersionExW,0_2_0040A723
Source: C:\Users\user\Desktop\file.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts3
Command and Scripting Interpreter
1
DLL Side-Loading
1
DLL Side-Loading
1
Masquerading
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Deobfuscate/Decode Files or Information
LSASS Memory31
Security Software Discovery
Remote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)2
Obfuscated Files or Information
Security Account Manager1
Account Discovery
SMB/Windows Admin SharesData from Network Shared Drive1
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDS1
System Owner/User Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets34
System Information Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
file.exe50%ReversingLabsWin32.PUA.ITorrent
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
cdn.itorrent.bz
unknown
unknownfalse
    unknown
    s.itorrent.bz
    unknown
    unknownfalse
      unknown
      info.pillowkidguest.ru
      unknown
      unknownfalse
        unknown
        NameSourceMaliciousAntivirus DetectionReputation
        http://s.itorrent.bz/w5file.exe, 00000000.00000003.1887029003.00000000006EB000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.3001891613.00000000006EB000.00000004.00000020.00020000.00000000.sdmpfalse
          unknown
          http://s.itorrent.bz//file.exe, 00000000.00000003.1887029003.00000000006EB000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.3001891613.00000000006EB000.00000004.00000020.00020000.00000000.sdmpfalse
            unknown
            http://tfile.me/forum/download.php?id=706491&ak=11xxxxxxxxJfile.exe, 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpfalse
              unknown
              http://tfile.me/forum/download.php?id=706491&ak=11xxxxxxxxFfile.exefalse
                unknown
                http://s.itorrent.bz/file.exe, 00000000.00000003.1887029003.00000000006EB000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.3001891613.00000000006EB000.00000004.00000020.00020000.00000000.sdmpfalse
                  unknown
                  http://s.itorrent.bz/i/44e838831f4e7f2973ae42fab2828498/df/?version=1.0.0.404Tfile.exe, 00000000.00000003.1887608203.00000000006A4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.3001735411.00000000006A4000.00000004.00000020.00020000.00000000.sdmpfalse
                    unknown
                    http://info.pillowkidguest.ru/logo.pngmfile.exe, 00000000.00000003.1887029003.00000000006EB000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.3001891613.00000000006EB000.00000004.00000020.00020000.00000000.sdmpfalse
                      unknown
                      http://cdn.itorrent.bz/file.exe, 00000000.00000003.1887029003.00000000006EB000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.3001891613.00000000006EB000.00000004.00000020.00020000.00000000.sdmpfalse
                        unknown
                        http://cdn.itorrent.bz/itorrent-application/itorrent.zipfile.exefalse
                          unknown
                          http://info.pillowkidguest.ru/logo.pnga8b13a8ef5c233e82e7c47bb5977f38afile.exefalse
                            unknown
                            http://info.pillowkidguest.ru/logo.pngfile.exefalse
                              unknown
                              http://g.itorrent.bz/support.ifile.exefalse
                                unknown
                                http://info.pillowkidguest.ru/logo.pngUfile.exe, 00000000.00000003.1887029003.00000000006EB000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.3001891613.00000000006EB000.00000004.00000020.00020000.00000000.sdmpfalse
                                  unknown
                                  http://s.itorrent.bz/l$Jfile.exe, 00000000.00000002.3001835622.00000000006C3000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1887309756.00000000006C3000.00000004.00000020.00020000.00000000.sdmpfalse
                                    unknown
                                    http://s.itorrent.bz/i/44e838831f4e7f2973ae42fab2828498/df%file.exe, 00000000.00000002.3001735411.0000000000668000.00000004.00000020.00020000.00000000.sdmpfalse
                                      unknown
                                      http://s.itorrent.bz/i/44e838831f4e7f2973ae42fab2828498/s/?version=1.0.0.404file.exe, 00000000.00000003.1887608203.00000000006A4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.3001735411.00000000006A4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.3001735411.0000000000668000.00000004.00000020.00020000.00000000.sdmpfalse
                                        unknown
                                        http://s.itorrent.bz/i/44e838831f4e7f2973ae42fab2828498/df/?version=1.0.0.404file.exe, 00000000.00000003.1887029003.00000000006EB000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.3001891613.00000000006EB000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.3001735411.0000000000668000.00000004.00000020.00020000.00000000.sdmpfalse
                                          unknown
                                          http://s.itorrent.bz/i/44e838831f4e7f2973ae42fab2828498/df/?version=1.0.0.404jfile.exe, 00000000.00000003.1887608203.00000000006A4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.3001735411.00000000006A4000.00000004.00000020.00020000.00000000.sdmpfalse
                                            unknown
                                            http://s.itorrent.bz/i/BUTTON###image/pngCanfile.exefalse
                                              unknown
                                              http://g.itorrent.bz/support.ilbadfile.exefalse
                                                unknown
                                                http://info.pillowkidguest.ru/logo.pngs2file.exe, 00000000.00000003.1887029003.00000000006EB000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.3001891613.00000000006EB000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  unknown
                                                  http://s.itorrent.bz/i/44e838831f4e7f2973ae42fab2828498/df/?version=1.0.0.404/file.exe, 00000000.00000003.1887608203.00000000006A4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.3001735411.00000000006A4000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    unknown
                                                    http://s.itorrent.bz/i/file.exefalse
                                                      unknown
                                                      http://info.pillowkidguest.ru/Tsfile.exe, 00000000.00000003.1887309756.00000000006CF000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.3001835622.00000000006CF000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        unknown
                                                        http://tfile.me/forum/download.php?id=706491&ak=11xxxxxxxxfile.exefalse
                                                          unknown
                                                          http://cdn.itorrent.bz/itorrent-application/itorrent.zip5file.exe, 00000000.00000002.3001735411.0000000000668000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            unknown
                                                            http://cdn.itorrent.bz/itorrent-application/itorrent.zipFreeSpacer_setup.exe.file.exefalse
                                                              unknown
                                                              http://s.itorrent.bz//95file.exe, 00000000.00000003.1887029003.00000000006EB000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.3001891613.00000000006EB000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                unknown
                                                                No contacted IP infos
                                                                Joe Sandbox version:41.0.0 Charoite
                                                                Analysis ID:1522716
                                                                Start date and time:2024-09-30 15:53:47 +02:00
                                                                Joe Sandbox product:CloudBasic
                                                                Overall analysis duration:0h 4m 47s
                                                                Hypervisor based Inspection enabled:false
                                                                Report type:full
                                                                Cookbook file name:default.jbs
                                                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                Number of analysed new started processes analysed:6
                                                                Number of new started drivers analysed:0
                                                                Number of existing processes analysed:0
                                                                Number of existing drivers analysed:0
                                                                Number of injected processes analysed:0
                                                                Technologies:
                                                                • HCA enabled
                                                                • EGA enabled
                                                                • AMSI enabled
                                                                Analysis Mode:default
                                                                Analysis stop reason:Timeout
                                                                Sample name:file.exe
                                                                Detection:MAL
                                                                Classification:mal48.winEXE@1/1@11/0
                                                                EGA Information:
                                                                • Successful, ratio: 100%
                                                                HCA Information:
                                                                • Successful, ratio: 100%
                                                                • Number of executed functions: 63
                                                                • Number of non-executed functions: 114
                                                                Cookbook Comments:
                                                                • Found application associated with file extension: .exe
                                                                • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                                                • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                                • Not all processes where analyzed, report is missing behavior information
                                                                • Report size getting too big, too many NtQueryValueKey calls found.
                                                                • VT rate limit hit for: file.exe
                                                                No simulations
                                                                No context
                                                                No context
                                                                No context
                                                                No context
                                                                No context
                                                                Process:C:\Users\user\Desktop\file.exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):47
                                                                Entropy (8bit):1.168829563685559
                                                                Encrypted:false
                                                                SSDEEP:3:/lSll/:AV
                                                                MD5:FEEA5AAD375F1E916BF7E620A6DCD75B
                                                                SHA1:94894605A205FFA9C0FD5D9BE23603C2AFEA3CF9
                                                                SHA-256:D94B1765B6165ACCEA18A12F7DD87FA28A6964E8B3C709967B82DFF961DFF216
                                                                SHA-512:E8A16FF53A2904A6BF0C20910ADF544BF73D7370B012C57A2CA05FC40C7DBFF9622691DF99310E6F131E203B49EAF525737A38CDFCDE817A4B601F71B10861E2
                                                                Malicious:false
                                                                Reputation:moderate, very likely benign file
                                                                Preview:........................................user.
                                                                File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                Entropy (8bit):6.584703533786841
                                                                TrID:
                                                                • Win32 Executable (generic) a (10002005/4) 99.83%
                                                                • Windows Screen Saver (13104/52) 0.13%
                                                                • Generic Win/DOS Executable (2004/3) 0.02%
                                                                • DOS Executable Generic (2002/1) 0.02%
                                                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                File name:file.exe
                                                                File size:409'072 bytes
                                                                MD5:52f3d33b2ce1ae6640a20e19506b7acb
                                                                SHA1:09833b92ef643b687fc0e51c7bc6316011e30604
                                                                SHA256:0d42c76532e1f811ba1e34911976f04fa2616dbe9af1f6f9cdf75193ad9f482b
                                                                SHA512:f42ec9e70e823b9e8730a501d07c6c0a058a115799719ec903c1c872727278df0a6a2e794a9c1b7b0eb2cb054966e1d77e145772f9c81a4d603bcbced89a82c6
                                                                SSDEEP:12288:eBTKRTSs8TSQS9VfUn04DBxGJK9iYH3yNMZEbikDT:YKRES/65uCKT
                                                                TLSH:1C948C217789D075E0625132DE19A71525FEBC752F728B4B73D83F1E2AB11B0A239B22
                                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...P...P...P....p..P....p..P....N..P....q.sP...(...P...P...Q...(...P....t..P....J..P...P...P....O..P..Rich.P.................
                                                                Icon Hash:1b694cccccc83317
                                                                Entrypoint:0x4250c2
                                                                Entrypoint Section:.text
                                                                Digitally signed:true
                                                                Imagebase:0x400000
                                                                Subsystem:windows gui
                                                                Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                DLL Characteristics:NX_COMPAT, TERMINAL_SERVER_AWARE
                                                                Time Stamp:0x56DF32AA [Tue Mar 8 20:14:34 2016 UTC]
                                                                TLS Callbacks:
                                                                CLR (.Net) Version:
                                                                OS Version Major:5
                                                                OS Version Minor:1
                                                                File Version Major:5
                                                                File Version Minor:1
                                                                Subsystem Version Major:5
                                                                Subsystem Version Minor:1
                                                                Import Hash:630e143197957138e0ff0c79adca7372
                                                                Signature Valid:false
                                                                Signature Issuer:CN=COMODO RSA Code Signing CA, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB
                                                                Signature Validation Error:A required certificate is not within its validity period when verifying against the current system clock or the timestamp in the signed file
                                                                Error Number:-2146762495
                                                                Not Before, Not After
                                                                • 17/08/2015 02:00:00 17/08/2016 01:59:59
                                                                Subject Chain
                                                                • CN="""TORRENT"", OOO", O="""TORRENT"", OOO", STREET="Admirala Tribuca, 37", L=Kaliningrad, S=Kaliningrad, PostalCode=236006, C=RU
                                                                Version:3
                                                                Thumbprint MD5:E91699A3735D838CB43DCF145A19BDD0
                                                                Thumbprint SHA-1:83F7D7E1F123E5B027EB3AEE47C6F544A197D18E
                                                                Thumbprint SHA-256:FD967613856DC0712693AF97D0F90901C05F682EE02E8589BF8E85004E3DF500
                                                                Serial:138718A754F2731D87CEDDCB1E570C6C
                                                                Instruction
                                                                call 00007EFCD8DC0DEDh
                                                                jmp 00007EFCD8DB9EB4h
                                                                int3
                                                                int3
                                                                int3
                                                                int3
                                                                mov ecx, dword ptr [esp+08h]
                                                                mov eax, dword ptr [esp+04h]
                                                                push edi
                                                                push ebx
                                                                push esi
                                                                cmp dword ptr [00454BA0h], 01h
                                                                jc 00007EFCD8DBA204h
                                                                ja 00007EFCD8DBA133h
                                                                movzx edx, byte ptr [ecx]
                                                                mov ebx, edx
                                                                shl edx, 08h
                                                                or edx, ebx
                                                                je 00007EFCD8DBA11Fh
                                                                movd xmm3, edx
                                                                pshuflw xmm3, xmm3, 00h
                                                                movlhps xmm3, xmm3
                                                                pxor xmm0, xmm0
                                                                mov esi, ecx
                                                                or edi, FFFFFFFFh
                                                                movzx ebx, byte ptr [ecx]
                                                                add ecx, 01h
                                                                test ebx, ebx
                                                                je 00007EFCD8DBA04Fh
                                                                test ecx, 0000000Fh
                                                                jne 00007EFCD8DBA020h
                                                                movdqa xmm2, dqword ptr [ecx]
                                                                pcmpeqb xmm2, xmm0
                                                                pmovmskb ebx, xmm2
                                                                test ebx, ebx
                                                                jne 00007EFCD8DBA037h
                                                                mov edi, 0000000Fh
                                                                movd edx, xmm3
                                                                mov ebx, 00000FFFh
                                                                and ebx, eax
                                                                cmp ebx, 00000FF0h
                                                                jnbe 00007EFCD8DBA059h
                                                                movdqu xmm1, dqword ptr [eax]
                                                                pxor xmm2, xmm2
                                                                pcmpeqb xmm2, xmm1
                                                                pcmpeqb xmm1, xmm3
                                                                por xmm1, xmm2
                                                                pmovmskb ebx, xmm1
                                                                add eax, 10h
                                                                test ebx, ebx
                                                                je 00007EFCD8DBA004h
                                                                bsf ebx, ebx
                                                                sub eax, 10h
                                                                add eax, ebx
                                                                movzx ebx, byte ptr [eax]
                                                                test ebx, ebx
                                                                je 00007EFCD8DBA09Ch
                                                                add eax, 01h
                                                                cmp dl, bl
                                                                jne 00007EFCD8DB9FEEh
                                                                mov edx, eax
                                                                lea ecx, dword ptr [esi+01h]
                                                                mov ebx, 00000FFFh
                                                                Programming Language:
                                                                • [C++] VS2013 build 21005
                                                                • [ASM] VS2013 build 21005
                                                                • [ C ] VS2013 build 21005
                                                                • [ C ] VS2008 SP1 build 30729
                                                                • [IMP] VS2008 SP1 build 30729
                                                                • [RES] VS2013 build 21005
                                                                • [LNK] VS2013 UPD5 build 40629
                                                                NameVirtual AddressVirtual Size Is in Section
                                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_IMPORT0x4d9d40xf0.rdata
                                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x5a0000x101e0.rsrc
                                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x62a000x13f0.rsrc
                                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x48e700x40.rdata
                                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_IAT0x3f0000x3fc.rdata
                                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                .text0x10000x3df350x3e000d67fca22046da497bc4b28da073a9d5dFalse0.570769279233871data6.654122576566693IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                .rdata0x3f0000x100860x10200c00f28a76406e71d7f9c92121b80ac66False0.3649012839147287DOS executable (COM, 0x8C-variant)4.727771105703194IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                .data0x500000x9c600x4200f61727bebeb83ca9d4b8c254e486090dFalse0.16844223484848486data2.558325233753619IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                .rsrc0x5a0000x101e00x10200ee0e6d6bbdffc0ad2b719bb1beb37532False0.516124636627907data6.453843363709768IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                PNG0x5a2dc0x2b44PNG image data, 244 x 65, 8-bit/color RGBA, non-interlacedEnglishGreat Britain1.000993138317082
                                                                PNG0x5ce200x110cPNG image data, 48 x 48, 8-bit/color RGBA, non-interlacedEnglishGreat Britain1.0025206232813932
                                                                TEXT0x5df2c0x65eeUnicode text, UTF-8 text, with very long lines (936), with CRLF line terminatorsEnglishUnited States0.22005058634168775
                                                                RT_BITMAP0x6451c0x105aDevice independent bitmap graphic, 37 x 37 x 24, image size 4146, resolution 2834 x 2834 px/mEnglishUnited States0.5217391304347826
                                                                RT_ICON0x655780x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024, resolution 2835 x 2835 px/mEnglishUnited States0.7189716312056738
                                                                RT_ICON0x659e00x988Device independent bitmap graphic, 24 x 48 x 32, image size 2304, resolution 2835 x 2835 px/mEnglishUnited States0.6430327868852459
                                                                RT_ICON0x663680x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096, resolution 2835 x 2835 px/mEnglishUnited States0.5302532833020638
                                                                RT_ICON0x674100x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216, resolution 2835 x 2835 px/mEnglishUnited States0.45435684647302904
                                                                RT_GROUP_ICON0x699b80x3edataEnglishUnited States0.8064516129032258
                                                                RT_VERSION0x699f80x250dataEnglishUnited States0.48817567567567566
                                                                RT_MANIFEST0x69c480x596ASCII textEnglishUnited States0.4258741258741259
                                                                DLLImport
                                                                gdiplus.dllGdipAlloc, GdipFree, GdipCloneImage, GdipGetImageEncodersSize, GdipGetImageEncoders, GdipLoadImageFromStream, GdipCreateBitmapFromHBITMAP, GdipDisposeImage, GdiplusShutdown, GdiplusStartup, GdipDrawImageRectI, GdipDeleteGraphics, GdipCreateFromHDC, GdipSaveImageToStream, GdipBitmapUnlockBits, GdipCreateBitmapFromScan0, GdipGetImagePixelFormat, GdipBitmapLockBits, GdipGetImageWidth, GdipGetImageHeight
                                                                KERNEL32.dllGetModuleHandleW, LocalFlags, WriteFile, OpenProcess, Sleep, FormatMessageW, GetFileAttributesW, CreateFileW, MultiByteToWideChar, FlushFileBuffers, GetTempPathW, GetFileSizeEx, GetLastError, SetLastError, RegisterWaitForSingleObject, LocalAlloc, CreateFileMappingW, CreateEventW, WaitForMultipleObjects, lstrcmpiW, GetCurrentThreadId, DuplicateHandle, ReleaseMutex, CloseHandle, DeleteFileW, GetCurrentProcessId, UnregisterWaitEx, LocalFree, MulDiv, GetComputerNameW, GetSystemDirectoryW, GetVolumeInformationW, InterlockedDecrement, InterlockedExchange, ResetEvent, WideCharToMultiByte, FindResourceExW, LoadResource, LockResource, SizeofResource, GlobalAlloc, GlobalLock, GlobalUnlock, GlobalFree, VerSetConditionMask, VerifyVersionInfoW, GetModuleFileNameW, MoveFileW, SetEvent, DeleteCriticalSection, EnterCriticalSection, LeaveCriticalSection, GetVersionExW, ExpandEnvironmentStringsA, GetFileAttributesA, GetExitCodeProcess, InitializeCriticalSectionAndSpinCount, RaiseException, DecodePointer, RtlUnwind, GetCommandLineW, LoadLibraryExW, GetProcAddress, ExitThread, CreateThread, GetSystemTimeAsFileTime, IsProcessorFeaturePresent, IsDebuggerPresent, EncodePointer, HeapAlloc, HeapFree, ExitProcess, GetModuleHandleExW, GetStdHandle, HeapSize, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, TerminateProcess, TlsAlloc, TlsGetValue, GetProcessHeap, TlsSetValue, TlsFree, GetStartupInfoW, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, GetFileType, QueryPerformanceCounter, GetEnvironmentStringsW, FreeEnvironmentStringsW, InterlockedCompareExchange, WaitForSingleObject, SetFilePointerEx, InterlockedIncrement, UnmapViewOfFile, MapViewOfFile, CreateMutexW, GetConsoleMode, GetConsoleCP, OutputDebugStringW, HeapReAlloc, LCMapStringW, GetLocaleInfoW, IsValidLocale, GetUserDefaultLCID, EnumSystemLocalesW, GetStringTypeW, SetStdHandle, WriteConsoleW, InitializeCriticalSection
                                                                USER32.dllPostMessageW, LoadBitmapW, FillRect, GetDlgItem, LoadIconW, AdjustWindowRect, MoveWindow, UpdateWindow, MessageBoxW, DrawTextExW, SetCursor, LoadCursorW, CheckDlgButton, IsDlgButtonChecked, PostQuitMessage, BeginPaint, GetMessageW, FindWindowW, GetWindowTextW, GetSysColorBrush, GetSysColor, GetClientRect, GetWindowRect, SetWindowLongW, RegisterClassW, GetWindowLongW, SetWindowTextW, DestroyIcon, GetIconInfo, SendMessageW, GetDC, ReleaseDC, GetSystemMetrics, DestroyWindow, RemovePropW, RegisterWindowMessageW, SetTimer, KillTimer, DrawTextW, EndPaint, TranslateMessage, RegisterClassExW, ShowWindow, SendMessageTimeoutW, IsWindow, CreateWindowExW, CallWindowProcW, DefWindowProcW, DispatchMessageW, EnableWindow
                                                                GDI32.dllSetBkMode, GetDeviceCaps, GetObjectW, CreateFontW, SetBkColor, DeleteObject, SelectObject, DeleteDC, GetStockObject, CreateCompatibleDC, BitBlt, SetTextColor, GetCharWidth32W
                                                                ADVAPI32.dllCryptAcquireContextW, RegQueryValueExW, RegEnumKeyExA, RegQueryInfoKeyW, RegOpenKeyA, RegCloseKey, RegQueryValueExA, RegOpenKeyExA, CryptHashData, ConvertSidToStringSidW, CryptDestroyHash, CryptCreateHash, LookupAccountNameW, CryptGetHashParam, CryptReleaseContext
                                                                SHELL32.dllShellExecuteW, ShellExecuteExW, SHGetFolderPathW, SHGetFileInfoW
                                                                ole32.dllCreateStreamOnHGlobal, CoTaskMemFree, CoInitializeEx, CoUninitialize, GetHGlobalFromStream, CoCreateInstance
                                                                OLEAUT32.dllVarI4FromStr, VarUI8FromStr
                                                                WINHTTP.dllWinHttpQueryDataAvailable, WinHttpReceiveResponse, WinHttpWriteData, WinHttpSetTimeouts, WinHttpReadData, WinHttpCrackUrl, WinHttpOpenRequest, WinHttpOpen, WinHttpQueryOption, WinHttpSetStatusCallback, WinHttpQueryHeaders, WinHttpCloseHandle, WinHttpConnect, WinHttpSendRequest, WinHttpSetOption
                                                                urlmon.dllObtainUserAgentString
                                                                SHLWAPI.dllStrCmpNA, PathAppendW, AssocQueryStringW, AssocQueryStringA, StrCmpNW
                                                                Language of compilation systemCountry where language is spokenMap
                                                                EnglishGreat Britain
                                                                EnglishUnited States
                                                                TimestampSource PortDest PortSource IPDest IP
                                                                Sep 30, 2024 15:55:18.855915070 CEST6411653192.168.2.81.1.1.1
                                                                Sep 30, 2024 15:55:19.281646013 CEST6175453192.168.2.81.1.1.1
                                                                Sep 30, 2024 15:55:19.289067030 CEST5208753192.168.2.81.1.1.1
                                                                Sep 30, 2024 15:55:19.555239916 CEST53617541.1.1.1192.168.2.8
                                                                Sep 30, 2024 15:55:19.857218981 CEST6411653192.168.2.81.1.1.1
                                                                Sep 30, 2024 15:55:20.287462950 CEST5208753192.168.2.81.1.1.1
                                                                Sep 30, 2024 15:55:20.855289936 CEST6411653192.168.2.81.1.1.1
                                                                Sep 30, 2024 15:55:21.277146101 CEST5208753192.168.2.81.1.1.1
                                                                Sep 30, 2024 15:55:22.870874882 CEST6411653192.168.2.81.1.1.1
                                                                Sep 30, 2024 15:55:23.299746037 CEST5208753192.168.2.81.1.1.1
                                                                Sep 30, 2024 15:55:26.886384010 CEST6411653192.168.2.81.1.1.1
                                                                Sep 30, 2024 15:55:27.292579889 CEST5208753192.168.2.81.1.1.1
                                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                Sep 30, 2024 15:55:18.855915070 CEST192.168.2.81.1.1.10xa4a6Standard query (0)s.itorrent.bzA (IP address)IN (0x0001)false
                                                                Sep 30, 2024 15:55:19.281646013 CEST192.168.2.81.1.1.10xb116Standard query (0)info.pillowkidguest.ruA (IP address)IN (0x0001)false
                                                                Sep 30, 2024 15:55:19.289067030 CEST192.168.2.81.1.1.10x7673Standard query (0)cdn.itorrent.bzA (IP address)IN (0x0001)false
                                                                Sep 30, 2024 15:55:19.857218981 CEST192.168.2.81.1.1.10xa4a6Standard query (0)s.itorrent.bzA (IP address)IN (0x0001)false
                                                                Sep 30, 2024 15:55:20.287462950 CEST192.168.2.81.1.1.10x7673Standard query (0)cdn.itorrent.bzA (IP address)IN (0x0001)false
                                                                Sep 30, 2024 15:55:20.855289936 CEST192.168.2.81.1.1.10xa4a6Standard query (0)s.itorrent.bzA (IP address)IN (0x0001)false
                                                                Sep 30, 2024 15:55:21.277146101 CEST192.168.2.81.1.1.10x7673Standard query (0)cdn.itorrent.bzA (IP address)IN (0x0001)false
                                                                Sep 30, 2024 15:55:22.870874882 CEST192.168.2.81.1.1.10xa4a6Standard query (0)s.itorrent.bzA (IP address)IN (0x0001)false
                                                                Sep 30, 2024 15:55:23.299746037 CEST192.168.2.81.1.1.10x7673Standard query (0)cdn.itorrent.bzA (IP address)IN (0x0001)false
                                                                Sep 30, 2024 15:55:26.886384010 CEST192.168.2.81.1.1.10xa4a6Standard query (0)s.itorrent.bzA (IP address)IN (0x0001)false
                                                                Sep 30, 2024 15:55:27.292579889 CEST192.168.2.81.1.1.10x7673Standard query (0)cdn.itorrent.bzA (IP address)IN (0x0001)false
                                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                Sep 30, 2024 15:55:19.555239916 CEST1.1.1.1192.168.2.80xb116Name error (3)info.pillowkidguest.runonenoneA (IP address)IN (0x0001)false

                                                                Click to jump to process

                                                                Click to jump to process

                                                                Click to dive into process behavior distribution

                                                                Target ID:0
                                                                Start time:09:55:18
                                                                Start date:30/09/2024
                                                                Path:C:\Users\user\Desktop\file.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:"C:\Users\user\Desktop\file.exe"
                                                                Imagebase:0x400000
                                                                File size:409'072 bytes
                                                                MD5 hash:52F3D33B2CE1AE6640A20E19506B7ACB
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:low
                                                                Has exited:false

                                                                Reset < >

                                                                  Execution Graph

                                                                  Execution Coverage:7.5%
                                                                  Dynamic/Decrypted Code Coverage:0%
                                                                  Signature Coverage:14.3%
                                                                  Total number of Nodes:1971
                                                                  Total number of Limit Nodes:53
                                                                  execution_graph 30994 40fcd4 GetWindowLongW 30995 40fd07 CallWindowProcW 30994->30995 30996 40fcee 30994->30996 30996->30995 30997 40fcf5 SendMessageW 30996->30997 30997->30995 30998 413719 30999 413751 30998->30999 31000 41372c 30998->31000 31005 40e319 30999->31005 31000->30999 31002 413740 SendMessageW 31000->31002 31002->30999 31006 40e330 DefWindowProcW 31005->31006 31007 40e325 31005->31007 31007->31006 31008 40f3f8 31009 40f450 31008->31009 31010 40f40f 31008->31010 31022 40f549 BeginPaint 31009->31022 31012 40f434 31010->31012 31013 40f416 31010->31013 31014 40f43f 31012->31014 31018 40f42b 31012->31018 31013->31018 31046 40f4c2 11 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 31013->31046 31047 40f470 IsDlgButtonChecked CheckDlgButton CheckDlgButton SendMessageW 31014->31047 31020 40f432 31018->31020 31039 4082e8 31018->31039 31019 40f448 31019->31018 31021 40f44c 31019->31021 31021->31020 31023 40f572 GdipCreateFromHDC 31022->31023 31024 40f5ea 31022->31024 31026 40f590 31023->31026 31027 40f5d6 EndPaint GdipDeleteGraphics 31023->31027 31058 4233b1 31024->31058 31048 4034da 31026->31048 31027->31024 31028 40f5f9 31028->31018 31030 40f597 31051 4034bd 31030->31051 31032 40f5a3 31033 4034da 5 API calls 31032->31033 31034 40f5ac 31033->31034 31035 4034bd 5 API calls 31034->31035 31036 40f5b5 31035->31036 31054 40f3b5 31036->31054 31040 4082f7 31039->31040 31041 40831e 31039->31041 31040->31041 31043 408303 SendMessageW 31040->31043 31042 40e319 DefWindowProcW 31041->31042 31044 408331 31042->31044 31043->31041 31044->31020 31046->31018 31047->31019 31065 40352d 31048->31065 31052 40352d 4 API calls 31051->31052 31053 4034c5 MulDiv 31052->31053 31053->31032 31055 40f3d2 GdipDrawImageRectI 31054->31055 31057 40f3ea 31055->31057 31057->31027 31059 4233bb IsProcessorFeaturePresent 31058->31059 31060 4233b9 31058->31060 31062 423e31 31059->31062 31060->31028 31069 423de0 5 API calls 2 library calls 31062->31069 31064 423f14 31064->31028 31066 4034e2 MulDiv 31065->31066 31067 403536 GetDC 31065->31067 31066->31030 31067->31066 31068 403545 GetDeviceCaps GetDeviceCaps ReleaseDC 31067->31068 31068->31066 31069->31064 31070 414008 31071 414031 31070->31071 31072 414064 31070->31072 31074 414037 31071->31074 31076 414057 31071->31076 31081 414117 BeginPaint 31072->31081 31075 41404e 31074->31075 31111 414086 12 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 31074->31111 31077 4082e8 2 API calls 31075->31077 31080 414055 31075->31080 31076->31075 31112 414265 18 API calls 2 library calls 31076->31112 31077->31080 31082 414250 31081->31082 31083 414144 GdipCreateFromHDC 31081->31083 31084 4233b1 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 6 API calls 31082->31084 31085 414162 31083->31085 31086 4141a5 31083->31086 31089 41425f 31084->31089 31090 4034da 5 API calls 31085->31090 31087 4141b0 GdipGetImageHeight 31086->31087 31088 41423a EndPaint GdipDeleteGraphics 31086->31088 31091 4141c5 31087->31091 31092 4141c8 GdipGetImageWidth 31087->31092 31088->31082 31089->31075 31093 414169 31090->31093 31091->31092 31094 4141e6 31092->31094 31095 4034bd 5 API calls 31093->31095 31096 4034da 5 API calls 31094->31096 31097 414175 31095->31097 31098 4141f6 31096->31098 31099 4034da 5 API calls 31097->31099 31100 4034da 5 API calls 31098->31100 31101 41417e 31099->31101 31102 4141ff 31100->31102 31103 4034bd 5 API calls 31101->31103 31105 4034da 5 API calls 31102->31105 31104 414187 31103->31104 31106 40f3b5 GdipDrawImageRectI 31104->31106 31107 414208 31105->31107 31106->31086 31108 4034bd 5 API calls 31107->31108 31109 414211 31108->31109 31110 40f3b5 GdipDrawImageRectI 31109->31110 31110->31088 31111->31075 31112->31075 31113 424f4b 31114 424f57 CallCatchBlock 31113->31114 31150 42758b GetStartupInfoW 31114->31150 31116 424f5c 31152 425b2b GetProcessHeap 31116->31152 31118 424fb4 31119 424fbf 31118->31119 31327 42509b 58 API calls 3 library calls 31118->31327 31153 428bc6 31119->31153 31122 424fc5 31123 424fd0 __RTC_Initialize 31122->31123 31328 42509b 58 API calls 3 library calls 31122->31328 31174 42b85f 31123->31174 31126 424fdf 31127 424feb GetCommandLineW 31126->31127 31329 42509b 58 API calls 3 library calls 31126->31329 31193 42bf5b GetEnvironmentStringsW 31127->31193 31130 424fea 31130->31127 31133 425005 31134 425010 31133->31134 31330 425bbd 58 API calls 3 library calls 31133->31330 31203 42bd50 31134->31203 31137 425016 31138 425021 31137->31138 31331 425bbd 58 API calls 3 library calls 31137->31331 31217 425bf7 31138->31217 31141 425029 31143 425034 __wwincmdln 31141->31143 31332 425bbd 58 API calls 3 library calls 31141->31332 31223 412753 31143->31223 31146 425057 31334 425be8 58 API calls _doexit 31146->31334 31149 42505c CallCatchBlock 31151 4275a1 31150->31151 31151->31116 31152->31118 31335 425c8f 36 API calls 2 library calls 31153->31335 31155 428bcb 31336 42e749 InitializeCriticalSectionAndSpinCount __mtinitlocknum 31155->31336 31157 428bd0 31158 428bd4 31157->31158 31338 42750d TlsAlloc 31157->31338 31337 428c3c 61 API calls 2 library calls 31158->31337 31161 428bd9 31161->31122 31162 428be6 31162->31158 31163 428bf1 31162->31163 31339 4260bf 31163->31339 31166 428c33 31347 428c3c 61 API calls 2 library calls 31166->31347 31169 428c12 31169->31166 31171 428c18 31169->31171 31170 428c38 31170->31122 31346 428b13 58 API calls 4 library calls 31171->31346 31173 428c20 GetCurrentThreadId 31173->31122 31175 42b86b CallCatchBlock 31174->31175 31359 42e618 31175->31359 31177 42b872 31178 4260bf __calloc_crt 58 API calls 31177->31178 31180 42b883 31178->31180 31179 42b8ee GetStartupInfoW 31187 42b903 31179->31187 31190 42ba32 31179->31190 31180->31179 31181 42b88e CallCatchBlock @_EH4_CallFilterFunc@8 31180->31181 31181->31126 31182 42bafa 31368 42bb0a LeaveCriticalSection _doexit 31182->31368 31184 4260bf __calloc_crt 58 API calls 31184->31187 31185 42ba7f GetStdHandle 31185->31190 31186 42ba92 GetFileType 31186->31190 31187->31184 31188 42b951 31187->31188 31187->31190 31189 42b985 GetFileType 31188->31189 31188->31190 31366 4275ae InitializeCriticalSectionAndSpinCount 31188->31366 31189->31188 31190->31182 31190->31185 31190->31186 31367 4275ae InitializeCriticalSectionAndSpinCount 31190->31367 31194 424ffb 31193->31194 31195 42bf6c 31193->31195 31199 42bb13 GetModuleFileNameW 31194->31199 31371 426107 58 API calls 2 library calls 31195->31371 31197 42bf92 _memmove 31198 42bfa8 FreeEnvironmentStringsW 31197->31198 31198->31194 31200 42bb47 _wparse_cmdline 31199->31200 31202 42bb87 _wparse_cmdline 31200->31202 31372 426107 58 API calls 2 library calls 31200->31372 31202->31133 31204 42bd61 31203->31204 31205 42bd69 __wsetenvp 31203->31205 31204->31137 31206 4260bf __calloc_crt 58 API calls 31205->31206 31213 42bd92 __wsetenvp 31206->31213 31207 42bde9 31374 4233c0 31207->31374 31209 4260bf __calloc_crt 58 API calls 31209->31213 31210 42be0e 31211 4233c0 _free 58 API calls 31210->31211 31211->31204 31213->31204 31213->31207 31213->31209 31213->31210 31214 42be25 31213->31214 31373 424d98 58 API calls 2 library calls 31213->31373 31380 426749 8 API calls 2 library calls 31214->31380 31216 42be31 31216->31137 31219 425c03 __IsNonwritableInCurrentImage 31217->31219 31382 42e8e1 31219->31382 31220 425c21 __initterm_e 31222 425c40 _doexit __IsNonwritableInCurrentImage 31220->31222 31385 4235b5 67 API calls __cinit 31220->31385 31222->31141 31386 405c87 31223->31386 31225 412955 CoInitializeEx 31226 4129a2 31225->31226 31227 412964 31225->31227 31402 411306 31226->31402 31228 4085b7 100 API calls 31227->31228 31231 412972 31228->31231 31229 412778 _wcsstr 31229->31225 31235 4127a0 31229->31235 31234 41298e 31231->31234 31588 40792f 58 API calls 3 library calls 31231->31588 31239 4083a2 97 API calls 31234->31239 31557 406b6c 31235->31557 31237 4129b5 31416 406be2 31237->31416 31324 412950 31239->31324 31242 4127bf 31570 406bfe 31242->31570 31243 4233b1 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 6 API calls 31246 412c08 31243->31246 31246->31146 31333 425e60 58 API calls _doexit 31246->31333 31248 4129e3 31251 4129fc 31248->31251 31419 407617 31248->31419 31249 406be2 59 API calls 31250 4127e8 31249->31250 31577 405427 31250->31577 31435 40532c 31251->31435 31254 4127f7 31581 405457 31254->31581 31258 412806 31262 405457 59 API calls 31258->31262 31260 412ac2 31455 414a8c 31260->31455 31261 412a8c 31263 4085b7 100 API calls 31261->31263 31265 412815 31262->31265 31266 412a9a 31263->31266 31585 412ff5 59 API calls 31265->31585 31269 412ab6 31266->31269 31589 40792f 58 API calls 3 library calls 31266->31589 31274 4083a2 97 API calls 31269->31274 31271 412824 31272 405457 59 API calls 31271->31272 31276 412833 31272->31276 31274->31260 31275 412adb 31471 4108da 31275->31471 31279 405457 59 API calls 31276->31279 31281 412842 31279->31281 31280 412b20 31516 410666 31280->31516 31586 412ff5 59 API calls 31281->31586 31285 412b01 31288 412b17 31285->31288 31590 40792f 58 API calls 3 library calls 31285->31590 31286 412851 31289 405457 59 API calls 31286->31289 31502 4083a2 31288->31502 31293 412860 31289->31293 31290 414a8c 59 API calls 31294 412b31 31290->31294 31587 412ff5 59 API calls 31293->31587 31539 414b0b 31294->31539 31298 412b54 KiUserCallbackDispatcher 31299 412b62 GdiplusShutdown 31298->31299 31300 412b3e TranslateMessage DispatchMessageW 31298->31300 31301 412b76 31299->31301 31302 412b9d 31299->31302 31300->31298 31303 412b79 31301->31303 31304 412b8a 31301->31304 31305 40532c 132 API calls 31302->31305 31306 412b88 31303->31306 31310 40532c 132 API calls 31303->31310 31307 40532c 132 API calls 31304->31307 31308 412b96 31305->31308 31309 412bca 31306->31309 31312 40532c 132 API calls 31306->31312 31307->31308 31591 417ac5 186 API calls 3 library calls 31308->31591 31592 41079b 171 API calls __EH_prolog3_GS 31309->31592 31310->31306 31312->31309 31314 412bcf 31593 408412 121 API calls 2 library calls 31314->31593 31316 412bd4 31317 414a8c 59 API calls 31316->31317 31318 412bd9 31317->31318 31319 412beb 31318->31319 31594 403032 9 API calls 2 library calls 31318->31594 31321 414a8c 59 API calls 31319->31321 31322 412bf0 31321->31322 31595 414aa3 14 API calls 2 library calls 31322->31595 31324->31243 31325 41286f 31326 41291d MessageBoxW 31325->31326 31326->31324 31327->31119 31328->31123 31329->31130 31333->31146 31334->31149 31335->31155 31336->31157 31337->31161 31338->31162 31340 4260c6 31339->31340 31342 426101 31340->31342 31344 4260e4 31340->31344 31348 42ee93 31340->31348 31342->31166 31345 427569 TlsSetValue 31342->31345 31344->31340 31344->31342 31356 4278b5 Sleep 31344->31356 31345->31169 31346->31173 31347->31170 31349 42ee9e 31348->31349 31355 42eeb9 31348->31355 31350 42eeaa 31349->31350 31349->31355 31357 425ad7 58 API calls __getptd_noexit 31350->31357 31352 42eec9 HeapAlloc 31353 42eeaf 31352->31353 31352->31355 31353->31340 31355->31352 31355->31353 31358 425b40 DecodePointer 31355->31358 31356->31344 31357->31353 31358->31355 31360 42e629 31359->31360 31361 42e63c EnterCriticalSection 31359->31361 31369 42e6a0 58 API calls 7 library calls 31360->31369 31361->31177 31363 42e62f 31363->31361 31370 425bbd 58 API calls 3 library calls 31363->31370 31366->31188 31367->31190 31368->31181 31369->31363 31371->31197 31372->31202 31373->31213 31375 4233c9 RtlFreeHeap 31374->31375 31379 4233f2 _free 31374->31379 31376 4233de 31375->31376 31375->31379 31381 425ad7 58 API calls __getptd_noexit 31376->31381 31378 4233e4 GetLastError 31378->31379 31379->31204 31380->31216 31381->31378 31383 42e8e4 EncodePointer 31382->31383 31383->31383 31384 42e8fe 31383->31384 31384->31220 31385->31222 31596 439b89 31386->31596 31388 405c93 StrCmpNA 31389 405cc9 31388->31389 31390 405cae 31388->31390 31391 405d03 StrCmpNA 31389->31391 31600 403dc1 31390->31600 31393 405d19 31391->31393 31401 405d34 31391->31401 31395 403dc1 59 API calls 31393->31395 31398 405d26 31395->31398 31400 4057a5 61 API calls 31398->31400 31399 405d6d 31399->31229 31400->31401 31597 439b38 31401->31597 31403 411312 __EH_prolog3_GS 31402->31403 31404 403e1d 59 API calls 31403->31404 31405 411326 31404->31405 31693 406633 31405->31693 31409 411342 31410 439b38 6 API calls 31409->31410 31411 411360 31410->31411 31412 406203 31411->31412 31413 406209 31412->31413 31414 40620b GetFileAttributesW 31412->31414 31413->31414 31415 406217 31414->31415 31415->31237 31417 403e1d 59 API calls 31416->31417 31418 406bf7 31417->31418 31418->31248 31420 407626 _memset __EH_prolog3_GS 31419->31420 31421 407643 GetModuleFileNameW 31420->31421 31422 407661 31421->31422 31434 407768 31421->31434 31423 403e1d 59 API calls 31422->31423 31431 407673 char_traits 31423->31431 31424 439b38 6 API calls 31425 40779f 31424->31425 31425->31251 31426 403e1d 59 API calls 31426->31431 31428 405427 59 API calls 31428->31431 31429 405457 59 API calls 31429->31431 31431->31426 31431->31428 31431->31429 31432 406203 GetFileAttributesW 31431->31432 31433 40776a MoveFileW 31431->31433 31431->31434 31744 4080dc 31431->31744 31751 404cbf 31431->31751 31432->31431 31433->31434 31434->31424 31436 40533b __EH_prolog3_GS 31435->31436 31789 403ccf 31436->31789 31439 4057a5 61 API calls 31440 40535c 31439->31440 31441 405427 59 API calls 31440->31441 31442 40536e 31441->31442 31443 405457 59 API calls 31442->31443 31444 405383 31443->31444 31445 405457 59 API calls 31444->31445 31446 405393 31445->31446 31447 405457 59 API calls 31446->31447 31448 4053ab 31447->31448 31449 405457 59 API calls 31448->31449 31450 4053c0 31449->31450 31801 405283 31450->31801 31452 405417 31453 439b38 6 API calls 31452->31453 31454 405426 GdiplusStartup 31453->31454 31454->31260 31454->31261 31456 412ad6 31455->31456 31457 414a95 31455->31457 31459 4028ee 31456->31459 31458 423d6a ctype 59 API calls 31457->31458 31458->31456 31460 4028fa CallCatchBlock 31459->31460 31932 401c0e 31460->31932 31463 4032d7 2 API calls 31464 402904 31463->31464 31465 402958 31464->31465 31941 4033dd 31464->31941 31954 40296f InterlockedCompareExchange InterlockedCompareExchange 31465->31954 31468 402920 31468->31465 31469 40292d CallCatchBlock @_EH4_CallFilterFunc@8 31468->31469 31953 401d24 6 API calls CallCatchBlock 31468->31953 31469->31275 31472 42c910 _memset 31471->31472 31473 410907 LoadIconW LoadCursorW LoadIconW RegisterClassExW 31472->31473 31969 40e535 31473->31969 31476 4034da 5 API calls 31477 4109b4 AdjustWindowRect 31476->31477 31478 4109d1 31477->31478 31479 4109d8 31477->31479 31481 4233b1 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 6 API calls 31478->31481 31480 406bfe 59 API calls 31479->31480 31483 410a07 31480->31483 31482 410b36 31481->31482 31482->31280 31496 4085b7 31482->31496 31484 406bfe 59 API calls 31483->31484 31489 410a4a 31483->31489 31485 410a2b 31484->31485 32045 40814f 83 API calls vswprintf 31485->32045 31486 410a76 CreateWindowExW 31972 40e553 GetWindowRect GetClientRect 31486->31972 31489->31486 31491 410ab8 GetSystemMetrics GetSystemMetrics MoveWindow 31979 4100dc 31491->31979 31497 4085c3 __EH_prolog3 31496->31497 32552 408d4c 31497->32552 31499 4085f4 32558 408df8 31499->32558 31501 408617 ctype 31501->31285 31503 4083ae __EH_prolog3_GS 31502->31503 32618 408336 31503->32618 31505 4083c4 32622 408650 31505->32622 31509 4083e3 32631 409113 31509->32631 31511 4083e9 31512 408405 31511->31512 31513 4083fc LeaveCriticalSection 31511->31513 31514 439b38 6 API calls 31512->31514 31513->31512 31515 408411 31514->31515 31515->31280 31517 410675 __EH_prolog3_GS 31516->31517 32694 41002e 31517->32694 31520 4106e8 32703 406500 31520->32703 31521 41068d 31523 406500 64 API calls 31521->31523 31525 410695 31523->31525 31527 406961 65 API calls 31525->31527 31529 4106a5 31527->31529 31531 406b6c 61 API calls 31529->31531 31530 406b6c 61 API calls 31532 410712 31530->31532 31533 4106b1 31531->31533 32737 40e071 31532->32737 32756 40dd05 FindWindowW SendMessageTimeoutW 31533->32756 31536 4106c9 31537 439b38 6 API calls 31536->31537 31538 41074f 31537->31538 31538->31290 31540 414b17 __EH_prolog3_GS 31539->31540 31541 408336 EnterCriticalSection 31540->31541 31542 414b24 31541->31542 32771 41499a 31542->32771 31544 414b30 31545 414b47 31544->31545 31546 41499a 61 API calls 31544->31546 32783 414a14 31545->32783 31548 414b70 31546->31548 32782 402ebf 15 API calls 2 library calls 31548->32782 31549 414bb9 31551 414bc8 31549->31551 31552 414bbf LeaveCriticalSection 31549->31552 31554 439b38 6 API calls 31551->31554 31552->31551 31555 412b36 31554->31555 31555->31298 31556 414b92 31556->31545 31556->31549 31558 406b78 __EH_prolog3_GS 31557->31558 31559 403dc1 59 API calls 31558->31559 31560 406b8c 31559->31560 31561 406bc5 31560->31561 32795 401180 58 API calls _malloc 31560->32795 31563 4057a5 61 API calls 31561->31563 31565 406bcf 31563->31565 31564 406bb8 31566 404113 59 API calls 31564->31566 31567 439b38 6 API calls 31565->31567 31566->31561 31568 406be1 31567->31568 31569 4149fd 61 API calls 31568->31569 31569->31242 31571 403e1d 59 API calls 31570->31571 31572 406c24 char_traits 31571->31572 31573 403e1d 59 API calls 31572->31573 31574 406c65 31573->31574 31575 4233b1 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 6 API calls 31574->31575 31576 406c74 31575->31576 31576->31249 31578 40543b char_traits 31577->31578 32796 40552c 31578->32796 31580 405447 31580->31254 31582 40546d char_traits 31581->31582 32810 405489 31582->32810 31584 405479 31584->31258 31585->31271 31586->31286 31587->31325 31588->31234 31589->31269 31590->31288 31591->31306 31592->31314 31593->31316 31594->31319 31595->31324 31596->31388 31598 4233b1 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 6 API calls 31597->31598 31599 439b42 31598->31599 31599->31599 31601 403ddd 31600->31601 31614 404113 31601->31614 31603 403de9 31604 4057a5 31603->31604 31607 4057b1 __EH_prolog3 31604->31607 31605 4057bf 31680 403e1d 31605->31680 31607->31605 31608 4057d9 MultiByteToWideChar 31607->31608 31608->31605 31609 4057f1 31608->31609 31610 405817 MultiByteToWideChar 31609->31610 31611 405831 31610->31611 31612 403e1d 59 API calls 31611->31612 31613 4057cb ctype 31612->31613 31613->31389 31615 404123 31614->31615 31616 404143 31615->31616 31618 404127 31615->31618 31621 40427f 31616->31621 31628 403f7b 59 API calls _memmove 31618->31628 31620 404141 _memmove 31620->31603 31622 4042d7 31621->31622 31623 40428b 31621->31623 31633 438f67 59 API calls 2 library calls 31622->31633 31625 404299 31623->31625 31629 40459f 31623->31629 31625->31620 31628->31620 31630 4045ab __EH_prolog3_catch 31629->31630 31634 404a86 31630->31634 31632 4045f9 ctype _memmove 31632->31625 31635 404a92 31634->31635 31636 404aa9 31634->31636 31638 404a9d std::exception::exception 31635->31638 31641 423d6a 31635->31641 31636->31632 31638->31636 31651 4274a2 RaiseException 31638->31651 31640 438f66 31643 423d72 31641->31643 31644 423d8c 31643->31644 31646 423d90 std::exception::exception 31643->31646 31652 4233f8 31643->31652 31669 425b40 DecodePointer 31643->31669 31644->31638 31670 4274a2 RaiseException 31646->31670 31648 423dba 31671 42449a 58 API calls _free 31648->31671 31650 423dcc Mailbox 31650->31638 31651->31640 31653 423473 31652->31653 31661 423404 31652->31661 31678 425b40 DecodePointer 31653->31678 31655 423479 31679 425ad7 58 API calls __getptd_noexit 31655->31679 31658 423437 RtlAllocateHeap 31658->31661 31668 42346b 31658->31668 31660 42340f 31660->31661 31672 425e74 58 API calls 2 library calls 31660->31672 31673 425ed1 58 API calls 9 library calls 31660->31673 31674 425ba7 GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 31660->31674 31661->31658 31661->31660 31662 42345f 31661->31662 31666 42345d 31661->31666 31675 425b40 DecodePointer 31661->31675 31676 425ad7 58 API calls __getptd_noexit 31662->31676 31677 425ad7 58 API calls __getptd_noexit 31666->31677 31668->31643 31669->31643 31670->31648 31671->31650 31672->31660 31673->31660 31675->31661 31676->31666 31677->31668 31678->31655 31679->31668 31681 403e3b char_traits 31680->31681 31684 40431d 31681->31684 31683 403e47 31683->31613 31685 40432d 31684->31685 31686 404331 31685->31686 31687 40434f 31685->31687 31691 404696 59 API calls 31686->31691 31692 40476a 59 API calls 31687->31692 31690 40434d 31690->31683 31691->31690 31692->31690 31694 406642 __EH_prolog3_GS 31693->31694 31735 406221 31694->31735 31697 4066a3 CoCreateInstance 31699 4067f6 31697->31699 31700 4066ce 31697->31700 31698 406655 _memset 31703 406670 SHGetFolderPathW 31698->31703 31702 4085b7 100 API calls 31699->31702 31700->31699 31701 4066dc 31700->31701 31708 4067cd 31701->31708 31712 40670e 31701->31712 31704 406803 31702->31704 31705 40668b 31703->31705 31706 406821 31704->31706 31741 40792f 58 API calls 3 library calls 31704->31741 31707 403e1d 59 API calls 31705->31707 31710 4083a2 97 API calls 31706->31710 31727 406695 31707->31727 31711 4085b7 100 API calls 31708->31711 31713 40682f 31710->31713 31728 406737 31711->31728 31719 40672a 31712->31719 31720 40678c 31712->31720 31714 403e1d 59 API calls 31713->31714 31714->31727 31715 439b38 6 API calls 31717 406856 31715->31717 31716 406755 31718 4083a2 97 API calls 31716->31718 31729 406857 31717->31729 31722 406764 31718->31722 31724 4085b7 100 API calls 31719->31724 31723 403e1d 59 API calls 31720->31723 31725 403e1d 59 API calls 31722->31725 31726 40679d CoTaskMemFree 31723->31726 31724->31728 31725->31727 31726->31727 31727->31715 31728->31716 31740 40792f 58 API calls 3 library calls 31728->31740 31731 406863 __EH_prolog3 31729->31731 31730 403e1d 59 API calls 31734 4068e6 ctype 31730->31734 31732 4068bf PathAppendW 31731->31732 31733 4068cb 31731->31733 31732->31733 31733->31730 31734->31409 31742 42c910 31735->31742 31737 406247 VerSetConditionMask VerifyVersionInfoW 31738 4233b1 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 6 API calls 31737->31738 31739 40628d 31738->31739 31739->31697 31739->31698 31740->31716 31741->31706 31743 42c91c 31742->31743 31743->31737 31743->31743 31761 424377 31744->31761 31747 403e1d 59 API calls 31748 40811e 31747->31748 31749 4233b1 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 6 API calls 31748->31749 31750 40812b 31749->31750 31750->31431 31752 404cd7 31751->31752 31753 404fa8 31751->31753 31752->31753 31756 404d22 31752->31756 31757 404f9e 31752->31757 31788 438f95 59 API calls 2 library calls 31753->31788 31760 404d42 31756->31760 31786 40476a 59 API calls 31756->31786 31787 438f67 59 API calls 2 library calls 31757->31787 31760->31431 31764 4287b5 31761->31764 31763 40810d 31763->31747 31765 4287d3 31764->31765 31766 4287be 31764->31766 31768 428816 31765->31768 31770 4287e1 31765->31770 31780 425ad7 58 API calls __getptd_noexit 31766->31780 31784 425ad7 58 API calls __getptd_noexit 31768->31784 31769 4287c3 31781 426739 9 API calls __lseeki64 31769->31781 31782 4286ba 78 API calls 3 library calls 31770->31782 31772 42880e 31785 426739 9 API calls __lseeki64 31772->31785 31775 4287ce 31775->31763 31776 4287f8 31778 428826 31776->31778 31783 425ad7 58 API calls __getptd_noexit 31776->31783 31778->31763 31780->31769 31781->31775 31782->31776 31783->31772 31784->31772 31785->31778 31786->31760 31817 403a22 31789->31817 31792 403d28 31832 4049b5 31792->31832 31793 403d1a 31794 403dc1 59 API calls 31793->31794 31800 403d26 31794->31800 31798 4233b1 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 6 API calls 31799 403dbd 31798->31799 31799->31439 31800->31798 31802 405314 31801->31802 31803 405294 31801->31803 31917 4031bb 108 API calls 2 library calls 31802->31917 31804 4028ee 86 API calls 31803->31804 31806 405299 InterlockedExchange 31804->31806 31808 4052da 31806->31808 31809 4052ce ResetEvent 31806->31809 31807 405325 31807->31452 31903 402ebf 15 API calls 2 library calls 31808->31903 31809->31808 31812 4052f8 31812->31807 31904 401cd0 31812->31904 31814 405307 31814->31807 31910 403086 31814->31910 31818 403a31 __EH_prolog3_GS 31817->31818 31819 403a63 InterlockedCompareExchange 31818->31819 31880 4235b5 67 API calls __cinit 31818->31880 31828 403a62 _memset 31819->31828 31821 403a77 31823 439b38 6 API calls 31821->31823 31824 403a81 31823->31824 31824->31792 31824->31793 31828->31819 31828->31821 31829 403b37 InterlockedCompareExchange 31828->31829 31851 403832 31828->31851 31861 4038c5 31828->31861 31872 40377e 31828->31872 31881 4039a5 61 API calls 2 library calls 31828->31881 31882 40500b 59 API calls 3 library calls 31828->31882 31883 40500b 59 API calls 3 library calls 31828->31883 31829->31828 31833 403d54 31832->31833 31835 4049da 31832->31835 31836 403b58 CryptAcquireContextW 31833->31836 31834 403f1a 59 API calls 31834->31835 31835->31833 31835->31834 31837 403b87 CryptAcquireContextW 31836->31837 31838 403b9e CryptCreateHash 31836->31838 31837->31838 31841 403b97 31837->31841 31839 403bc2 CryptHashData 31838->31839 31840 403bb6 CryptReleaseContext 31838->31840 31843 403bea CryptGetHashParam 31839->31843 31844 403bdf 31839->31844 31840->31841 31845 4233b1 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 6 API calls 31841->31845 31846 403be2 CryptDestroyHash 31843->31846 31848 403c08 CryptDestroyHash CryptReleaseContext 31843->31848 31844->31846 31847 403c8c 31845->31847 31846->31840 31847->31800 31848->31841 31849 403c21 31848->31849 31902 40400f 59 API calls 31849->31902 31852 40383e __EH_prolog3_GS 31851->31852 31853 40384c GetComputerNameW 31852->31853 31854 4038a6 31853->31854 31855 40386b 31853->31855 31856 403e1d 59 API calls 31854->31856 31884 404fb3 59 API calls 2 library calls 31855->31884 31858 40388e 31856->31858 31859 439b38 6 API calls 31858->31859 31860 4038c4 31859->31860 31860->31828 31862 4038d1 __EH_prolog3 31861->31862 31885 404396 31862->31885 31864 403900 31865 40390b LookupAccountNameW 31864->31865 31868 40398d Mailbox ctype 31864->31868 31866 40393a GetLastError 31865->31866 31865->31868 31867 403945 31866->31867 31866->31868 31867->31868 31869 403971 LookupAccountNameW 31867->31869 31870 404396 59 API calls 31867->31870 31868->31828 31869->31868 31871 40396e 31870->31871 31871->31869 31873 40379e _memset 31872->31873 31879 4037d4 31872->31879 31875 4037bb GetSystemDirectoryW 31873->31875 31874 4233b1 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 6 API calls 31876 40382e 31874->31876 31877 4037d8 _wcspbrk 31875->31877 31875->31879 31876->31828 31878 4037f5 GetVolumeInformationW 31877->31878 31878->31879 31879->31874 31880->31828 31881->31828 31882->31828 31883->31829 31884->31858 31886 4043b7 31885->31886 31892 404407 Mailbox _memmove 31885->31892 31887 404594 31886->31887 31888 4043e4 31886->31888 31886->31892 31900 438f67 59 API calls 2 library calls 31887->31900 31893 404a5b 31888->31893 31892->31864 31894 404a82 31893->31894 31895 404a67 31893->31895 31894->31892 31896 423d6a ctype 59 API calls 31895->31896 31897 404a76 std::exception::exception 31895->31897 31896->31897 31897->31894 31901 4274a2 RaiseException 31897->31901 31899 438f66 31901->31899 31902->31841 31903->31812 31905 401cdc CallCatchBlock 31904->31905 31918 4032d7 31905->31918 31907 401ce3 31909 401cf7 CallCatchBlock @_EH4_CallFilterFunc@8 31907->31909 31924 401a81 WaitForSingleObject ReleaseMutex CallCatchBlock @_EH4_CallFilterFunc@8 31907->31924 31909->31814 31926 4012c9 31910->31926 31913 4030a0 31931 401d24 6 API calls CallCatchBlock 31913->31931 31915 4030a9 31915->31807 31917->31807 31919 4032e3 CallCatchBlock 31918->31919 31920 4032e9 InterlockedCompareExchange 31919->31920 31920->31920 31921 4032f8 31920->31921 31923 40330a CallCatchBlock @_EH4_CallFilterFunc@8 31921->31923 31925 40333e InterlockedCompareExchange 31921->31925 31923->31907 31924->31909 31925->31923 31927 4012d1 31926->31927 31929 4012e2 31926->31929 31928 4012d6 CloseHandle 31927->31928 31927->31929 31928->31929 31930 401d24 6 API calls CallCatchBlock 31929->31930 31930->31913 31931->31915 31933 401c12 InterlockedCompareExchange 31932->31933 31938 401c24 31933->31938 31934 401c27 31934->31463 31935 401c4c LocalAlloc 31937 401c5c InterlockedIncrement CreateMutexW 31935->31937 31935->31938 31937->31938 31938->31933 31938->31934 31938->31935 31939 4032d7 2 API calls 31938->31939 31955 4235b5 67 API calls __cinit 31938->31955 31940 401cbc InterlockedCompareExchange 31939->31940 31940->31933 31942 4033e9 CallCatchBlock 31941->31942 31943 403453 CallCatchBlock 31942->31943 31956 401334 31942->31956 31943->31468 31946 403447 31964 403464 ReleaseMutex 31946->31964 31950 403422 31963 401b3e LocalFlags LocalFree LocalAlloc _memmove 31950->31963 31952 403429 31952->31946 31953->31465 31954->31469 31955->31938 31957 401338 WaitForSingleObject 31956->31957 31958 401345 31956->31958 31957->31958 31958->31946 31959 40347d LocalAlloc 31958->31959 31960 403491 31959->31960 31961 40341b 31959->31961 31965 401d74 InterlockedIncrement CreateMutexW CreateEventW 31960->31965 31961->31946 31961->31950 31963->31952 31964->31943 31966 401dfa _memset 31965->31966 31967 401e37 RegisterWaitForSingleObject 31966->31967 31968 401e57 _memset 31966->31968 31967->31968 31968->31961 31970 4034bd 5 API calls 31969->31970 31971 40e53f 31970->31971 31971->31476 32046 4034f7 31972->32046 31975 4034f7 6 API calls 31976 40e594 31975->31976 31977 4233b1 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 6 API calls 31976->31977 31978 40e5c4 31977->31978 31978->31478 31978->31491 31980 4100e8 __EH_prolog3_GS 31979->31980 31981 423d6a ctype 59 API calls 31980->31981 31982 4100ef 31981->31982 31983 41010a 31982->31983 32055 41444f 31982->32055 31985 423d6a ctype 59 API calls 31983->31985 31986 41011e 31985->31986 31987 41013c 31986->31987 32168 40fdc7 31986->32168 31989 423d6a ctype 59 API calls 31987->31989 31990 41014d 31989->31990 31991 41016b 31990->31991 32217 413a48 31990->32217 31993 423d6a ctype 59 API calls 31991->31993 31994 41017c 31993->31994 31995 41019a 31994->31995 32257 413f0d 31994->32257 31997 423d6a ctype 59 API calls 31995->31997 31998 4101ab 31997->31998 31999 4101c9 31998->31999 32279 413c38 31998->32279 32001 423d6a ctype 59 API calls 31999->32001 32002 4101da 32001->32002 32003 4101f8 32002->32003 32320 40f5ff 32002->32320 32005 410235 _memmove 32003->32005 32379 413273 59 API calls 32003->32379 32006 439b38 6 API calls 32005->32006 32007 410259 32006->32007 32007->31478 32009 4103d1 32007->32009 32010 410481 32009->32010 32011 410406 32009->32011 32012 4104a3 32010->32012 32015 410493 ShowWindow 32010->32015 32011->32010 32539 43bb24 32011->32539 32013 43bb24 59 API calls 32012->32013 32016 4104b7 32013->32016 32015->32012 32018 410503 32016->32018 32019 4104be 32016->32019 32017 410421 32020 410460 ShowWindow 32017->32020 32021 41042a IsDlgButtonChecked IsDlgButtonChecked IsDlgButtonChecked 32017->32021 32023 43bb24 59 API calls 32018->32023 32022 4104c7 32019->32022 32029 410544 32019->32029 32020->32010 32021->32020 32025 4104d4 32022->32025 32026 4104dd ShowWindow 32022->32026 32027 41051c 32023->32027 32024 410604 32031 4233b1 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 6 API calls 32024->32031 32546 41025a 148 API calls 2 library calls 32025->32546 32034 4104db 32026->32034 32027->32029 32032 410523 32027->32032 32028 4105f9 ShowWindow 32028->32024 32029->32024 32029->32028 32033 43bb24 59 API calls 32029->32033 32035 410611 ShowWindow KiUserCallbackDispatcher 32031->32035 32547 413e0c 12 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 32032->32547 32037 41057d 32033->32037 32034->32029 32035->31478 32038 43bb24 59 API calls 32037->32038 32040 4105ad 32037->32040 32039 41059e 32038->32039 32039->32040 32548 4149fd 61 API calls 32039->32548 32040->32028 32042 43bb24 59 API calls 32040->32042 32043 4105ea 32042->32043 32043->32028 32549 41397a 7 API calls 32043->32549 32045->31489 32047 4034bd 5 API calls 32046->32047 32048 403505 32047->32048 32049 4034bd 5 API calls 32048->32049 32050 40350f 32049->32050 32051 4034da 5 API calls 32050->32051 32052 40351a 32051->32052 32053 4034da 5 API calls 32052->32053 32054 403525 32053->32054 32054->31975 32056 41445b __EH_prolog3_GS 32055->32056 32380 40e337 32056->32380 32061 4034da 5 API calls 32062 4144a1 32061->32062 32063 4034bd 5 API calls 32062->32063 32064 4144ab 32063->32064 32065 4034da 5 API calls 32064->32065 32066 4144b5 32065->32066 32067 4034da 5 API calls 32066->32067 32068 4144bf 32067->32068 32069 4034da 5 API calls 32068->32069 32070 4144c8 32069->32070 32071 4034bd 5 API calls 32070->32071 32072 4144d1 32071->32072 32073 40e535 5 API calls 32072->32073 32074 4144e4 CreateWindowExW SendMessageW 32073->32074 32402 406c78 32074->32402 32076 414527 32077 414540 32076->32077 32078 4145f4 32076->32078 32079 4034da 5 API calls 32077->32079 32080 406c78 59 API calls 32078->32080 32081 414550 32079->32081 32085 4145fc char_traits 32080->32085 32082 4034bd 5 API calls 32081->32082 32083 41455a 32082->32083 32084 4034da 5 API calls 32083->32084 32086 414564 32084->32086 32088 403e1d 59 API calls 32085->32088 32087 4034da 5 API calls 32086->32087 32089 41456e 32087->32089 32090 414626 32088->32090 32091 4034da 5 API calls 32089->32091 32095 414654 32090->32095 32431 404a29 59 API calls 32090->32431 32092 414577 32091->32092 32094 4034bd 5 API calls 32092->32094 32097 414580 32094->32097 32096 414670 32095->32096 32432 405f17 78 API calls 2 library calls 32095->32432 32100 414685 GdipGetImageWidth 32096->32100 32101 4146ca 32096->32101 32099 40e535 5 API calls 32097->32099 32102 414593 CreateWindowExW SendMessageW 32099->32102 32104 414699 32100->32104 32105 4034da 5 API calls 32101->32105 32103 41390d 7 API calls 32102->32103 32106 4145ec 32103->32106 32107 4034bd 5 API calls 32104->32107 32108 4146c2 32105->32108 32109 4148e5 32106->32109 32110 4146a6 GdipGetImageHeight 32107->32110 32111 406c78 59 API calls 32108->32111 32113 40e535 5 API calls 32109->32113 32110->32108 32112 4146dc 32111->32112 32114 4034da 5 API calls 32112->32114 32115 414900 32113->32115 32116 4146eb 32114->32116 32414 40e540 32115->32414 32118 4034bd 5 API calls 32116->32118 32120 4146f5 32118->32120 32123 4034da 5 API calls 32120->32123 32121 414934 32419 405d6e LoadResource 32121->32419 32122 41493b 32125 439b38 6 API calls 32122->32125 32126 4146ff 32123->32126 32127 414947 32125->32127 32128 4034da 5 API calls 32126->32128 32127->31983 32129 414709 32128->32129 32130 4034da 5 API calls 32129->32130 32131 414713 32130->32131 32132 4034bd 5 API calls 32131->32132 32133 41471d 32132->32133 32134 40e535 5 API calls 32133->32134 32135 414737 CreateWindowExW 32134->32135 32405 4040cd 32135->32405 32137 414774 SendMessageW 32138 4034da 5 API calls 32137->32138 32139 414792 32138->32139 32140 4034bd 5 API calls 32139->32140 32141 41479c 32140->32141 32142 4034da 5 API calls 32141->32142 32143 4147a6 32142->32143 32144 4034da 5 API calls 32143->32144 32145 4147b0 32144->32145 32146 4034da 5 API calls 32145->32146 32147 4147b9 32146->32147 32148 4034bd 5 API calls 32147->32148 32149 4147c2 32148->32149 32150 40e535 5 API calls 32149->32150 32151 4147d5 CreateWindowExW SendMessageW 32150->32151 32152 4034da 5 API calls 32151->32152 32153 414828 32152->32153 32154 4034bd 5 API calls 32153->32154 32155 414832 32154->32155 32156 4034da 5 API calls 32155->32156 32157 41483c 32156->32157 32158 4034da 5 API calls 32157->32158 32159 414846 32158->32159 32160 4034da 5 API calls 32159->32160 32161 41484f 32160->32161 32162 4034bd 5 API calls 32161->32162 32163 414858 32162->32163 32164 40e535 5 API calls 32163->32164 32165 41486b CreateWindowExW SendMessageW 32164->32165 32407 41390d GetDlgItem ShowWindow 32165->32407 32169 40fdd3 __EH_prolog3 32168->32169 32170 40e337 8 API calls 32169->32170 32171 40fddd GetSysColorBrush 32170->32171 32172 408273 76 API calls 32171->32172 32173 40fe0f 32172->32173 32174 4034bd 5 API calls 32173->32174 32175 40fe16 32174->32175 32176 4034da 5 API calls 32175->32176 32177 40fe20 32176->32177 32178 4034bd 5 API calls 32177->32178 32179 40fe2a 32178->32179 32180 40e535 5 API calls 32179->32180 32181 40fe31 32180->32181 32182 4034da 5 API calls 32181->32182 32183 40fe3f 32182->32183 32184 4034da 5 API calls 32183->32184 32185 40fe49 32184->32185 32186 4034da 5 API calls 32185->32186 32187 40fe52 CreateWindowExW SendMessageW 32186->32187 32188 423d6a ctype 59 API calls 32187->32188 32189 40fe9e 32188->32189 32190 40fea5 GetWindowLongW 32189->32190 32191 40feba 32189->32191 32192 40febc SetWindowLongW SetWindowLongW 32190->32192 32191->32192 32484 40fd20 32192->32484 32195 4034da 5 API calls 32196 40feeb 32195->32196 32197 4034bd 5 API calls 32196->32197 32198 40fef4 32197->32198 32199 4034da 5 API calls 32198->32199 32200 40fefd 32199->32200 32201 40e535 5 API calls 32200->32201 32202 40ff0d CreateWindowExW SendMessageW 32201->32202 32203 423d6a ctype 59 API calls 32202->32203 32204 40ff54 32203->32204 32205 40ff75 32204->32205 32498 40faae 32204->32498 32207 40e535 5 API calls 32205->32207 32208 40ff82 32207->32208 32209 40e540 5 API calls 32208->32209 32210 40ff88 CreateWindowExW 32209->32210 32211 4034da 5 API calls 32210->32211 32212 40ffa6 32211->32212 32213 40e535 5 API calls 32212->32213 32214 40ffb5 CreateWindowExW 32213->32214 32531 41395b 32214->32531 32216 40ffd8 ctype 32216->31987 32218 413a54 __EH_prolog3_GS 32217->32218 32219 40e337 8 API calls 32218->32219 32220 413a64 GetSysColorBrush 32219->32220 32221 408273 76 API calls 32220->32221 32222 413a8f 32221->32222 32223 423d6a ctype 59 API calls 32222->32223 32224 413a96 32223->32224 32225 413ab3 32224->32225 32226 40faae 81 API calls 32224->32226 32227 41395b 7 API calls 32225->32227 32226->32225 32228 413abb 32227->32228 32229 40e535 5 API calls 32228->32229 32230 413ac8 32229->32230 32231 40e540 5 API calls 32230->32231 32232 413ace CreateWindowExW 32231->32232 32233 4034da 5 API calls 32232->32233 32234 413af2 32233->32234 32235 40e535 5 API calls 32234->32235 32236 413b01 CreateWindowExW 32235->32236 32237 4034bd 5 API calls 32236->32237 32238 413b1f 32237->32238 32239 4034da 5 API calls 32238->32239 32240 413b29 32239->32240 32241 4034bd 5 API calls 32240->32241 32242 413b32 32241->32242 32243 40e535 5 API calls 32242->32243 32244 413b39 32243->32244 32245 4034da 5 API calls 32244->32245 32246 413b44 32245->32246 32535 405bc7 CreateWindowExW 32246->32535 32248 413b66 32536 405bc7 CreateWindowExW 32248->32536 32250 413b89 32537 405bc7 CreateWindowExW 32250->32537 32252 413bac 32253 413bb2 SendMessageW SendMessageW 32252->32253 32253->32253 32254 413bdb 32253->32254 32255 439b38 6 API calls 32254->32255 32256 413be2 32255->32256 32256->31991 32258 413f19 __EH_prolog3 32257->32258 32259 40e337 8 API calls 32258->32259 32260 413f23 GetSysColorBrush 32259->32260 32261 408273 76 API calls 32260->32261 32262 413f53 32261->32262 32263 423d6a ctype 59 API calls 32262->32263 32264 413f5a 32263->32264 32265 413f77 32264->32265 32266 40faae 81 API calls 32264->32266 32267 4034da 5 API calls 32265->32267 32266->32265 32268 413f84 32267->32268 32269 4034bd 5 API calls 32268->32269 32270 413f8d 32269->32270 32271 4034da 5 API calls 32270->32271 32272 413f97 32271->32272 32273 4034bd 5 API calls 32272->32273 32274 413fa0 32273->32274 32275 40e535 5 API calls 32274->32275 32276 413fb0 CreateWindowExW SendMessageW 32275->32276 32277 41390d 7 API calls 32276->32277 32278 413ffb ctype 32277->32278 32278->31995 32280 413c44 __EH_prolog3 32279->32280 32281 40e337 8 API calls 32280->32281 32282 413c4e GetSysColorBrush 32281->32282 32283 408273 76 API calls 32282->32283 32284 413c7d 32283->32284 32285 423d6a ctype 59 API calls 32284->32285 32286 413c84 32285->32286 32287 413ca5 32286->32287 32288 40faae 81 API calls 32286->32288 32289 4034da 5 API calls 32287->32289 32288->32287 32290 413cb2 32289->32290 32291 4034bd 5 API calls 32290->32291 32292 413cbc 32291->32292 32293 4034da 5 API calls 32292->32293 32294 413cc8 32293->32294 32295 4034bd 5 API calls 32294->32295 32296 413cd1 32295->32296 32297 40e535 5 API calls 32296->32297 32298 413ce4 CreateWindowExW SendMessageW SendMessageW 32297->32298 32299 4034da 5 API calls 32298->32299 32300 413d2e 32299->32300 32301 4034bd 5 API calls 32300->32301 32302 413d37 32301->32302 32303 4034da 5 API calls 32302->32303 32304 413d41 32303->32304 32305 4034bd 5 API calls 32304->32305 32306 413d4a 32305->32306 32307 40e535 5 API calls 32306->32307 32308 413d5b CreateWindowExW SendMessageW 32307->32308 32309 41390d 7 API calls 32308->32309 32310 413da7 32309->32310 32311 40e535 5 API calls 32310->32311 32312 413db9 32311->32312 32313 40e540 5 API calls 32312->32313 32314 413dbf CreateWindowExW 32313->32314 32315 4034da 5 API calls 32314->32315 32316 413ddb 32315->32316 32317 40e535 5 API calls 32316->32317 32318 413dea CreateWindowExW 32317->32318 32319 413e09 ctype 32318->32319 32319->31999 32321 40f60b __EH_prolog3 32320->32321 32322 40e337 8 API calls 32321->32322 32323 40f615 32322->32323 32324 408273 76 API calls 32323->32324 32325 40f63f 32324->32325 32326 4034da 5 API calls 32325->32326 32327 40f64c 32326->32327 32328 4034bd 5 API calls 32327->32328 32329 40f656 32328->32329 32330 4034da 5 API calls 32329->32330 32331 40f660 32330->32331 32332 4034da 5 API calls 32331->32332 32333 40f66a 32332->32333 32334 4034da 5 API calls 32333->32334 32335 40f673 32334->32335 32336 4034bd 5 API calls 32335->32336 32337 40f67c 32336->32337 32338 40e535 5 API calls 32337->32338 32339 40f68f CreateWindowExW SendMessageW 32338->32339 32340 4034da 5 API calls 32339->32340 32341 40f6d7 32340->32341 32342 4034bd 5 API calls 32341->32342 32343 40f6e1 32342->32343 32344 4034da 5 API calls 32343->32344 32345 40f6eb 32344->32345 32346 4034da 5 API calls 32345->32346 32347 40f6f5 32346->32347 32348 4034da 5 API calls 32347->32348 32349 40f6fe 32348->32349 32350 4034bd 5 API calls 32349->32350 32351 40f707 32350->32351 32352 40e535 5 API calls 32351->32352 32353 40f71a CreateWindowExW SendMessageW 32352->32353 32354 4034da 5 API calls 32353->32354 32355 40f759 32354->32355 32356 4034bd 5 API calls 32355->32356 32357 40f763 32356->32357 32358 4034da 5 API calls 32357->32358 32359 40f76d 32358->32359 32360 4034da 5 API calls 32359->32360 32361 40f777 32360->32361 32362 4034da 5 API calls 32361->32362 32363 40f781 32362->32363 32364 4034bd 5 API calls 32363->32364 32365 40f78a 32364->32365 32366 40e535 5 API calls 32365->32366 32367 40f7a1 32366->32367 32538 405bc7 CreateWindowExW 32367->32538 32369 40f7c1 SendMessageW SendMessageW 32370 40e535 5 API calls 32369->32370 32371 40f7f5 32370->32371 32372 40e540 5 API calls 32371->32372 32373 40f7fb CreateWindowExW FindResourceExW 32372->32373 32374 40f829 32373->32374 32375 40f82d 32373->32375 32377 41390d 7 API calls 32374->32377 32376 405d6e 10 API calls 32375->32376 32376->32374 32378 40f84d ctype 32377->32378 32378->32003 32379->32005 32381 40e357 32380->32381 32382 40e3e8 32380->32382 32433 4034a0 32381->32433 32389 408273 32382->32389 32384 40e382 CreateFontW 32385 4034a0 5 API calls 32384->32385 32386 40e3b2 CreateFontW 32385->32386 32387 4034a0 5 API calls 32386->32387 32388 40e3dc CreateFontW 32387->32388 32388->32382 32390 4034da 5 API calls 32389->32390 32391 408285 32390->32391 32392 40e535 5 API calls 32391->32392 32393 408294 32392->32393 32436 40e49d 32393->32436 32395 4082a6 32396 423d6a ctype 59 API calls 32395->32396 32397 4082b0 32396->32397 32400 4082cc 32397->32400 32440 40e50e 32397->32440 32400->32061 32403 403e1d 59 API calls 32402->32403 32404 406c8d 32403->32404 32404->32076 32406 4040dd Mailbox 32405->32406 32406->32137 32479 4138c8 GetDlgItem 32407->32479 32410 4138c8 5 API calls 32411 413944 32410->32411 32412 4138c8 5 API calls 32411->32412 32413 413954 GetDlgItem ShowWindow 32412->32413 32413->32109 32415 4034da 5 API calls 32414->32415 32416 40e548 32415->32416 32417 40e50e 5 API calls 32416->32417 32418 40e54f CreateWindowExW FindResourceExW 32417->32418 32418->32121 32418->32122 32420 405d8c LockResource 32419->32420 32422 405d85 32419->32422 32421 405d9a SizeofResource 32420->32421 32420->32422 32421->32422 32423 405da9 GlobalAlloc 32421->32423 32422->32122 32423->32422 32424 405db8 GlobalLock 32423->32424 32424->32422 32425 405dc7 _memmove 32424->32425 32426 405dd1 GlobalUnlock CreateStreamOnHGlobal 32425->32426 32427 405df6 GdipAlloc 32426->32427 32428 405def GlobalFree 32426->32428 32427->32422 32429 405e02 32427->32429 32428->32427 32483 408227 GdipLoadImageFromStream 32429->32483 32431->32095 32432->32096 32434 40352d 4 API calls 32433->32434 32435 4034a8 MulDiv 32434->32435 32435->32384 32437 40e4c5 CreateWindowExW SetWindowLongW 32436->32437 32438 40e4ba 32436->32438 32437->32395 32474 40e40c 61 API calls 2 library calls 32438->32474 32441 4034da 5 API calls 32440->32441 32442 40e51a 32441->32442 32443 4034da 5 API calls 32442->32443 32444 40e523 32443->32444 32445 4034da 5 API calls 32444->32445 32446 4082c0 32445->32446 32447 413768 32446->32447 32448 40e337 8 API calls 32447->32448 32449 413788 32448->32449 32450 4034bd 5 API calls 32449->32450 32451 413795 32450->32451 32452 4034da 5 API calls 32451->32452 32453 41379f 32452->32453 32454 4034bd 5 API calls 32453->32454 32455 4137a8 32454->32455 32456 40e535 5 API calls 32455->32456 32457 4137b0 32456->32457 32458 40e535 5 API calls 32457->32458 32459 4137c1 32458->32459 32460 40e49d 63 API calls 32459->32460 32461 4137da 32460->32461 32475 405bc7 CreateWindowExW 32461->32475 32463 413809 32476 405bc7 CreateWindowExW 32463->32476 32465 413831 32477 405bc7 CreateWindowExW 32465->32477 32467 413858 32478 405bc7 CreateWindowExW 32467->32478 32469 413895 32470 41389b SendMessageW 32469->32470 32470->32470 32471 4138b3 32470->32471 32472 4233b1 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 6 API calls 32471->32472 32473 4138c2 32472->32473 32473->32400 32474->32437 32475->32463 32476->32465 32477->32467 32478->32469 32480 413901 ShowWindow 32479->32480 32481 4138dc ShowWindow SetWindowTextW KiUserCallbackDispatcher 32479->32481 32482 41390a 32480->32482 32481->32482 32482->32410 32483->32422 32534 439b89 32484->32534 32486 40fd2c FindResourceExW 32487 40fdb5 32486->32487 32488 40fd48 LoadResource 32486->32488 32490 439b38 6 API calls 32487->32490 32488->32487 32489 40fd55 LockResource 32488->32489 32489->32487 32492 40fd62 SizeofResource 32489->32492 32491 40fdc6 32490->32491 32491->32195 32492->32487 32493 40fd6f 32492->32493 32494 404113 59 API calls 32493->32494 32495 40fd8b 32494->32495 32496 4057a5 61 API calls 32495->32496 32497 40fd96 SetWindowTextW 32496->32497 32497->32487 32499 40e337 8 API calls 32498->32499 32500 40fac0 32499->32500 32501 4034a0 5 API calls 32500->32501 32502 40fade CreateFontW 32501->32502 32503 4034a0 5 API calls 32502->32503 32504 40fb0e CreateFontW 32503->32504 32505 4034da 5 API calls 32504->32505 32506 40fb35 32505->32506 32507 40e535 5 API calls 32506->32507 32508 40fb44 32507->32508 32509 40e49d 63 API calls 32508->32509 32510 40fb56 32509->32510 32511 4034da 5 API calls 32510->32511 32512 40fb63 32511->32512 32513 4034bd 5 API calls 32512->32513 32514 40fb6d 32513->32514 32515 4034da 5 API calls 32514->32515 32516 40fb76 32515->32516 32517 4034bd 5 API calls 32516->32517 32518 40fb7f 32517->32518 32519 40e535 5 API calls 32518->32519 32520 40fb91 CreateWindowExW SendMessageW 32519->32520 32521 4034da 5 API calls 32520->32521 32522 40fbcc 32521->32522 32523 4034bd 5 API calls 32522->32523 32524 40fbd5 32523->32524 32525 4034da 5 API calls 32524->32525 32526 40fbdf 32525->32526 32527 4034bd 5 API calls 32526->32527 32528 40fbe8 32527->32528 32529 40e535 5 API calls 32528->32529 32530 40fbf8 CreateWindowExW SendMessageW GetModuleHandleW LoadBitmapW 32529->32530 32530->32205 32532 41390d 7 API calls 32531->32532 32533 413976 32532->32533 32533->32216 32534->32486 32535->32248 32536->32250 32537->32252 32538->32369 32540 43bb30 FindCompleteObject CallCatchBlock FindMITargetTypeInstance FindVITargetTypeInstance 32539->32540 32541 43bb37 PMDtoOffset CallCatchBlock 32540->32541 32550 4243e4 58 API calls std::exception::exception 32540->32550 32541->32017 32543 43bbc4 32551 4274a2 RaiseException 32543->32551 32545 43bbd2 32545->32017 32546->32034 32547->32029 32548->32040 32549->32028 32550->32543 32551->32545 32553 408d58 __EH_prolog3 32552->32553 32564 409bba 32553->32564 32557 408da0 ctype 32557->31499 32559 408e04 __EH_prolog3 32558->32559 32560 423d6a ctype 59 API calls 32559->32560 32561 408e13 32560->32561 32563 408e23 ctype 32561->32563 32617 4391ae 66 API calls 7 library calls 32561->32617 32563->31501 32565 409bee 32564->32565 32566 423d6a ctype 59 API calls 32565->32566 32567 409bf5 32566->32567 32568 408d8e 32567->32568 32574 4391ae 66 API calls 7 library calls 32567->32574 32570 408f50 32568->32570 32571 408f5c __EH_prolog3 32570->32571 32575 409b21 32571->32575 32573 408f6f std::ios_base::_Ios_base_dtor ctype 32573->32557 32574->32568 32576 409b2d __EH_prolog3 32575->32576 32591 4393b0 32576->32591 32580 409b4e std::locale::_Getfacet 32581 409b61 32580->32581 32610 409aa6 94 API calls 4 library calls 32580->32610 32603 43940b 32581->32603 32583 409bb2 ctype 32583->32573 32585 409b71 32586 409b93 32585->32586 32611 4243e4 58 API calls std::exception::exception 32585->32611 32613 439180 59 API calls ctype 32586->32613 32588 409b85 32612 4274a2 RaiseException 32588->32612 32592 4393bf 32591->32592 32594 4393c8 32591->32594 32593 42e618 __lock 58 API calls 32592->32593 32595 409b37 32593->32595 32594->32595 32614 439a52 EnterCriticalSection 32594->32614 32597 4095f0 32595->32597 32598 409620 32597->32598 32599 4095fc 32597->32599 32598->32580 32600 4393b0 std::_Lockit::_Lockit 59 API calls 32599->32600 32601 409606 32600->32601 32602 43940b _tidy_global 2 API calls 32601->32602 32602->32598 32604 439411 32603->32604 32605 43941a 32603->32605 32615 42e782 LeaveCriticalSection 32604->32615 32609 43942d 32605->32609 32616 439a60 LeaveCriticalSection 32605->32616 32607 439418 32607->32583 32609->32583 32610->32585 32611->32588 32612->32586 32613->32581 32614->32595 32615->32607 32616->32609 32617->32563 32638 4261a0 32618->32638 32620 408342 EnterCriticalSection 32621 408367 CallCatchBlock 32620->32621 32621->31505 32639 408e82 32622->32639 32625 408f90 32626 408f9c __EH_prolog3_catch 32625->32626 32646 407fa4 32626->32646 32629 40910b ctype 32629->31509 32630 408fe5 32650 407ba0 32630->32650 32632 408f50 95 API calls 32631->32632 32633 40912c 32632->32633 32688 409145 32633->32688 32635 409137 32636 407f06 58 API calls 32635->32636 32637 40913e 32636->32637 32637->31511 32638->32620 32640 408ea5 32639->32640 32642 408ec6 32640->32642 32645 408f28 59 API calls 32640->32645 32643 4233b1 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 6 API calls 32642->32643 32644 4083d3 32643->32644 32644->32625 32645->32642 32647 407fb0 __EH_prolog3 32646->32647 32648 407fed ctype 32647->32648 32653 407f06 32647->32653 32648->32630 32659 438fc3 32650->32659 32652 407ba8 32652->32629 32654 407f91 32653->32654 32655 407f3e 32653->32655 32654->32648 32656 407fa4 58 API calls 32655->32656 32658 407f48 32656->32658 32657 407ba0 58 API calls 32657->32654 32658->32657 32660 43a91c 32659->32660 32663 428a8c 32660->32663 32668 428aa4 GetLastError 32663->32668 32665 428a92 32666 428a9f 32665->32666 32682 425bbd 58 API calls 3 library calls 32665->32682 32666->32652 32683 42754a 32668->32683 32670 428ab9 32671 428b07 SetLastError 32670->32671 32672 4260bf __calloc_crt 55 API calls 32670->32672 32671->32665 32673 428acc 32672->32673 32673->32671 32686 427569 TlsSetValue 32673->32686 32675 428ae0 32676 428ae6 32675->32676 32677 428afe 32675->32677 32687 428b13 58 API calls 4 library calls 32676->32687 32678 4233c0 _free 55 API calls 32677->32678 32681 428b04 32678->32681 32680 428aee GetCurrentThreadId 32680->32671 32681->32671 32684 427561 TlsGetValue 32683->32684 32685 42755d 32683->32685 32684->32670 32685->32670 32686->32675 32687->32680 32689 409151 __EH_prolog3_catch 32688->32689 32690 407fa4 58 API calls 32689->32690 32691 409163 32690->32691 32692 407ba0 58 API calls 32691->32692 32693 4091ed ctype 32692->32693 32693->32635 32695 410056 32694->32695 32696 41008a 32694->32696 32695->32696 32697 410062 32695->32697 32699 410074 32696->32699 32765 412f69 59 API calls 32696->32765 32697->32699 32764 412f69 59 API calls 32697->32764 32701 4233b1 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 6 API calls 32699->32701 32702 4100d8 32701->32702 32702->31520 32702->31521 32704 40650f _memset __EH_prolog3_GS 32703->32704 32705 406221 8 API calls 32704->32705 32706 40653c 32705->32706 32707 406603 GetTempPathW 32706->32707 32708 406544 SHGetFolderPathW 32706->32708 32710 40655a 32707->32710 32709 406564 32708->32709 32708->32710 32711 403e1d 59 API calls 32709->32711 32713 403e1d 59 API calls 32710->32713 32712 406576 32711->32712 32714 405457 59 API calls 32712->32714 32715 40662b 32713->32715 32717 40658b 32714->32717 32716 439b38 6 API calls 32715->32716 32718 406632 32716->32718 32719 406592 32717->32719 32720 406594 GetFileAttributesW 32717->32720 32727 406961 32718->32727 32719->32720 32721 4065a0 32720->32721 32721->32707 32722 4065cc 32721->32722 32723 403e1d 59 API calls 32722->32723 32724 4065de 32723->32724 32725 405457 59 API calls 32724->32725 32726 4065f2 32725->32726 32726->32715 32728 40696d __EH_prolog3_GS 32727->32728 32729 406500 64 API calls 32728->32729 32730 40697c 32729->32730 32731 403e1d 59 API calls 32730->32731 32732 40698c 32731->32732 32733 406857 60 API calls 32732->32733 32734 40699e 32733->32734 32735 439b38 6 API calls 32734->32735 32736 4069bc 32735->32736 32736->31530 32738 40e07d __EH_prolog3 32737->32738 32739 40e085 32738->32739 32740 4028ee 86 API calls 32738->32740 32741 40dd05 104 API calls 32739->32741 32742 40e0cd 32740->32742 32747 40e0a0 ctype 32741->32747 32743 423d6a ctype 59 API calls 32742->32743 32744 40e0d6 32743->32744 32745 40e12b 32744->32745 32766 40e2d0 59 API calls 32744->32766 32755 40e113 32745->32755 32747->31536 32748 40e0ef 32767 40e2d0 59 API calls 32748->32767 32751 40e103 32768 40e2d0 59 API calls 32751->32768 32752 40e14d 32752->32739 32754 40e161 32752->32754 32754->32747 32755->32745 32769 402ebf 15 API calls 2 library calls 32755->32769 32757 40dd60 32756->32757 32758 40dd99 32756->32758 32759 4085b7 100 API calls 32757->32759 32758->31536 32760 40dd6b 32759->32760 32761 40dd88 32760->32761 32770 40792f 58 API calls 3 library calls 32760->32770 32763 4083a2 97 API calls 32761->32763 32763->32758 32764->32699 32765->32699 32766->32748 32767->32751 32768->32755 32769->32752 32770->32761 32772 4149a6 __EH_prolog3_GS 32771->32772 32773 403dc1 59 API calls 32772->32773 32774 4149ba 32773->32774 32775 4149de 32774->32775 32776 4149d2 32774->32776 32777 403e1d 59 API calls 32775->32777 32778 4057a5 61 API calls 32776->32778 32779 4149dc 32777->32779 32778->32779 32780 439b38 6 API calls 32779->32780 32781 4149fc 32780->32781 32781->31544 32782->31556 32793 439b56 32783->32793 32785 414a23 FindWindowW SendMessageTimeoutW 32786 414a86 ctype 32785->32786 32787 414a4d 32785->32787 32786->31549 32788 4085b7 100 API calls 32787->32788 32789 414a5a 32788->32789 32790 414a77 32789->32790 32794 40792f 58 API calls 3 library calls 32789->32794 32792 4083a2 97 API calls 32790->32792 32792->32786 32793->32785 32794->32790 32795->31564 32797 40553c 32796->32797 32798 405540 32797->32798 32799 405562 32797->32799 32807 40569b 59 API calls 32798->32807 32800 405572 32799->32800 32801 4055ea 32799->32801 32806 40555d 32800->32806 32808 40476a 59 API calls 32800->32808 32809 438f67 59 API calls 2 library calls 32801->32809 32806->31580 32807->32806 32808->32806 32811 405499 32810->32811 32812 4054bb 32811->32812 32813 40549d 32811->32813 32814 405521 32812->32814 32815 4054cb 32812->32815 32821 4055f5 59 API calls 32813->32821 32823 438f67 59 API calls 2 library calls 32814->32823 32820 4054b9 32815->32820 32822 40476a 59 API calls 32815->32822 32820->31584 32821->32820 32822->32820 32824 402979 32825 402988 CallCatchBlock 32824->32825 32826 401cd0 4 API calls 32825->32826 32827 402998 32826->32827 32828 401334 WaitForSingleObject 32827->32828 32831 4029b5 32828->32831 32829 4029ec 32832 4029f6 32829->32832 32834 402a1a LocalAlloc ObtainUserAgentString 32829->32834 32831->32829 32831->32832 32882 401f0e 7 API calls 3 library calls 32831->32882 32886 402db8 237 API calls 32832->32886 32833 402da0 CallCatchBlock 32836 402a4d 32834->32836 32872 402aaa 32836->32872 32839 402a83 32883 401367 LocalFlags LocalFree 32839->32883 32841 402a8b 32841->32832 32876 401451 32841->32876 32844 402b09 32845 401451 LocalAlloc 32844->32845 32846 402b61 WinHttpOpenRequest 32845->32846 32846->32832 32847 402b8a WinHttpSetOption 32846->32847 32848 402bd1 32847->32848 32849 402bab 32847->32849 32848->32832 32850 402be8 WinHttpSetStatusCallback 32848->32850 32849->32848 32852 402bbc WinHttpSetOption 32849->32852 32850->32832 32851 402c0a 32850->32851 32853 402c16 WinHttpSetOption 32851->32853 32858 402c29 32851->32858 32852->32848 32853->32858 32854 402ca7 32855 402d3f 32854->32855 32856 402cd8 WinHttpSetOption 32854->32856 32857 402ce9 32854->32857 32862 402d5f WinHttpSendRequest 32855->32862 32885 40138b FormatMessageW 32855->32885 32856->32857 32859 402d00 32857->32859 32860 402cf2 WinHttpSetOption 32857->32860 32858->32832 32858->32854 32861 402c84 32858->32861 32864 402d19 32859->32864 32865 402d09 WinHttpSetOption 32859->32865 32860->32859 32861->32832 32884 40164a CloseHandle 32861->32884 32862->32832 32867 402d2c 32864->32867 32868 402d1f WinHttpSetOption 32864->32868 32865->32864 32866 402d59 32866->32862 32867->32855 32870 402d32 WinHttpSetOption 32867->32870 32868->32867 32870->32855 32871 402c95 32871->32854 32873 402ab0 32872->32873 32874 402a6d WinHttpOpen 32872->32874 32887 401367 LocalFlags LocalFree 32873->32887 32874->32839 32874->32841 32877 401460 32876->32877 32878 40145c WinHttpConnect 32876->32878 32879 401468 32877->32879 32878->32832 32878->32844 32888 401437 LocalAlloc 32879->32888 32881 40147b _memmove 32881->32878 32882->32829 32883->32841 32884->32871 32885->32866 32886->32833 32887->32874 32888->32881 32889 411cfb 32890 4122d9 32889->32890 32891 411d5f 32889->32891 32894 412302 32890->32894 32895 41270b 32890->32895 32892 411d65 32891->32892 32893 4121a8 32891->32893 32898 412171 32892->32898 32899 411d6e 32892->32899 32900 4121b2 32893->32900 32901 411eb5 32893->32901 32902 4124c4 32894->32902 32912 412310 32894->32912 32913 412443 32894->32913 32896 412715 32895->32896 32897 411e9c 32895->32897 32903 4085b7 100 API calls 32896->32903 33109 4108a1 60 API calls 32897->33109 32906 41218b char_traits 32898->32906 33125 412ee5 59 API calls 3 library calls 32898->33125 32907 412165 PostQuitMessage 32899->32907 32908 411d75 32899->32908 32910 411ea6 32900->32910 32911 4121b9 32900->32911 33112 41086d 163 API calls 32901->33112 32904 412531 32902->32904 32938 4124ce 32902->32938 32914 412723 32903->32914 32929 41254a IsDlgButtonChecked 32904->32929 33066 4126ca 32904->33066 32941 40431d 59 API calls 32906->32941 32949 411def 32907->32949 32917 411f5d 32908->32917 32918 411d7e 32908->32918 33110 410839 163 API calls 32910->33110 32911->32897 32931 4121f8 32911->32931 32948 4085b7 100 API calls 32911->32948 32920 412317 32912->32920 32921 4123cf 32912->32921 32922 43bb24 59 API calls 32913->32922 32923 412747 32914->32923 33145 413041 95 API calls 3 library calls 32914->33145 32915 411ea1 32915->32949 32930 43bb24 59 API calls 32917->32930 32926 411d89 32918->32926 32927 411f2d 32918->32927 32920->32949 32967 412366 32920->32967 32924 4123d9 32921->32924 32925 41242e 32921->32925 32933 412462 32922->32933 32939 412419 32924->32939 32940 4123dc 32924->32940 33067 41154f 32925->33067 32942 411d90 32926->32942 32943 411ebf 32926->32943 32935 411f53 32927->32935 32936 411f35 32927->32936 32928 411eab 33111 411c8d 207 API calls 32928->33111 32945 41255a 32929->32945 32946 41255f 32929->32946 32947 411f7d 32930->32947 32950 412260 32931->32950 32966 4085b7 100 API calls 32931->32966 32932 411dfb CallWindowProcW 32952 411e08 32932->32952 32933->32949 32953 41246d ShowWindow 32933->32953 33117 41086d 163 API calls 32935->33117 32955 411f49 32936->32955 32956 411f38 32936->32956 32938->32949 32957 41002e 59 API calls 32938->32957 33135 41172e 204 API calls __EH_prolog3_GS 32939->33135 32959 412409 32940->32959 32960 4123df 32940->32960 32941->32949 32942->32901 32942->32949 32976 411da1 32942->32976 32943->32901 32963 411ec5 32943->32963 33137 406f68 184 API calls 3 library calls 32945->33137 33138 406d16 108 API calls __EH_prolog3_GS 32946->33138 32947->32952 32978 43bb24 59 API calls 32947->32978 32964 4121d1 32948->32964 32949->32932 33128 4135a4 83 API calls vswprintf 32950->33128 32968 4233b1 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 6 API calls 32952->32968 33136 412cbe _memmove 32953->33136 32954 4126f4 PostMessageW 32954->32949 33116 410839 163 API calls 32955->33116 32956->32949 32972 411f3f 32956->32972 32957->32949 33134 411816 245 API calls 2 library calls 32959->33134 32974 4123e2 32960->32974 32975 4123f9 32960->32975 32979 411f23 32963->32979 32980 411ec8 32963->32980 32964->32931 33126 413041 95 API calls 3 library calls 32964->33126 32982 412239 32966->32982 33130 417ac5 186 API calls 3 library calls 32967->33130 32984 411e28 32968->32984 32971 41229d 32971->32890 32994 4085b7 100 API calls 32971->32994 33115 4108a1 60 API calls 32972->33115 32974->32949 33132 411a33 260 API calls 2 library calls 32974->33132 33133 41190c 296 API calls __EH_prolog3_GS 32975->33133 32976->32910 32987 411da8 32976->32987 32977 41256b 33022 412599 32977->33022 33139 406d16 108 API calls __EH_prolog3_GS 32977->33139 32989 411fa8 32978->32989 33114 410839 163 API calls 32979->33114 32980->32897 32990 411ecb 32980->32990 32982->32950 33127 413041 95 API calls 3 library calls 32982->33127 32985 4124aa ShowWindow 32985->32902 32987->32897 32996 411daf 32987->32996 32998 411ff4 ShowWindow 32989->32998 33005 406bfe 59 API calls 32989->33005 32999 411f04 32990->32999 33006 4085b7 100 API calls 32990->33006 32992 412372 33001 414a8c 59 API calls 32992->33001 33002 4122b2 32994->33002 33003 411db2 32996->33003 33031 411e2e 32996->33031 33007 4120bc 32998->33007 33008 41200e 32998->33008 33009 41002e 59 API calls 32999->33009 33010 41237e 33001->33010 33002->32890 33129 40792f 58 API calls 3 library calls 33002->33129 33011 4085b7 100 API calls 33003->33011 33004 41258f 33013 406203 GetFileAttributesW 33004->33013 33014 411fbb 33005->33014 33015 411edd 33006->33015 33012 4120e5 33007->33012 33122 403032 9 API calls 2 library calls 33007->33122 33118 41079b 171 API calls __EH_prolog3_GS 33008->33118 33009->32949 33017 408336 EnterCriticalSection 33010->33017 33019 411dbd 33011->33019 33123 40754f 69 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 33012->33123 33013->33022 33036 411fd5 MessageBoxW 33014->33036 33037 412028 33014->33037 33015->32999 33113 413041 95 API calls 3 library calls 33015->33113 33024 41238c 33017->33024 33026 411dde 33019->33026 33108 413041 95 API calls 3 library calls 33019->33108 33022->33066 33140 406d16 108 API calls __EH_prolog3_GS 33022->33140 33023 412019 33119 411196 191 API calls 33023->33119 33131 416014 59 API calls 3 library calls 33024->33131 33035 4083a2 97 API calls 33026->33035 33027 4120d3 33034 401cd0 4 API calls 33027->33034 33041 41002e 59 API calls 33031->33041 33032 4123a6 33043 4123b5 LeaveCriticalSection 33032->33043 33044 4123bf 33032->33044 33045 4120da 33034->33045 33035->32949 33036->32952 33046 411ff2 33036->33046 33040 406bfe 59 API calls 33037->33040 33038 41212f 33038->32949 33042 412159 DestroyWindow 33038->33042 33039 412023 33039->32952 33047 412034 33040->33047 33041->32949 33042->32949 33043->33044 33048 4103d1 163 API calls 33044->33048 33045->33012 33051 403086 7 API calls 33045->33051 33046->32998 33120 40814f 83 API calls vswprintf 33047->33120 33048->32915 33049 4120ef 33049->33038 33124 410750 59 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 33049->33124 33050 4125ff char_traits 33059 41263d char_traits 33050->33059 33141 406d16 108 API calls __EH_prolog3_GS 33050->33141 33051->33012 33053 412054 33056 412068 MessageBoxW 33053->33056 33056->32998 33057 41208c 33056->33057 33058 43bb24 59 API calls 33057->33058 33060 4120a7 33058->33060 33059->33066 33142 406d16 108 API calls __EH_prolog3_GS 33059->33142 33060->32952 33121 410839 163 API calls 33060->33121 33062 4126b2 33143 406a19 129 API calls 3 library calls 33062->33143 33144 410750 59 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 33066->33144 33068 41155e __EH_prolog3_GS 33067->33068 33069 411565 33068->33069 33070 4116b8 char_traits 33068->33070 33071 411585 33069->33071 33072 40532c 132 API calls 33069->33072 33074 40431d 59 API calls 33070->33074 33073 41002e 59 API calls 33071->33073 33075 41157b 33072->33075 33076 411593 33073->33076 33077 4116e2 33074->33077 33146 410615 33075->33146 33079 406bfe 59 API calls 33076->33079 33080 43bb24 59 API calls 33077->33080 33084 41159c 33079->33084 33082 411703 33080->33082 33083 41170c 33082->33083 33107 411683 33082->33107 33153 413e0c 12 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 33083->33153 33085 4116b1 33084->33085 33086 4115b7 33084->33086 33152 411535 131 API calls 33085->33152 33089 406bfe 59 API calls 33086->33089 33088 439b38 6 API calls 33090 41172d 33088->33090 33092 4115bf 33089->33092 33090->32949 33093 405427 59 API calls 33092->33093 33094 4115d0 33093->33094 33095 43bb24 59 API calls 33094->33095 33096 411622 33095->33096 33097 411645 33096->33097 33098 411629 33096->33098 33099 403e1d 59 API calls 33097->33099 33150 413e0c 12 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 33098->33150 33101 411652 33099->33101 33151 406c94 65 API calls __EH_prolog3_GS 33101->33151 33103 411660 33104 406be2 59 API calls 33103->33104 33105 411671 33104->33105 33106 40e071 139 API calls 33105->33106 33106->33107 33107->33088 33108->33026 33109->32915 33110->32928 33111->32949 33112->32949 33113->32999 33114->32949 33115->32915 33116->32949 33117->32949 33118->33023 33119->33039 33120->33053 33121->32952 33122->33027 33123->33049 33124->33038 33125->32906 33126->32931 33127->32950 33128->32971 33129->32890 33130->32992 33131->33032 33132->32949 33133->32915 33134->32949 33135->32949 33136->32985 33137->32946 33138->32977 33139->33004 33140->33050 33141->33059 33142->33062 33143->33066 33144->32954 33145->32923 33147 410632 ShowWindow 33146->33147 33148 41062d 33146->33148 33154 40f85a 33148->33154 33150->33097 33151->33103 33152->33107 33153->33107 33174 439b56 33154->33174 33156 40f869 GetDlgItem SetWindowTextW 33157 40f8ca GetDlgItem SetWindowTextW 33156->33157 33158 40f88e 33156->33158 33159 40f920 GetDlgItem ShowWindow 33157->33159 33160 40f8e1 33157->33160 33161 4085b7 100 API calls 33158->33161 33163 40f93b ctype 33159->33163 33162 4085b7 100 API calls 33160->33162 33164 40f89b 33161->33164 33165 40f8ee 33162->33165 33163->33147 33166 40f8b9 33164->33166 33175 40792f 58 API calls 3 library calls 33164->33175 33169 40f90f 33165->33169 33176 40792f 58 API calls 3 library calls 33165->33176 33168 4083a2 97 API calls 33166->33168 33170 40f8c8 33168->33170 33172 4083a2 97 API calls 33169->33172 33170->33157 33173 40f91e 33172->33173 33173->33159 33174->33156 33175->33166 33176->33169 33177 4027dc 33178 4027e8 CallCatchBlock 33177->33178 33179 4032d7 2 API calls 33178->33179 33180 4027ed 33179->33180 33181 4027f5 WinHttpQueryOption 33180->33181 33182 40287a CallCatchBlock 33180->33182 33183 40281f 33181->33183 33184 40281a 33181->33184 33186 401334 WaitForSingleObject 33183->33186 33188 402834 33183->33188 33185 401cd0 4 API calls 33184->33185 33185->33183 33186->33188 33187 40286e 33259 402888 6 API calls 33187->33259 33188->33187 33191 402216 33188->33191 33192 402225 33191->33192 33194 402254 33192->33194 33195 402308 33192->33195 33256 402260 @_EH4_CallFilterFunc@8 33192->33256 33197 4022d3 33194->33197 33201 40225d 33194->33201 33194->33256 33198 402329 33195->33198 33199 4025ce 33195->33199 33195->33256 33271 401367 LocalFlags LocalFree 33197->33271 33202 402334 33198->33202 33203 4024b7 33198->33203 33287 4018b3 LocalFlags LocalFree LocalAlloc WinHttpQueryHeaders WinHttpQueryHeaders 33199->33287 33201->33256 33270 401367 LocalFlags LocalFree 33201->33270 33207 402371 33202->33207 33208 40233b 33202->33208 33216 4024f2 33203->33216 33217 4024d4 33203->33217 33206 4022ca 33215 401451 LocalAlloc 33206->33215 33213 402392 33207->33213 33214 4023b3 SetLastError 33207->33214 33210 402342 33208->33210 33211 402363 33208->33211 33209 4025f0 33288 4018b3 LocalFlags LocalFree LocalAlloc WinHttpQueryHeaders WinHttpQueryHeaders 33209->33288 33219 40234d WinHttpReceiveResponse 33210->33219 33210->33256 33260 40215f 33211->33260 33272 4015ba 68 API calls 2 library calls 33213->33272 33223 4023cb 33214->33223 33215->33256 33228 402505 FlushFileBuffers 33216->33228 33229 40250c 33216->33229 33218 4024d5 WinHttpReadData 33217->33218 33218->33256 33219->33256 33221 402602 33224 40261c VarI4FromStr 33221->33224 33225 40262f 33221->33225 33227 4024a5 GetLastError 33223->33227 33234 4023db WriteFile 33223->33234 33224->33225 33230 402641 33225->33230 33231 402633 VarUI8FromStr 33225->33231 33226 402397 33232 4023b1 33226->33232 33233 40239e GetLastError 33226->33233 33236 40252b 33227->33236 33228->33229 33273 4016ee 13 API calls 2 library calls 33229->33273 33237 4026a1 33230->33237 33289 4018b3 LocalFlags LocalFree LocalAlloc WinHttpQueryHeaders WinHttpQueryHeaders 33230->33289 33231->33230 33232->33214 33233->33236 33234->33227 33238 4023f6 33234->33238 33274 40205c 33236->33274 33241 402745 33237->33241 33243 40277e 33237->33243 33238->33227 33244 4023ff 33238->33244 33239 402514 33245 402537 33239->33245 33246 40251d GetLastError 33239->33246 33251 40205c 232 API calls 33241->33251 33291 4027a3 LocalFlags LocalFree 33243->33291 33254 4024a3 33244->33254 33255 40278c WinHttpQueryDataAvailable 33244->33255 33244->33256 33286 4025c0 CloseHandle LocalFlags LocalFree CloseHandle UnmapViewOfFile 33245->33286 33246->33236 33247 40265a 33248 402662 lstrcmpiW 33247->33248 33249 402678 33247->33249 33248->33249 33249->33237 33290 4018b3 LocalFlags LocalFree LocalAlloc WinHttpQueryHeaders WinHttpQueryHeaders 33249->33290 33251->33256 33253 40278a 33253->33255 33254->33218 33255->33256 33292 43b7b8 6 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 33256->33292 33257 4025bb 33257->33256 33259->33182 33293 4261a0 33260->33293 33262 40216b LocalAlloc 33264 402189 33262->33264 33294 4013bb 33264->33294 33265 4021ce 33266 40205c 232 API calls 33265->33266 33267 4021e3 33266->33267 33299 4021fa LocalFlags LocalFree LocalFree 33267->33299 33269 4021ef CallCatchBlock 33269->33256 33270->33206 33271->33206 33272->33226 33273->33239 33275 402068 CallCatchBlock 33274->33275 33276 4020a0 Sleep SetEvent 33275->33276 33278 4020c0 33275->33278 33277 402157 CallCatchBlock 33276->33277 33277->33256 33278->33277 33280 4013bb 2 API calls 33278->33280 33281 402102 33278->33281 33279 402138 33279->33277 33282 40214e LocalFree 33279->33282 33280->33281 33300 405242 33281->33300 33308 415938 33281->33308 33366 40def8 33281->33366 33282->33277 33286->33257 33287->33209 33288->33221 33289->33247 33290->33237 33291->33253 33293->33262 33295 4013c7 CallCatchBlock 33294->33295 33296 4013ec FormatMessageW 33295->33296 33297 4013df GetModuleHandleW 33295->33297 33298 401422 CallCatchBlock 33296->33298 33297->33296 33298->33265 33299->33269 33301 405251 33300->33301 33302 40527f 33300->33302 33303 401cd0 4 API calls 33301->33303 33302->33279 33304 405259 33303->33304 33305 405264 InterlockedDecrement 33304->33305 33306 403086 7 API calls 33304->33306 33305->33302 33307 405273 SetEvent 33305->33307 33306->33305 33307->33302 33309 415983 33308->33309 33310 4159df 33308->33310 33314 4085b7 100 API calls 33309->33314 33328 4159da 33309->33328 33390 40a036 59 API calls 2 library calls 33310->33390 33312 4159f6 33391 40b406 176 API calls __EH_prolog3_catch_GS 33312->33391 33313 4233b1 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 6 API calls 33316 415d37 33313->33316 33317 415998 33314->33317 33316->33279 33319 4159bc 33317->33319 33389 40792f 58 API calls 3 library calls 33317->33389 33318 415a15 33392 40a2a7 62 API calls 2 library calls 33318->33392 33322 4083a2 97 API calls 33319->33322 33324 4159d0 33322->33324 33323 415a2d 33325 403e1d 59 API calls 33323->33325 33326 414a14 104 API calls 33324->33326 33327 415a46 33325->33327 33326->33328 33329 403dc1 59 API calls 33327->33329 33328->33313 33330 415a5f 33329->33330 33393 41685f 59 API calls 4 library calls 33330->33393 33332 415aac 33394 417ed0 59 API calls __EH_prolog3_GS 33332->33394 33334 415ac1 33335 41499a 61 API calls 33334->33335 33336 415ad7 33335->33336 33395 4188da 117 API calls 33336->33395 33338 415afa Mailbox 33396 40a036 59 API calls 2 library calls 33338->33396 33340 415b89 33341 415bf2 33340->33341 33342 415b9d 33340->33342 33398 414bce 114 API calls 2 library calls 33341->33398 33344 414a14 104 API calls 33342->33344 33346 415ba7 33344->33346 33345 415c3a 33347 415c85 EnterCriticalSection 33345->33347 33348 415c3f 33345->33348 33349 4085b7 100 API calls 33346->33349 33400 416014 59 API calls 3 library calls 33347->33400 33350 414a14 104 API calls 33348->33350 33351 415bb5 33349->33351 33354 415c49 33350->33354 33355 415bd9 33351->33355 33397 40792f 58 API calls 3 library calls 33351->33397 33353 415ca0 33401 404696 59 API calls 33353->33401 33357 4085b7 100 API calls 33354->33357 33359 4083a2 97 API calls 33355->33359 33361 415c54 33357->33361 33359->33328 33360 415cb5 LeaveCriticalSection 33362 414a14 104 API calls 33360->33362 33363 415c72 33361->33363 33399 40792f 58 API calls 3 library calls 33361->33399 33362->33328 33365 4083a2 97 API calls 33363->33365 33365->33328 33367 40df31 33366->33367 33376 40dfe2 __time64 33366->33376 33368 40df34 33367->33368 33369 40df6b CoInitializeEx 33367->33369 33371 40dd05 104 API calls 33368->33371 33379 40df5e 33368->33379 33370 40df82 33369->33370 33402 40ddaf 111 API calls __EH_prolog3_GS 33370->33402 33373 40df4a 33371->33373 33378 401cd0 4 API calls 33373->33378 33374 40dd05 104 API calls 33374->33379 33376->33374 33376->33379 33377 40dfa6 33380 40dd05 104 API calls 33377->33380 33381 40df53 33378->33381 33379->33279 33382 40dfbc 33380->33382 33381->33379 33384 403086 7 API calls 33381->33384 33383 401cd0 4 API calls 33382->33383 33385 40dfc7 33383->33385 33384->33379 33386 40dfd2 33385->33386 33387 403086 7 API calls 33385->33387 33388 40dfda CoUninitialize 33386->33388 33387->33386 33388->33379 33389->33319 33390->33312 33391->33318 33392->33323 33393->33332 33394->33334 33395->33338 33396->33340 33397->33355 33398->33345 33399->33363 33400->33353 33401->33360 33402->33377
                                                                  APIs
                                                                  • CallWindowProcW.USER32(?,?,00000003,7055389B,7055389B), ref: 00411E02
                                                                  • MessageBoxW.USER32(00447640,00447600,00000004,00000001), ref: 00411FE7
                                                                  • ShowWindow.USER32(00000000,?,?,?,?,?,?,7055389B), ref: 00411FFB
                                                                  • MessageBoxW.USER32(00447750,?,00000004,00000001), ref: 0041207D
                                                                  • DestroyWindow.USER32(?,?,?,?,?,?,?,7055389B), ref: 0041215A
                                                                  • PostQuitMessage.USER32(00000000), ref: 00412166
                                                                  • char_traits.LIBCPMT ref: 00412191
                                                                  • LeaveCriticalSection.KERNEL32(?), ref: 004123B9
                                                                  • ShowWindow.USER32(?,00000000,?,7055389B), ref: 0041248F
                                                                  • ShowWindow.USER32(?,00000005,?,0068C430,?,7055389B), ref: 004124BD
                                                                  • IsDlgButtonChecked.USER32(?,00000003), ref: 0041254F
                                                                  • char_traits.LIBCPMT ref: 00412618
                                                                  • char_traits.LIBCPMT ref: 00412647
                                                                  • PostMessageW.USER32(00000010,00000000,00000000,7055389B), ref: 00412700
                                                                    • Part of subcall function 004085B7: __EH_prolog3.LIBCMT ref: 004085BE
                                                                    • Part of subcall function 00413041: __EH_prolog3_catch.LIBCMT ref: 00413048
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: Window$Message$Showchar_traits$Post$ButtonCallCheckedCriticalDestroyH_prolog3H_prolog3_catchLeaveProcQuitSection
                                                                  • String ID: .tor$.torrent$8Ui$Bad partner index$Can't printf packet$HsD$Unknown message type in WM_LICENSE_WINDOW$Unknown message type in WM_OPTIONS_WINDOW$Unknown message type in WM_PARTNER_WINDOW$Unknown message type in WM_PROGRESS_WINDOW$finish$rg%ib%io%iv%i$x6E$qD
                                                                  • API String ID: 665256869-1879039627
                                                                  • Opcode ID: a07d09f1dcb187c5757040072c1437c2faa3bf4e08f83b37e0ee4dca3b7120e8
                                                                  • Instruction ID: 33eadd8d330f0ebdc9b208a5839545f040f049dd7a3d6ca243191253dd2364db
                                                                  • Opcode Fuzzy Hash: a07d09f1dcb187c5757040072c1437c2faa3bf4e08f83b37e0ee4dca3b7120e8
                                                                  • Instruction Fuzzy Hash: E042FF70204341ABD734EF24DD82BEA77A1EB84305F10052FF645972E2DB78AA95CB5E

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 423 412753-41277c call 405c87 426 412782-412785 423->426 427 412955-412962 CoInitializeEx 423->427 426->427 430 41278b-41279a call 423ff4 426->430 428 4129a2-4129fa call 411306 call 406203 call 4040cd call 406be2 call 4040cd 427->428 429 412964-41297b call 4085b7 427->429 462 4129fc-412a0d 428->462 463 412a0f-412a23 call 407617 428->463 438 41297d-412989 call 40792f 429->438 439 41298e-41299d call 4083a2 429->439 430->427 440 4127a0-412950 call 406b6c call 4149fd call 406bfe call 406be2 call 405427 call 405457 * 2 call 412ff5 call 405457 * 2 call 412ff5 call 405457 call 412ff5 call 4040cd * 12 MessageBoxW call 4040cd 430->440 438->439 450 412bf7-412c0b call 4233b1 439->450 567 412bf5 440->567 465 412a34-412a56 call 40532c 462->465 468 412a28-412a2e 463->468 473 412a77-412a8a GdiplusStartup 465->473 474 412a58-412a71 465->474 468->465 475 412ac9-412af4 call 414a8c call 4028ee call 4108da 473->475 476 412a8c-412aa3 call 4085b7 473->476 474->473 497 412b27-412b3c call 410666 call 414a8c call 414b0b 475->497 498 412af6-412b07 call 4085b7 475->498 484 412aa5-412ab1 call 40792f 476->484 485 412ab6-412ac2 call 4083a2 476->485 484->485 485->475 519 412b54-412b60 KiUserCallbackDispatcher 497->519 506 412b17-412b20 call 4083a2 498->506 507 412b09-412b12 call 40792f 498->507 506->497 507->506 521 412b62-412b74 GdiplusShutdown 519->521 522 412b3e-412b4e TranslateMessage DispatchMessageW 519->522 524 412b76-412b77 521->524 525 412b9d-412ba9 call 40532c 521->525 522->519 527 412b79-412b7a 524->527 528 412b8a-412b9b call 40532c 524->528 540 412bae-412bb0 call 417ac5 525->540 531 412bb5-412bbc 527->531 532 412b7c-412b88 call 40532c 527->532 528->540 536 412bca-412bdf call 41079b call 408412 call 414a8c 531->536 537 412bbe-412bc5 call 40532c 531->537 532->531 558 412be1-412be6 call 403032 536->558 559 412beb-412bf0 call 414a8c call 414aa3 536->559 537->536 540->531 558->559 559->567 567->450
                                                                  APIs
                                                                    • Part of subcall function 00405C87: __EH_prolog3_GS.LIBCMT ref: 00405C8E
                                                                    • Part of subcall function 00405C87: StrCmpNA.SHLWAPI(http://tfile.me/forum/download.php?id=706491&ak=11xxxxxxxx,###,00000003,00000064,00412778), ref: 00405C9F
                                                                    • Part of subcall function 00405C87: StrCmpNA.SHLWAPI(FreeSpacer_setup.exe.[tfile.ru].torrent.exe.torrent,###,00000003), ref: 00405D0F
                                                                  • _wcsstr.LIBCMT ref: 00412791
                                                                    • Part of subcall function 00406B6C: __EH_prolog3_GS.LIBCMT ref: 00406B73
                                                                    • Part of subcall function 00406BFE: char_traits.LIBCPMT ref: 00406C2C
                                                                    • Part of subcall function 00405427: char_traits.LIBCPMT ref: 00405436
                                                                    • Part of subcall function 00405457: char_traits.LIBCPMT ref: 00405468
                                                                  • MessageBoxW.USER32(00000000,?,Debug,00000000), ref: 0041293C
                                                                  • CoInitializeEx.COMBASE(00000000,00000002), ref: 0041295A
                                                                  • GdiplusStartup.GDIPLUS($C,00458B68,00000000,00000001,00000000,00000001,00000000), ref: 00412A82
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: char_traits$H_prolog3_$GdiplusInitializeMessageStartup_wcsstr
                                                                  • String ID: @yD$Can't init instance.$Can't initialize COM.$Can't startup gdi.$Debug$DyD$File $HyD$LhD$LyD$Xml $prf$$C$xD
                                                                  • API String ID: 477194047-138553265
                                                                  • Opcode ID: 5a1ca54444459b2d6b18834eefb528ca5effb46b6a2be1f65a90938802dee261
                                                                  • Instruction ID: c003cbd680389d117011cfd028a62eb46d96ef8adfd85da0382363bc62787e93
                                                                  • Opcode Fuzzy Hash: 5a1ca54444459b2d6b18834eefb528ca5effb46b6a2be1f65a90938802dee261
                                                                  • Instruction Fuzzy Hash: C7B1C271608240ABC324EF66DD55EEB37A8EF80344F10453FB14AA31D1EF786945CA5E

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 1025 403b58-403b85 CryptAcquireContextW 1026 403b87-403b95 CryptAcquireContextW 1025->1026 1027 403b9e-403bb4 CryptCreateHash 1025->1027 1026->1027 1030 403b97-403b99 1026->1030 1028 403bc2-403bcb 1027->1028 1029 403bb6-403bc0 CryptReleaseContext 1027->1029 1031 403bcd 1028->1031 1032 403bcf-403bdd CryptHashData 1028->1032 1029->1030 1033 403c7f-403c8f call 4233b1 1030->1033 1031->1032 1034 403bea-403c06 CryptGetHashParam 1032->1034 1035 403bdf 1032->1035 1037 403be2-403be8 CryptDestroyHash 1034->1037 1039 403c08-403c1b CryptDestroyHash CryptReleaseContext 1034->1039 1035->1037 1037->1029 1039->1030 1040 403c21-403c3b call 40400f 1039->1040 1043 403c3d-403c41 1040->1043 1044 403c43-403c45 1043->1044 1045 403c47 1043->1045 1046 403c49-403c5c 1044->1046 1045->1046 1047 403c62 1046->1047 1048 403c5e-403c60 1046->1048 1049 403c64-403c7b 1047->1049 1048->1049 1049->1043 1050 403c7d 1049->1050 1050->1033
                                                                  APIs
                                                                  • CryptAcquireContextW.ADVAPI32(?,00000000,00000000,00000001,00000000), ref: 00403B81
                                                                  • CryptAcquireContextW.ADVAPI32(?,00000000,00000000,00000001,00000008), ref: 00403B91
                                                                  • CryptCreateHash.ADVAPI32(?,00008003,00000000,00000000,?), ref: 00403BAC
                                                                  • CryptReleaseContext.ADVAPI32(?,00000000,?,?,00000000), ref: 00403BBA
                                                                  • CryptHashData.ADVAPI32(?,?,?,00000000), ref: 00403BD5
                                                                  • CryptDestroyHash.ADVAPI32(?,?,?,00000000), ref: 00403BE2
                                                                  • CryptGetHashParam.ADVAPI32(?,00000002,?,?,00000000,?,?,00000000), ref: 00403BFB
                                                                  • CryptDestroyHash.ADVAPI32(?,?,?,00000000), ref: 00403C08
                                                                  • CryptReleaseContext.ADVAPI32(?,00000000,?,?,00000000), ref: 00403C12
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: Crypt$Hash$Context$AcquireDestroyRelease$CreateDataParam
                                                                  • String ID: 0123456789abcdef
                                                                  • API String ID: 1661621369-1757737011
                                                                  • Opcode ID: 43045024b09dc7631611690433c13a50f0bbdab386900a4d703ddeef891f8c0d
                                                                  • Instruction ID: bc38debdc742b029609f526077eabf805d7697855b54a8378deaaef5b18a35ee
                                                                  • Opcode Fuzzy Hash: 43045024b09dc7631611690433c13a50f0bbdab386900a4d703ddeef891f8c0d
                                                                  • Instruction Fuzzy Hash: 6441C471A00208AFEB159FA8ED84DAF7BBDEF05749F10443AF441BB192D675AE05CB24

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 1074 405d6e-405d83 LoadResource 1075 405d85-405d87 1074->1075 1076 405d8c-405d98 LockResource 1074->1076 1077 405e1f-405e24 1075->1077 1076->1075 1078 405d9a-405da7 SizeofResource 1076->1078 1079 405dc3-405dc5 1078->1079 1080 405da9-405db6 GlobalAlloc 1078->1080 1082 405e1e 1079->1082 1080->1079 1081 405db8-405dc1 GlobalLock 1080->1081 1081->1079 1083 405dc7-405ded call 42cbb0 GlobalUnlock CreateStreamOnHGlobal 1081->1083 1082->1077 1086 405df6-405e00 GdipAlloc 1083->1086 1087 405def-405df0 GlobalFree 1083->1087 1088 405e02-405e08 call 408227 1086->1088 1089 405e0f-405e14 1086->1089 1087->1086 1093 405e0d 1088->1093 1091 405e16-405e18 1089->1091 1092 405e1c 1089->1092 1091->1092 1092->1082 1093->1089
                                                                  APIs
                                                                  • LoadResource.KERNEL32(00000000), ref: 00405D7B
                                                                  • LockResource.KERNEL32(00000000), ref: 00405D8D
                                                                  • SizeofResource.KERNEL32(00000000), ref: 00405D9D
                                                                  • GlobalAlloc.KERNEL32(00000002,00000000), ref: 00405DAC
                                                                  • GlobalLock.KERNEL32(00000000), ref: 00405DB9
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: Resource$GlobalLock$AllocLoadSizeof
                                                                  • String ID:
                                                                  • API String ID: 1996038147-0
                                                                  • Opcode ID: b004d87adf5ba2c39b8a5ee17eaeca9c4d6e5bdf3cde0c9e78690ccaf8f8f4bf
                                                                  • Instruction ID: 5ac23d2c3a7e5d83a8137c5d197287e9651326da28d63db20a9c5642a9519fd0
                                                                  • Opcode Fuzzy Hash: b004d87adf5ba2c39b8a5ee17eaeca9c4d6e5bdf3cde0c9e78690ccaf8f8f4bf
                                                                  • Instruction Fuzzy Hash: A5119370A00605BBDB105BB1FC4DE6F7ABCEF85741700403AF805E2291EA78CD019A78

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 1094 406633-406653 call 439b89 call 406221 1099 4066a3-4066c8 CoCreateInstance 1094->1099 1100 406655-406689 call 42c910 SHGetFolderPathW 1094->1100 1101 4067f6-40680f call 4085b7 1099->1101 1102 4066ce-4066d6 1099->1102 1108 40669a-4066a1 1100->1108 1109 40668b 1100->1109 1112 406821-406836 call 4083a2 call 403e1d 1101->1112 1113 406811-40681c call 40792f 1101->1113 1102->1101 1104 4066dc-4066fa 1102->1104 1115 406700-406708 1104->1115 1116 4067cd-4067e6 call 4085b7 1104->1116 1110 406690-406695 call 403e1d 1108->1110 1109->1110 1123 40684f-406856 call 439b38 1110->1123 1130 40683b-406847 1112->1130 1113->1112 1115->1116 1121 40670e-406722 1115->1121 1127 406755-40676b call 4083a2 call 403e1d 1116->1127 1128 4067ec-4067f1 1116->1128 1129 406726-406728 1121->1129 1144 406770-40677b 1127->1144 1133 40674a-406750 call 40792f 1128->1133 1134 40672a-406743 call 4085b7 1129->1134 1135 40678c-4067cb call 403e1d CoTaskMemFree call 403e4e call 4040cd 1129->1135 1130->1123 1136 406849-40684b 1130->1136 1133->1127 1134->1127 1146 406745 1134->1146 1135->1144 1136->1123 1144->1130 1147 406781-406787 1144->1147 1146->1133 1147->1130
                                                                  APIs
                                                                  • __EH_prolog3_GS.LIBCMT ref: 0040663D
                                                                    • Part of subcall function 00406221: _memset.LIBCMT ref: 00406242
                                                                    • Part of subcall function 00406221: VerSetConditionMask.KERNEL32(00000000,00000000,00000002,00000001), ref: 00406266
                                                                    • Part of subcall function 00406221: VerifyVersionInfoW.KERNEL32(0000011C,00000002,00000000), ref: 00406277
                                                                  • _memset.LIBCMT ref: 0040666B
                                                                  • CoTaskMemFree.OLE32(?,?), ref: 004067A3
                                                                    • Part of subcall function 004085B7: __EH_prolog3.LIBCMT ref: 004085BE
                                                                  • SHGetFolderPathW.SHELL32(00000000,0000001C,00000000,00000000,?), ref: 0040667F
                                                                    • Part of subcall function 00403E1D: char_traits.LIBCPMT ref: 00403E36
                                                                  • CoCreateInstance.OLE32(0043F4F0,00000000,00000001,004468FC,?,000002EC,00411331,itorrent\itorrent.exe,0000003C,00411946,0000006C,00412404,7055389B), ref: 004066C0
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: _memset$ConditionCreateFolderFreeH_prolog3H_prolog3_InfoInstanceMaskPathTaskVerifyVersionchar_traits
                                                                  • String ID: Can't get folder path$Can't get path$Can't get path manager
                                                                  • API String ID: 4026707909-2805621233
                                                                  • Opcode ID: 81dcc16906efb652ea751b207e3a15f3806304d20ab782840d7ff05f67d28757
                                                                  • Instruction ID: c01d32105f18e8912d9fb6099837e8e123656b14f71b8509aab5ed271e7fbad6
                                                                  • Opcode Fuzzy Hash: 81dcc16906efb652ea751b207e3a15f3806304d20ab782840d7ff05f67d28757
                                                                  • Instruction Fuzzy Hash: C1517370A002199BDB10EB61CD89BAEB778AF54744F1041FEA40AB72D1DB789F85CF18
                                                                  APIs
                                                                  • __EH_prolog3.LIBCMT ref: 004038CC
                                                                    • Part of subcall function 00404396: _Allocate.LIBCPMT ref: 00404402
                                                                    • Part of subcall function 00404396: _memmove.LIBCMT ref: 00404447
                                                                    • Part of subcall function 00404396: _memmove.LIBCMT ref: 00404465
                                                                  • LookupAccountNameW.ADVAPI32(00000000,?,?,00000044,?,?,?), ref: 0040392E
                                                                  • GetLastError.KERNEL32(?,00000044,?,?,?,?,00000000,00000400,?,00000028,00403AB2), ref: 0040393A
                                                                  • LookupAccountNameW.ADVAPI32(00000000,?,?,00000044,?,00000400,?), ref: 00403985
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: AccountLookupName_memmove$AllocateErrorH_prolog3Last
                                                                  • String ID: D
                                                                  • API String ID: 1100625174-2746444292
                                                                  • Opcode ID: d4a8b213432b8f047ee80fa7da85489527dc22c91a46bc83829160262a276fce
                                                                  • Instruction ID: 6870c5936976370a109db7df4a4692874476ba3b098b2c310132ad7c6a934029
                                                                  • Opcode Fuzzy Hash: d4a8b213432b8f047ee80fa7da85489527dc22c91a46bc83829160262a276fce
                                                                  • Instruction Fuzzy Hash: 5331E9B6C0111EABCB01DFD5D9849EFBBBDFF48315F14142BE915B2240DB789A058BA8

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 287 41444f-41453a call 439b89 call 40e337 call 408273 call 4034da call 4034bd call 4034da * 3 call 4034bd call 40e535 CreateWindowExW SendMessageW call 406c78 call 4040cd 312 414540-4145ef call 4034da call 4034bd call 4034da * 3 call 4034bd call 40e535 CreateWindowExW SendMessageW call 41390d 287->312 313 4145f4-41462d call 406c78 call 40359e call 40783c call 403e1d 287->313 355 4148f3-414932 call 40e535 call 40e540 CreateWindowExW FindResourceExW 312->355 331 414654-41465e call 41494a 313->331 332 41462f-41464f call 404a29 313->332 338 414660-414676 call 405f17 331->338 339 414678 331->339 332->331 342 41467b-414683 338->342 339->342 345 414685-414697 GdipGetImageWidth 342->345 346 4146ca-4146cc call 4034da 342->346 349 414699 345->349 350 41469c-4146c0 call 4034bd GdipGetImageHeight 345->350 354 4146d1-414724 call 406c78 call 4034da call 4034bd call 4034da * 3 call 4034bd 346->354 349->350 360 4146c2 350->360 361 4146c5-4146c8 350->361 383 414726 354->383 384 414728-4148e0 call 40e535 CreateWindowExW call 4040cd SendMessageW call 4034da call 4034bd call 4034da * 3 call 4034bd call 40e535 CreateWindowExW SendMessageW call 4034da call 4034bd call 4034da * 3 call 4034bd call 40e535 CreateWindowExW SendMessageW call 41390d GetDlgItem ShowWindow call 4040cd 354->384 369 414934-414936 call 405d6e 355->369 370 41493d-414947 call 439b38 355->370 360->361 361->354 375 41493b 369->375 375->370 383->384 420 4148e5-4148f0 call 4040cd 384->420 420->355
                                                                  APIs
                                                                  • __EH_prolog3_GS.LIBCMT ref: 00414456
                                                                    • Part of subcall function 0040E337: CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000190,00000000,00000000,00000000,000000CC,00000000,00000000,00000005,00000000,Calibri), ref: 0040E38B
                                                                    • Part of subcall function 0040E337: CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,000000CC,00000000,00000000,00000005,00000000,Calibri), ref: 0040E3B5
                                                                    • Part of subcall function 0040E337: CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,000000CC,00000000,00000000,00000005,00000002,Arial), ref: 0040E3DF
                                                                    • Part of subcall function 004034DA: MulDiv.KERNEL32(?,00000060), ref: 004034ED
                                                                    • Part of subcall function 004034BD: MulDiv.KERNEL32(?,00000060), ref: 004034D0
                                                                  • CreateWindowExW.USER32(00000000,Static,00447DF8,50000000,00000000,?,00000000,?,?,00000001,00000000,00000000), ref: 00414508
                                                                  • SendMessageW.USER32(00000000,00000030,00000001), ref: 00414519
                                                                  • CreateWindowExW.USER32(00000000,Static,iTorrent - ,5000000D,00000000,?,00000000,?,?,00000004,00000000,00000000), ref: 004145B7
                                                                  • SendMessageW.USER32(00000000,00000030,00000001), ref: 004145C8
                                                                    • Part of subcall function 0041390D: GetDlgItem.USER32(?,00000004), ref: 0041391B
                                                                    • Part of subcall function 0041390D: ShowWindow.USER32(00000000,?,00413995,004479DC,004479B4,?,?,00000001,004105F9), ref: 00413922
                                                                  • char_traits.LIBCPMT ref: 00414606
                                                                  • GdipGetImageWidth.GDIPLUS(00000002,?,.file,00000001,00000000), ref: 0041468F
                                                                  • GdipGetImageHeight.GDIPLUS(00000002,?), ref: 004146B8
                                                                  • CreateWindowExW.USER32(00000000,Static,00445D78,50000005,00000000,00000000,00000000,00000001,00000002,00000000,00000000,00000000), ref: 00414918
                                                                  • FindResourceExW.KERNEL32(00000000,PNG,00000083,00000000), ref: 0041492A
                                                                    • Part of subcall function 00405D6E: LoadResource.KERNEL32(00000000), ref: 00405D7B
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: Create$Window$Font$GdipImageMessageResourceSend$FindH_prolog3_HeightItemLoadShowWidthchar_traits
                                                                  • String ID: .file$PNG$Static$iTorrent - $iTorrentWelcome
                                                                  • API String ID: 114926083-384642819
                                                                  • Opcode ID: 94347e9e1a9b5db89121c381e93682727429d4daaca01b73afb2f724f0436460
                                                                  • Instruction ID: a03778d6209eea219e0747b544b5621170a06d561913e29083beabcdbd216bb4
                                                                  • Opcode Fuzzy Hash: 94347e9e1a9b5db89121c381e93682727429d4daaca01b73afb2f724f0436460
                                                                  • Instruction Fuzzy Hash: 10E12C71E40304ABEB11AFB5CC46FAE7BB9AF04705F10453AF601BB2D2E6799905CB58

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 578 402216-402232 call 43b770 581 4027d4-4027d9 call 43b7b8 578->581 582 402238-40223e 578->582 582->581 583 402244-40224e 582->583 585 402254 583->585 586 402308-40230d 583->586 588 40225a-40225b 585->588 589 4022fc-402303 585->589 590 402313-402318 586->590 591 4027cd 586->591 592 4022d3-4022eb call 401367 588->592 593 40225d-40225e 588->593 589->581 594 4027c4-4027cb 590->594 595 40231e-402323 590->595 591->581 612 4022ee-4022f7 call 401451 592->612 599 402260-402262 593->599 600 4022b6-4022d1 call 401367 593->600 594->581 596 402329-40232e 595->596 597 4025ce-40261a call 4018b3 * 2 595->597 601 402334-402339 596->601 602 4024b7-4024c2 596->602 640 40261c-40262c VarI4FromStr 597->640 641 40262f-402631 597->641 606 402264-402269 599->606 607 4022aa-4022b1 599->607 600->612 608 402371-402390 601->608 609 40233b-402340 601->609 615 4024c4 602->615 616 4024ca-4024d2 602->616 613 40226b-40226e 606->613 614 40229e-4022a5 606->614 607->581 620 402392-40239c call 4015ba 608->620 621 4023b3-4023cd SetLastError call 40163a 608->621 617 402342-402347 609->617 618 402363-402367 call 40215f 609->618 612->581 623 402270-402273 613->623 624 402292-402299 613->624 614->581 615->616 625 4024f2-402503 call 40163a 616->625 626 4024d4 616->626 617->581 629 40234d-40235e WinHttpReceiveResponse 617->629 639 40236c 618->639 650 4023b1 620->650 651 40239e-4023ac GetLastError 620->651 644 4023d3-4023d5 621->644 645 4024a5-4024b5 GetLastError 621->645 634 402275-402278 623->634 635 40228a-40228d 623->635 624->581 646 402505-402506 FlushFileBuffers 625->646 647 40250c-40251b call 4016ee 625->647 627 4024d5-4024ed WinHttpReadData 626->627 627->581 629->581 634->581 643 40227e-402285 634->643 635->581 639->581 640->641 648 402641-402647 641->648 649 402633-40263b VarUI8FromStr 641->649 643->581 644->645 652 4023db-4023f0 WriteFile 644->652 654 40252b-402532 call 40205c 645->654 646->647 666 402537-402546 647->666 667 40251d-402526 GetLastError 647->667 655 40264d-402660 call 4018b3 648->655 656 40273f-402743 648->656 649->648 650->621 651->654 652->645 657 4023f6-4023f9 652->657 654->581 671 402662-402675 lstrcmpiW 655->671 672 402678-40267b 655->672 660 402745-402747 656->660 661 40276f-40277c 656->661 657->645 665 4023ff-402407 657->665 669 40274c-40276d call 40205c call 42c7b0 660->669 663 402797-40279e 661->663 664 40277e-40278a call 4027a3 661->664 663->669 683 40278c-402795 WinHttpQueryDataAvailable 664->683 674 402493-40249d 665->674 675 40240d-40248d 665->675 676 402548-4025a8 666->676 677 4025af-4025bb call 4025c0 666->677 667->654 669->581 671->672 672->656 679 402681-402688 672->679 682 4024a3 674->682 674->683 675->581 675->674 676->677 677->581 679->656 685 40268e-4026a9 call 4018b3 679->685 682->627 683->581 685->656 695 4026af-40273d 685->695 695->656 695->664
                                                                  APIs
                                                                  • WinHttpReceiveResponse.WINHTTP(?,00000000,?,?,?,?,?,?,0044A5F0,00000094), ref: 00402358
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: HttpReceiveResponse
                                                                  • String ID: FILE-API-COULD-NOT-CREATE-FILE$FILE-API-COULD-NOT-MAP-FILE$FILE-API-COULD-NOT-WRITE-FILE$Got invalid header$Resource unavailable$WINTHTTP-API-QUERY-HEADERS$bytes
                                                                  • API String ID: 3708229387-1782802258
                                                                  • Opcode ID: 7f2a08a2523ca3bb4cfb8053cadc7d544b1407f29afe73e6ebad0e6ff8d6c699
                                                                  • Instruction ID: b938960f7b11265ca264575212783bdfd29e9699cf5e21ea2c4ac082b02322c1
                                                                  • Opcode Fuzzy Hash: 7f2a08a2523ca3bb4cfb8053cadc7d544b1407f29afe73e6ebad0e6ff8d6c699
                                                                  • Instruction Fuzzy Hash: 6EF13B71900204DFDF18CF68CA987AE7BB4AF44314F2441BBE805AB2D6D7B88945CF59

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 698 402979-40299f call 4261a0 call 401cd0 703 4029a1-4029a4 698->703 704 4029a6 698->704 705 4029a8-4029cf call 401334 703->705 704->705 708 402d94-402da5 call 402db8 call 4261e5 705->708 709 4029d5-4029dd 705->709 710 4029ff-402a06 709->710 711 4029df-4029e2 709->711 716 402a08-402a10 710->716 717 402a1a-402a4b LocalAlloc ObtainUserAgentString 710->717 713 4029e4-4029ee call 401f0e 711->713 714 4029f6-4029fa 711->714 713->714 725 4029f0-4029f4 713->725 714->708 716->717 720 402a65-402a81 call 402aaa WinHttpOpen 717->720 721 402a4d-402a62 717->721 728 402a83-402a86 call 401367 720->728 729 402a8b-402a8e 720->729 721->720 725->710 725->714 728->729 731 402a90-402a97 729->731 732 402ab9-402afb call 401423 call 401451 WinHttpConnect 729->732 733 402d91 731->733 738 402b09-402b1b 732->738 739 402afd-402b04 732->739 733->708 740 402b1e-402b23 738->740 739->733 741 402b42-402b49 740->741 742 402b25-402b2d 740->742 743 402b50-402b57 741->743 744 402b4b-402b4e 741->744 745 402b3d-402b40 742->745 746 402b2f-402b32 742->746 747 402b5c-402b7c call 401451 WinHttpOpenRequest 743->747 744->747 745->740 746->745 748 402b34-402b3b 746->748 751 402b8a-402ba9 WinHttpSetOption 747->751 752 402b7e-402b85 747->752 748->741 748->745 753 402bd6-402bda 751->753 754 402bab-402baf 751->754 752->733 756 402be8-402bfc WinHttpSetStatusCallback 753->756 757 402bdc-402be3 753->757 754->753 755 402bb1-402bba 754->755 760 402bd1 755->760 761 402bbc-402bcf WinHttpSetOption 755->761 758 402c0a-402c14 756->758 759 402bfe-402c05 756->759 757->733 762 402c16-402c27 WinHttpSetOption 758->762 763 402c29 758->763 759->733 764 402bd3 760->764 761->760 761->764 765 402c2b-402c37 762->765 763->765 764->753 765->733 766 402c3d-402c59 765->766 767 402c67-402c6b 766->767 768 402c5b-402c64 766->768 769 402ca7-402cac 767->769 770 402c6d-402c71 767->770 768->767 771 402cb2-402cd6 769->771 772 402d3f-402d47 769->772 770->769 773 402c73-402c75 770->773 774 402cd8-402ce6 WinHttpSetOption 771->774 775 402ce9-402cf0 771->775 778 402d49-402d4b 772->778 779 402d4d-402d5c call 40138b 772->779 776 402c77-402c79 773->776 777 402c7b-402c7e 773->777 774->775 780 402d00-402d07 775->780 781 402cf2-402cfe WinHttpSetOption 775->781 776->769 776->777 782 402c84-402c87 777->782 783 402da8-402dae 777->783 778->779 784 402d5f-402d8e WinHttpSendRequest 778->784 779->784 786 402d19-402d1d 780->786 787 402d09-402d17 WinHttpSetOption 780->787 781->780 782->783 788 402c8d-402ca4 call 40164a 782->788 783->733 784->733 790 402d2c-402d30 786->790 791 402d1f-402d2a WinHttpSetOption 786->791 787->786 788->769 790->772 793 402d32-402d3d WinHttpSetOption 790->793 791->790 793->772
                                                                  APIs
                                                                    • Part of subcall function 00401CD0: @_EH4_CallFilterFunc@8.LIBCMT ref: 00401D04
                                                                  • LocalAlloc.KERNEL32(00000040,00000400,?,?,?,?,?,?,?,?,?,?,?,0044A680,00000080), ref: 00402A26
                                                                  • ObtainUserAgentString.URLMON(00000000,00000000,00000400), ref: 00402A43
                                                                  • WinHttpOpen.WINHTTP(00000000,00000000,00000000,00000000,10000000), ref: 00402A76
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: AgentAllocCallFilterFunc@8HttpLocalObtainOpenStringUser
                                                                  • String ID: Range: bytes=%1!I64u!-$(cD$WINHTTP-API-SEND-REQUEST
                                                                  • API String ID: 116706778-1993903230
                                                                  • Opcode ID: a8edad8e918f0472be7f5c161eba11fd8b02739d1e40bb5cf1f014af92c352bd
                                                                  • Instruction ID: 1d278322118d6ba96d209768847366fb05d794d4bbc19de4b4999fe6f6f4a19a
                                                                  • Opcode Fuzzy Hash: a8edad8e918f0472be7f5c161eba11fd8b02739d1e40bb5cf1f014af92c352bd
                                                                  • Instruction Fuzzy Hash: 82D14B709007099FEB24DF65CA88AAEBBB5BF48304F10453EE955B72D0D7B8AD45CB18

                                                                  Control-flow Graph

                                                                  APIs
                                                                  • __EH_prolog3.LIBCMT ref: 0040FDCE
                                                                    • Part of subcall function 0040E337: CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000190,00000000,00000000,00000000,000000CC,00000000,00000000,00000005,00000000,Calibri), ref: 0040E38B
                                                                    • Part of subcall function 0040E337: CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,000000CC,00000000,00000000,00000005,00000000,Calibri), ref: 0040E3B5
                                                                    • Part of subcall function 0040E337: CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,000000CC,00000000,00000000,00000005,00000002,Arial), ref: 0040E3DF
                                                                  • GetSysColorBrush.USER32(0000000F), ref: 0040FDF3
                                                                    • Part of subcall function 004034BD: MulDiv.KERNEL32(?,00000060), ref: 004034D0
                                                                    • Part of subcall function 004034DA: MulDiv.KERNEL32(?,00000060), ref: 004034ED
                                                                  • CreateWindowExW.USER32(00000000,EDIT,00445D78,50A00044,?,?,00000000,?,00000001,00000001,00000000,00000000), ref: 0040FE7D
                                                                  • SendMessageW.USER32(00000000,00000030,00000001), ref: 0040FE91
                                                                    • Part of subcall function 00423D6A: _malloc.LIBCMT ref: 00423D82
                                                                  • GetWindowLongW.USER32(?,000000FC), ref: 0040FEAD
                                                                  • SetWindowLongW.USER32(?,000000EB,00000000), ref: 0040FEC8
                                                                  • SetWindowLongW.USER32(?,000000FC,Function_0000FCD4), ref: 0040FED4
                                                                  • CreateWindowExW.USER32(00000000,Static,00447000,50000000,?,?,00000000,00000000,?,00000000,00000000,00000000), ref: 0040FF34
                                                                  • SendMessageW.USER32(00000000,00000030,00000001), ref: 0040FF47
                                                                  • CreateWindowExW.USER32(00000000,Static,00445D78,50000005,00000000,00000000,00000000,00000001,00000001,00000000,00000000,00000000), ref: 0040FF9A
                                                                  • CreateWindowExW.USER32(00000000,Static,00445D78,50000005,00000000,00000000,00000000,00000001,00000001,00000000,00000000,00000000), ref: 0040FFCA
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: CreateWindow$FontLong$MessageSend$BrushColorH_prolog3_malloc
                                                                  • String ID: EDIT$Static$iTorrentLicense
                                                                  • API String ID: 1542350560-3723335058
                                                                  • Opcode ID: 4d3484bd485e8c698ad6d173f35b872cdb20d9edc5abe095ef18aa431a18fbb7
                                                                  • Instruction ID: 728fdf10bdbda5bda2f19fa9de87d07016514754f92681bba7c09195c2e047ef
                                                                  • Opcode Fuzzy Hash: 4d3484bd485e8c698ad6d173f35b872cdb20d9edc5abe095ef18aa431a18fbb7
                                                                  • Instruction Fuzzy Hash: C351A771A40214BBEB116FB59C46F2B3E69EF44B15F10447AF904BF2C2DAB9D9108B68

                                                                  Control-flow Graph

                                                                  APIs
                                                                  • _memset.LIBCMT ref: 00410902
                                                                  • LoadIconW.USER32(00400000,00000002), ref: 00410948
                                                                  • LoadCursorW.USER32(00000000,00007F00), ref: 00410956
                                                                  • LoadIconW.USER32(?,00000002), ref: 0041097E
                                                                  • RegisterClassExW.USER32(00000030), ref: 0041098D
                                                                    • Part of subcall function 004034DA: MulDiv.KERNEL32(?,00000060), ref: 004034ED
                                                                  • AdjustWindowRect.USER32(?,00C80000,00000000), ref: 004109C7
                                                                  • CreateWindowExW.USER32(00000000,itorrent-class-name,?,00C80000,80000000,00000000,?,?,00000000,00000000,00000000,00000001), ref: 00410A99
                                                                  • GetSystemMetrics.USER32(00000000), ref: 00410ABF
                                                                  • GetSystemMetrics.USER32(00000001), ref: 00410AC5
                                                                  • MoveWindow.USER32(00000000,00000000,?,?,00000000), ref: 00410AEE
                                                                  • ShowWindow.USER32(?), ref: 00410B14
                                                                  • KiUserCallbackDispatcher.NTDLL(?,?,00000001,00000000), ref: 00410B20
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: Window$Load$IconMetricsSystem$AdjustCallbackClassCreateCursorDispatcherMoveRectRegisterShowUser_memset
                                                                  • String ID: 0$itorrent-class-name
                                                                  • API String ID: 1695166324-3785640383
                                                                  • Opcode ID: 5bba661acd20567c8bc2cc06b7b376dc001007c0376515433906ecbc8142f826
                                                                  • Instruction ID: 14dfdfadd086018d3ef7d7ec4999bc9cebe3d057be21e3b376fcf857133ddd08
                                                                  • Opcode Fuzzy Hash: 5bba661acd20567c8bc2cc06b7b376dc001007c0376515433906ecbc8142f826
                                                                  • Instruction Fuzzy Hash: AC5140B1D00218AFDB249F65DC45BDA77B8EB08345F4040FAA509A7291DBB49EC5CF58

                                                                  Control-flow Graph

                                                                  APIs
                                                                  • __EH_prolog3.LIBCMT ref: 0040F606
                                                                    • Part of subcall function 0040E337: CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000190,00000000,00000000,00000000,000000CC,00000000,00000000,00000005,00000000,Calibri), ref: 0040E38B
                                                                    • Part of subcall function 0040E337: CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,000000CC,00000000,00000000,00000005,00000000,Calibri), ref: 0040E3B5
                                                                    • Part of subcall function 0040E337: CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,000000CC,00000000,00000000,00000005,00000002,Arial), ref: 0040E3DF
                                                                    • Part of subcall function 004034DA: MulDiv.KERNEL32(?,00000060), ref: 004034ED
                                                                    • Part of subcall function 004034BD: MulDiv.KERNEL32(?,00000060), ref: 004034D0
                                                                  • CreateWindowExW.USER32(00000000,Static,iTorrent ,50000000,00000000,?,00000000,?,?,00000001,00000000,00000000), ref: 0040F6B0
                                                                  • SendMessageW.USER32(00000000,00000030,00000001), ref: 0040F6C1
                                                                  • CreateWindowExW.USER32(00000000,Static,00445D78,50000000,00000000,?,00000000,?,?,00000002,00000000,00000000), ref: 0040F73B
                                                                  • SendMessageW.USER32(00000000,00000030,00000001), ref: 0040F74C
                                                                    • Part of subcall function 00405BC7: CreateWindowExW.USER32(00000000,BUTTON,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00405BF7
                                                                  • SendMessageW.USER32(?,00000030,00000001), ref: 0040F7D6
                                                                  • SendMessageW.USER32(?,000000F1,00000001,00000000), ref: 0040F7E4
                                                                  • CreateWindowExW.USER32(00000000,Static,00445D78,50000005,00000000,00000000,00000000,00000001,00000005,00000000,00000000,00000000), ref: 0040F80D
                                                                  • FindResourceExW.KERNEL32(00000000,PNG,00000083,00000000), ref: 0040F81F
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: Create$MessageSendWindow$Font$FindH_prolog3Resource
                                                                  • String ID: PNG$Static$iTorrent $iTorrentFinish
                                                                  • API String ID: 1804301274-2355466141
                                                                  • Opcode ID: 3013e456cbbde5696532feb72056ab8acf501e300e12b2342dfa31e9ed72316e
                                                                  • Instruction ID: 41f152dcd5fd888cc1da02dd0585f07ec842f104924a7fd92865494d370ae4fb
                                                                  • Opcode Fuzzy Hash: 3013e456cbbde5696532feb72056ab8acf501e300e12b2342dfa31e9ed72316e
                                                                  • Instruction Fuzzy Hash: 46614171F40305BBEB11AFB1DC4AF6F7A69AF15705F10843AB605BF1C2DAB999008B58

                                                                  Control-flow Graph

                                                                  APIs
                                                                  • __EH_prolog3.LIBCMT ref: 00413C3F
                                                                    • Part of subcall function 0040E337: CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000190,00000000,00000000,00000000,000000CC,00000000,00000000,00000005,00000000,Calibri), ref: 0040E38B
                                                                    • Part of subcall function 0040E337: CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,000000CC,00000000,00000000,00000005,00000000,Calibri), ref: 0040E3B5
                                                                    • Part of subcall function 0040E337: CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,000000CC,00000000,00000000,00000005,00000002,Arial), ref: 0040E3DF
                                                                  • GetSysColorBrush.USER32(0000000F), ref: 00413C61
                                                                    • Part of subcall function 00423D6A: _malloc.LIBCMT ref: 00423D82
                                                                  • CreateWindowExW.USER32(00000000,msctls_progress32,00000000,50000000,00000000,00000000,00000000,?,?,00000064,00000000,00000000), ref: 00413CF7
                                                                  • SendMessageW.USER32(00000000,0000040A,00000001,00000000), ref: 00413D0E
                                                                  • SendMessageW.USER32(00000000,00000401,00000000,03E80000), ref: 00413D1C
                                                                  • CreateWindowExW.USER32(00000000,Static,00445D78,50000000,00000000,00000000,?,00000000,?,00000065,00000000,00000000), ref: 00413D79
                                                                  • SendMessageW.USER32(00000000,00000030,00000001), ref: 00413D86
                                                                    • Part of subcall function 0040FAAE: CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,000000CC,00000000,00000000,00000005,00000000,Calibri), ref: 0040FB02
                                                                    • Part of subcall function 0040FAAE: CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000190,00000000,00000000,00000000,000000CC,00000000,00000000,00000005,00000000,Calibri), ref: 0040FB29
                                                                  • CreateWindowExW.USER32(00000000,Static,00445D78,50000005,00000000,00000000,00000000,00000001,00000004,00000000,00000000,00000000), ref: 00413DCF
                                                                    • Part of subcall function 004034DA: MulDiv.KERNEL32(?,00000060), ref: 004034ED
                                                                  • CreateWindowExW.USER32(00000000,Static,00445D78,50000005,00000000,00000000,00000000,00000001,00000004,00000000,00000000,00000000), ref: 00413DFF
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: Create$Font$Window$MessageSend$BrushColorH_prolog3_malloc
                                                                  • String ID: Static$iTorrentProgress$msctls_progress32
                                                                  • API String ID: 267330387-4176076747
                                                                  • Opcode ID: 30098239b0446a19a158b6fcf7fa5b2db47ffbf1a21ef79790b277f1b9fba87e
                                                                  • Instruction ID: a2a72de0fe20205cdbfba1df0d0e3325bb776ee26a69da0e23c3975f614788ff
                                                                  • Opcode Fuzzy Hash: 30098239b0446a19a158b6fcf7fa5b2db47ffbf1a21ef79790b277f1b9fba87e
                                                                  • Instruction Fuzzy Hash: 0A419871B803007BFB106FB29C4BF6B3A69EF44B05F10846ABA04BF1C1D6B99D01866C

                                                                  Control-flow Graph

                                                                  APIs
                                                                    • Part of subcall function 0040E337: CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000190,00000000,00000000,00000000,000000CC,00000000,00000000,00000005,00000000,Calibri), ref: 0040E38B
                                                                    • Part of subcall function 0040E337: CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,000000CC,00000000,00000000,00000005,00000000,Calibri), ref: 0040E3B5
                                                                    • Part of subcall function 0040E337: CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,000000CC,00000000,00000000,00000005,00000002,Arial), ref: 0040E3DF
                                                                    • Part of subcall function 004034A0: MulDiv.KERNEL32(?,00000048), ref: 004034B3
                                                                  • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,000000CC,00000000,00000000,00000005,00000000,Calibri), ref: 0040FB02
                                                                  • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000190,00000000,00000000,00000000,000000CC,00000000,00000000,00000005,00000000,Calibri), ref: 0040FB29
                                                                    • Part of subcall function 004034DA: MulDiv.KERNEL32(?,00000060), ref: 004034ED
                                                                    • Part of subcall function 0040E49D: CreateWindowExW.USER32(00000000,?,00445D78,40000000,?,?,?,?,?,00000000,00000000,00000000), ref: 0040E4F2
                                                                    • Part of subcall function 0040E49D: SetWindowLongW.USER32(00000000,000000EB), ref: 0040E4FF
                                                                    • Part of subcall function 004034BD: MulDiv.KERNEL32(?,00000060), ref: 004034D0
                                                                  • CreateWindowExW.USER32(00000000,Static,?,50000000,00000000,00000000,00000000,?,?,00000000,00000000,00000000), ref: 0040FBA5
                                                                  • SendMessageW.USER32(00000000,00000030,?,00000001), ref: 0040FBB9
                                                                  • CreateWindowExW.USER32(00000000,Static,?,50000000,00000000,00000000,?,00000000,?,00000000,00000000,00000000), ref: 0040FC0D
                                                                  • SendMessageW.USER32(00000000,00000030,?,00000001), ref: 0040FC21
                                                                  • GetModuleHandleW.KERNEL32(00000000,00000082), ref: 0040FC2E
                                                                  • LoadBitmapW.USER32(00000000), ref: 0040FC35
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: Create$Font$Window$MessageSend$BitmapHandleLoadLongModule
                                                                  • String ID: Calibri$Static$iTorrentHeader
                                                                  • API String ID: 370662089-2786395957
                                                                  • Opcode ID: a4a7b8f18eea82c50bb9a891c8dafe0cf429e6e5bdcca20dfb5899dcfa65fe70
                                                                  • Instruction ID: 0a8a5a01e9bc8f247a4b71e8012727283a17c4d7533d367f77f3fd1e9a4f749e
                                                                  • Opcode Fuzzy Hash: a4a7b8f18eea82c50bb9a891c8dafe0cf429e6e5bdcca20dfb5899dcfa65fe70
                                                                  • Instruction Fuzzy Hash: AF4151B1A40314BEFB115FB1CC4AF6B3E6CEF05B55F00856ABA04EF1C1D6B999108BA4

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 1051 40f85a-40f88c call 439b56 GetDlgItem SetWindowTextW 1054 40f8ca-40f8df GetDlgItem SetWindowTextW 1051->1054 1055 40f88e-40f8a7 call 4085b7 1051->1055 1056 40f920-40f936 GetDlgItem ShowWindow call 439b24 1054->1056 1057 40f8e1-40f8fd call 4085b7 1054->1057 1064 40f8b9-40f8c8 call 4083a2 1055->1064 1065 40f8a9-40f8b4 call 40792f 1055->1065 1063 40f93b 1056->1063 1068 40f90f-40f91e call 4083a2 1057->1068 1069 40f8ff-40f90a call 40792f 1057->1069 1064->1054 1065->1064 1068->1056 1069->1068
                                                                  APIs
                                                                  • __EH_prolog3.LIBCMT ref: 0040F864
                                                                  • GetDlgItem.USER32(?,00000001), ref: 0040F881
                                                                  • SetWindowTextW.USER32(00000000), ref: 0040F884
                                                                  • GetDlgItem.USER32(?,00000002), ref: 0040F8D4
                                                                  • SetWindowTextW.USER32(00000000), ref: 0040F8D7
                                                                  • GetDlgItem.USER32(?,00000003), ref: 0040F927
                                                                  • ShowWindow.USER32(00000000), ref: 0040F92A
                                                                    • Part of subcall function 004085B7: __EH_prolog3.LIBCMT ref: 004085BE
                                                                    • Part of subcall function 0040792F: __EH_prolog3_catch.LIBCMT ref: 00407936
                                                                    • Part of subcall function 0040792F: char_traits.LIBCPMT ref: 0040794D
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: ItemWindow$H_prolog3Text$H_prolog3_catchShowchar_traits
                                                                  • String ID: Can't set text$Can't set title
                                                                  • API String ID: 749598868-3025945671
                                                                  • Opcode ID: bfc8e40e0dd567e4df545333b0ef3a7c4005f144a73b76090d9ac0179e53f548
                                                                  • Instruction ID: dd74d8b56621528f40f95567f7c43380087b9a40a2ade6baff2560dbbbc3aa45
                                                                  • Opcode Fuzzy Hash: bfc8e40e0dd567e4df545333b0ef3a7c4005f144a73b76090d9ac0179e53f548
                                                                  • Instruction Fuzzy Hash: EA218C70950208EBEB24EB21DD06BDBB774AB54704F5041BEE455A31E1EB79AE09CE18

                                                                  Control-flow Graph

                                                                  APIs
                                                                  • __EH_prolog3_GS.LIBCMT ref: 00413A4F
                                                                    • Part of subcall function 0040E337: CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000190,00000000,00000000,00000000,000000CC,00000000,00000000,00000005,00000000,Calibri), ref: 0040E38B
                                                                    • Part of subcall function 0040E337: CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,000000CC,00000000,00000000,00000005,00000000,Calibri), ref: 0040E3B5
                                                                    • Part of subcall function 0040E337: CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,000000CC,00000000,00000000,00000005,00000002,Arial), ref: 0040E3DF
                                                                  • GetSysColorBrush.USER32(0000000F), ref: 00413A74
                                                                    • Part of subcall function 00423D6A: _malloc.LIBCMT ref: 00423D82
                                                                  • CreateWindowExW.USER32(00000000,Static,00445D78,50000005,00000000,00000000,00000000,00000001,00000002,00000000,00000000,00000000), ref: 00413AE6
                                                                  • CreateWindowExW.USER32(00000000,Static,00445D78,50000005,00000000,00000000,00000000,00000001,00000002,00000000,00000000,00000000), ref: 00413B16
                                                                  • SendMessageW.USER32(?,00000030,00000001), ref: 00413BBE
                                                                  • SendMessageW.USER32(?,000000F1,00000001,00000000), ref: 00413BCF
                                                                    • Part of subcall function 0040FAAE: CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,000000CC,00000000,00000000,00000005,00000000,Calibri), ref: 0040FB02
                                                                    • Part of subcall function 0040FAAE: CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000190,00000000,00000000,00000000,000000CC,00000000,00000000,00000005,00000000,Calibri), ref: 0040FB29
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: Create$Font$MessageSendWindow$BrushColorH_prolog3__malloc
                                                                  • String ID: Static$iTorrentOptions
                                                                  • API String ID: 444723301-2875620399
                                                                  • Opcode ID: 7950f924ce1b16aa7e9ace37528d4308d0ed48beea05294f43eecb2e6ebde7c2
                                                                  • Instruction ID: b2494b83cfcfe630cf29c41a34e28038c01e93297173268f87f7fe030d4191dd
                                                                  • Opcode Fuzzy Hash: 7950f924ce1b16aa7e9ace37528d4308d0ed48beea05294f43eecb2e6ebde7c2
                                                                  • Instruction Fuzzy Hash: 6241A471B80605BBFB11AFA19C46FAE7A78EF04745F10446AF6047B1C1DBB96E018B68

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 1194 405c87-405cac call 439b89 StrCmpNA 1197 405cfb-405cfd 1194->1197 1198 405cae-405ccd call 403dc1 call 4057a5 1194->1198 1199 405d03-405d17 StrCmpNA 1197->1199 1212 405cd1-405cf9 call 4058f3 call 4040cd call 40403b 1198->1212 1213 405ccf 1198->1213 1201 405d60-405d62 1199->1201 1202 405d19-405d38 call 403dc1 call 4057a5 1199->1202 1204 405d68-405d6d call 439b38 1201->1204 1217 405d3a 1202->1217 1218 405d3c-405d5e call 4058f3 call 4040cd call 40403b 1202->1218 1212->1199 1213->1212 1217->1218 1218->1204
                                                                  APIs
                                                                  • __EH_prolog3_GS.LIBCMT ref: 00405C8E
                                                                  • StrCmpNA.SHLWAPI(http://tfile.me/forum/download.php?id=706491&ak=11xxxxxxxx,###,00000003,00000064,00412778), ref: 00405C9F
                                                                  • StrCmpNA.SHLWAPI(FreeSpacer_setup.exe.[tfile.ru].torrent.exe.torrent,###,00000003), ref: 00405D0F
                                                                    • Part of subcall function 004057A5: __EH_prolog3.LIBCMT ref: 004057AC
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3H_prolog3_
                                                                  • String ID: ###$FreeSpacer_setup.exe.[tfile.ru].torrent.exe.torrent$FreeSpacer_setup.exe.[tfile.ru].torrent.exe.torrent$http://tfile.me/forum/download.php?id=706491&ak=11xxxxxxxx$http://tfile.me/forum/download.php?id=706491&ak=11xxxxxxxx
                                                                  • API String ID: 3355343447-2257282289
                                                                  • Opcode ID: aa6765c9d63f3b433cf871d83633ee629f8a3912906d01184337e2ffca646b31
                                                                  • Instruction ID: 1f940260cc4e7a35830145308c40484e2a74c8b3c35771e47d7e876c49532998
                                                                  • Opcode Fuzzy Hash: aa6765c9d63f3b433cf871d83633ee629f8a3912906d01184337e2ffca646b31
                                                                  • Instruction Fuzzy Hash: 4B21B270510608EAD710EBA5DC96AAE7778EF85709F10413FB501B70E2EB785A05DA2D
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: _memmove$Allocate
                                                                  • String ID: vector<T> too long
                                                                  • API String ID: 164242391-3788999226
                                                                  • Opcode ID: a4f50502c6685bb4d26e1917730b3b833774906c7820b4303b9d1d1731f7ad05
                                                                  • Instruction ID: dfcf6607a34df03d6688fcf37bd0f3a95ca58e386c30b3a6d53f84984c8bdd72
                                                                  • Opcode Fuzzy Hash: a4f50502c6685bb4d26e1917730b3b833774906c7820b4303b9d1d1731f7ad05
                                                                  • Instruction Fuzzy Hash: A0718F726005159FCF18DF6CC9809AE77A6FFC8310719826AED16AB389DB34ED11CB94
                                                                  APIs
                                                                  • __EH_prolog3_GS.LIBCMT ref: 0040FD27
                                                                  • FindResourceExW.KERNEL32(00000000,TEXT,00000083,00000000,00000034,0040FEDE), ref: 0040FD3C
                                                                  • LoadResource.KERNEL32(00000000,00000000), ref: 0040FD4B
                                                                  • LockResource.KERNEL32(00000000), ref: 0040FD56
                                                                  • SizeofResource.KERNEL32(00000000,00000000), ref: 0040FD65
                                                                    • Part of subcall function 004057A5: __EH_prolog3.LIBCMT ref: 004057AC
                                                                  • SetWindowTextW.USER32(?,?), ref: 0040FDA3
                                                                    • Part of subcall function 0040403B: _memmove.LIBCMT ref: 0040405B
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: Resource$FindH_prolog3H_prolog3_LoadLockSizeofTextWindow_memmove
                                                                  • String ID: TEXT
                                                                  • API String ID: 1530068808-220088947
                                                                  • Opcode ID: 9fd67bc6934bd1d7a2b6b74ec5eff0c6db712d3369842b4335e4e0abdc827711
                                                                  • Instruction ID: ffca23573cf0b310e813f6b9f6352eb1531273f627825206d8a75a95b5c88b1f
                                                                  • Opcode Fuzzy Hash: 9fd67bc6934bd1d7a2b6b74ec5eff0c6db712d3369842b4335e4e0abdc827711
                                                                  • Instruction Fuzzy Hash: 18117330A40215EBDF20EBA1EC46FEE7B74AF48704F14103AF601B61D1DAB49908CB69
                                                                  APIs
                                                                  • IsDlgButtonChecked.USER32(?,00000001), ref: 00410435
                                                                  • IsDlgButtonChecked.USER32(?,00000002), ref: 00410445
                                                                  • IsDlgButtonChecked.USER32(?,00000003), ref: 00410455
                                                                  • ShowWindow.USER32(?,00000000), ref: 0041046F
                                                                  • ShowWindow.USER32(?,00000000), ref: 00410497
                                                                  • ShowWindow.USER32(?,00000000), ref: 004104E9
                                                                  • ShowWindow.USER32(?,00000005), ref: 004105FE
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: ShowWindow$ButtonChecked
                                                                  • String ID:
                                                                  • API String ID: 2451004236-0
                                                                  • Opcode ID: fd69d458e3f2d709d3aaf2677d15010d008cfffb2c6ed55db2705e7b28e3f8bb
                                                                  • Instruction ID: 9dd745d460c098b5cad52229b3db96fefe38c44677978b04dc7033ab2fb2ccac
                                                                  • Opcode Fuzzy Hash: fd69d458e3f2d709d3aaf2677d15010d008cfffb2c6ed55db2705e7b28e3f8bb
                                                                  • Instruction Fuzzy Hash: 8B51A371640304BFDB119F54CD86BAB77A5AB5470AF04007AFD016B2A2DFB8ED848B5C
                                                                  APIs
                                                                  • __EH_prolog3_GS.LIBCMT ref: 00407621
                                                                  • _memset.LIBCMT ref: 0040763E
                                                                  • GetModuleFileNameW.KERNEL32(00000000,?,00000103), ref: 00407653
                                                                    • Part of subcall function 00403E1D: char_traits.LIBCPMT ref: 00403E36
                                                                  • char_traits.LIBCPMT ref: 0040767B
                                                                    • Part of subcall function 004080DC: swprintf.LIBCMT ref: 00408108
                                                                    • Part of subcall function 00405427: char_traits.LIBCPMT ref: 00405436
                                                                    • Part of subcall function 00405457: char_traits.LIBCPMT ref: 00405468
                                                                    • Part of subcall function 00406203: GetFileAttributesW.KERNEL32(?,0040DDD4,?,00000184,0040DFA6,?,00000000,?,?,?,?,?,?,0043D89B,000000FF), ref: 0040620C
                                                                  • MoveFileW.KERNEL32(?,?), ref: 00407786
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: char_traits$File$AttributesH_prolog3_ModuleMoveName_memsetswprintf
                                                                  • String ID: .exe
                                                                  • API String ID: 1296388361-4119554291
                                                                  • Opcode ID: d85803e56c07a991bfd5da3bef13817f8006fdaa17c246fc2c3b618dd8e93da3
                                                                  • Instruction ID: 7550a825539bbf9bb6364d37b0b9eba6cc533bc24da2e27e6ccc6124807fed6b
                                                                  • Opcode Fuzzy Hash: d85803e56c07a991bfd5da3bef13817f8006fdaa17c246fc2c3b618dd8e93da3
                                                                  • Instruction Fuzzy Hash: 6F416271911118AEEB10EB61CC99BEE7378EF10748F0042BEA105B31D1DB785F85CB65
                                                                  APIs
                                                                  • __EH_prolog3.LIBCMT ref: 00413F14
                                                                    • Part of subcall function 0040E337: CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000190,00000000,00000000,00000000,000000CC,00000000,00000000,00000005,00000000,Calibri), ref: 0040E38B
                                                                    • Part of subcall function 0040E337: CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,000000CC,00000000,00000000,00000005,00000000,Calibri), ref: 0040E3B5
                                                                    • Part of subcall function 0040E337: CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,000000CC,00000000,00000000,00000005,00000002,Arial), ref: 0040E3DF
                                                                  • GetSysColorBrush.USER32(0000000F), ref: 00413F36
                                                                    • Part of subcall function 00423D6A: _malloc.LIBCMT ref: 00423D82
                                                                  • CreateWindowExW.USER32(00000000,STATIC,00447DAC,50000000,00000000,00000000,?,00000000,?,00000000,00000000,00000000), ref: 00413FC8
                                                                  • SendMessageW.USER32(00000000,00000030,00000001), ref: 00413FDF
                                                                    • Part of subcall function 0040FAAE: CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,000000CC,00000000,00000000,00000005,00000000,Calibri), ref: 0040FB02
                                                                    • Part of subcall function 0040FAAE: CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000190,00000000,00000000,00000000,000000CC,00000000,00000000,00000005,00000000,Calibri), ref: 0040FB29
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: Create$Font$BrushColorH_prolog3MessageSendWindow_malloc
                                                                  • String ID: STATIC$iTorrentWaiting
                                                                  • API String ID: 1467136806-3420226059
                                                                  • Opcode ID: c3e6ba9ebe4d2931048ca258b2223e07924524df32edc26164d611359715a597
                                                                  • Instruction ID: 8ef63a9f65442ea3e7d84a3a82d08e70579734f639bcddaed216e3b46bfcc4f5
                                                                  • Opcode Fuzzy Hash: c3e6ba9ebe4d2931048ca258b2223e07924524df32edc26164d611359715a597
                                                                  • Instruction Fuzzy Hash: 2A2171B1A50210BBEB11AF729D46E6F7E68EF44705F00447EF905AB281DBB98A018768
                                                                  APIs
                                                                    • Part of subcall function 004085B7: __EH_prolog3.LIBCMT ref: 004085BE
                                                                    • Part of subcall function 0040792F: __EH_prolog3_catch.LIBCMT ref: 00407936
                                                                    • Part of subcall function 0040792F: char_traits.LIBCPMT ref: 0040794D
                                                                    • Part of subcall function 0040A036: __EH_prolog3_GS.LIBCMT ref: 0040A03D
                                                                    • Part of subcall function 0040A036: _memmove.LIBCMT ref: 0040A145
                                                                    • Part of subcall function 00414A14: __EH_prolog3.LIBCMT ref: 00414A1E
                                                                    • Part of subcall function 00414A14: FindWindowW.USER32(itorrent-class-name,00000000), ref: 00414A2D
                                                                    • Part of subcall function 00414A14: SendMessageTimeoutW.USER32(00000000,?,00000000,00000000,00000BB8,00000000), ref: 00414A43
                                                                  • EnterCriticalSection.KERNEL32(0045869C,00000001,00000000,?,00000024,00000001), ref: 00415C8B
                                                                    • Part of subcall function 00416014: __EH_prolog3_catch.LIBCMT ref: 0041601B
                                                                  • LeaveCriticalSection.KERNEL32(0045869C,?,00000000,000000FF,?), ref: 00415CB6
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: CriticalH_prolog3H_prolog3_catchSection$EnterFindH_prolog3_LeaveMessageSendTimeoutWindow_memmovechar_traits
                                                                  • String ID: Can't get xml$Can't parse partners xml$Can't unpack data$data
                                                                  • API String ID: 3514792492-2327074062
                                                                  • Opcode ID: ed8c760e852ef18c81077a5c6172fe04e3b924a805f6b88357eedae1194ba30a
                                                                  • Instruction ID: 03e0a1f2baa0e63ae8fd6d94dcc5a8610a6a94514ee2958c60ec22e053a70be1
                                                                  • Opcode Fuzzy Hash: ed8c760e852ef18c81077a5c6172fe04e3b924a805f6b88357eedae1194ba30a
                                                                  • Instruction Fuzzy Hash: C4A194710083859BD335EB15C885BEFB7E8AFD4708F10492EF48952192EF785A49C7AB
                                                                  APIs
                                                                  • BeginPaint.USER32(?,?,?), ref: 00414136
                                                                  • GdipCreateFromHDC.GDIPLUS(00000000,00000000), ref: 0041414D
                                                                  • GdipGetImageHeight.GDIPLUS(?,00000000), ref: 004141BB
                                                                  • GdipGetImageWidth.GDIPLUS(?,00000000), ref: 004141DC
                                                                  • EndPaint.USER32(?,?), ref: 00414241
                                                                  • GdipDeleteGraphics.GDIPLUS(?), ref: 0041424A
                                                                    • Part of subcall function 004034DA: MulDiv.KERNEL32(?,00000060), ref: 004034ED
                                                                    • Part of subcall function 004034BD: MulDiv.KERNEL32(?,00000060), ref: 004034D0
                                                                    • Part of subcall function 0040F3B5: GdipDrawImageRectI.GDIPLUS(?,00000000,?,?,?,?,00000000,00000000,?,?,0040E7BE,?,?,?,?), ref: 0040F3E0
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: Gdip$Image$Paint$BeginCreateDeleteDrawFromGraphicsHeightRectWidth
                                                                  • String ID:
                                                                  • API String ID: 3674361125-0
                                                                  • Opcode ID: a7115d03ca896a7c9ac221be6fc0e5871e4791cfbbba85e33340d8583082e9e8
                                                                  • Instruction ID: 254ed59419ce1301e58b23c2c31be8fd1e9f868bcacadb03e2f24646502d89a9
                                                                  • Opcode Fuzzy Hash: a7115d03ca896a7c9ac221be6fc0e5871e4791cfbbba85e33340d8583082e9e8
                                                                  • Instruction Fuzzy Hash: 5841F671E003189BDB11DFE1D885AAEBBB8FB04701F10417AE905AB296EB749948CB54
                                                                  APIs
                                                                  • InterlockedIncrement.KERNEL32(00458704), ref: 00401D89
                                                                  • CreateMutexW.KERNEL32(00000000,00000000,00000000), ref: 00401DA3
                                                                  • CreateEventW.KERNEL32(00000000,00000000,00000000,00000000), ref: 00401DB0
                                                                  • _memset.LIBCMT ref: 00401DF5
                                                                  • RegisterWaitForSingleObject.KERNEL32(?,000000FF,00402979,?,000000FF,00000000), ref: 00401E4D
                                                                  • _memset.LIBCMT ref: 00401E65
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: Create_memset$EventIncrementInterlockedMutexObjectRegisterSingleWait
                                                                  • String ID:
                                                                  • API String ID: 1833494848-0
                                                                  • Opcode ID: 8f3ea080f5909efb5ad4b17d097164667e4eecb0757520fd3afd6588928d7abd
                                                                  • Instruction ID: c68b0f7afdb6d0b44564a3354cfc5c327a5b1ae1362e248b0ea759e646b38897
                                                                  • Opcode Fuzzy Hash: 8f3ea080f5909efb5ad4b17d097164667e4eecb0757520fd3afd6588928d7abd
                                                                  • Instruction Fuzzy Hash: F63103B1900B04EFE7308F6AD9C8853FBF8FB087447904A3EE59A82A51D374A904CF65
                                                                  APIs
                                                                  • __EH_prolog3.LIBCMT ref: 00414A1E
                                                                  • FindWindowW.USER32(itorrent-class-name,00000000), ref: 00414A2D
                                                                  • SendMessageTimeoutW.USER32(00000000,?,00000000,00000000,00000BB8,00000000), ref: 00414A43
                                                                    • Part of subcall function 004085B7: __EH_prolog3.LIBCMT ref: 004085BE
                                                                    • Part of subcall function 0040792F: __EH_prolog3_catch.LIBCMT ref: 00407936
                                                                    • Part of subcall function 0040792F: char_traits.LIBCPMT ref: 0040794D
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3$FindH_prolog3_catchMessageSendTimeoutWindowchar_traits
                                                                  • String ID: can't send message$itorrent-class-name
                                                                  • API String ID: 2380652074-242733843
                                                                  • Opcode ID: c293e405a5ad83a1a7cd74c49249aeb787a6cfcd64cf7fdd45ef6b0baa098a30
                                                                  • Instruction ID: a5902802bd7f2a89dc1fb4598dcc9552141cbded24a7b90d661c28a038e26ef9
                                                                  • Opcode Fuzzy Hash: c293e405a5ad83a1a7cd74c49249aeb787a6cfcd64cf7fdd45ef6b0baa098a30
                                                                  • Instruction Fuzzy Hash: 21F06D31A41244E7EB24EB62CC09F9B7A38EBC4794F4042AEB415A21D1EB795E41CA2D
                                                                  APIs
                                                                  • InterlockedCompareExchange.KERNEL32(004586F4,00000001,00000000), ref: 00401C1A
                                                                  • LocalAlloc.KERNEL32(00000040,00000024,?,?,004028FF,0044A660,00000010,004031CF,0044A708,00000040,00405325), ref: 00401C50
                                                                  • InterlockedIncrement.KERNEL32(00458704), ref: 00401C67
                                                                  • CreateMutexW.KERNEL32(00000000,00000000,00000000,?,?,004028FF,0044A660,00000010,004031CF,0044A708,00000040,00405325), ref: 00401C88
                                                                  • InterlockedCompareExchange.KERNEL32(004586F4,00000002,00000001), ref: 00401CC5
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: Interlocked$CompareExchange$AllocCreateIncrementLocalMutex
                                                                  • String ID:
                                                                  • API String ID: 3012754271-0
                                                                  • Opcode ID: b39fb9e0a3e9803ab504a51884403c29bf13b5b70fb1193f3a7a58915466322f
                                                                  • Instruction ID: ce7a2835e7ce0243f2117c960c92dd9d6b795060a416a0aed5c1d803c5a39948
                                                                  • Opcode Fuzzy Hash: b39fb9e0a3e9803ab504a51884403c29bf13b5b70fb1193f3a7a58915466322f
                                                                  • Instruction Fuzzy Hash: 6911B470A853019FE7208F65AC89B167BE4EB14705F20453EE186A72A2CFB8D844CB5D
                                                                  APIs
                                                                  • GetDlgItem.USER32(?,00000001), ref: 004138CE
                                                                  • ShowWindow.USER32(00000000,00000005,?,00413935,004479D0,00000001,?,00413995,004479DC,004479B4,?,?), ref: 004138DF
                                                                  • SetWindowTextW.USER32(00000000,00000000), ref: 004138E9
                                                                  • KiUserCallbackDispatcher.NTDLL(00000000,00000000), ref: 004138F9
                                                                  • ShowWindow.USER32(00000000,00000000,?,00413935,004479D0,00000001,?,00413995,004479DC,004479B4,?,?), ref: 00413904
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: Window$Show$CallbackDispatcherItemTextUser
                                                                  • String ID:
                                                                  • API String ID: 3009180066-0
                                                                  • Opcode ID: 3df1d8774f34f60644f68aedfe049b27b8c98bafc3cc74ece59a92cd6ffba44d
                                                                  • Instruction ID: a9f365e17780173bf2c17dc90666567f9e851d3e94579d76190df5339c1d2214
                                                                  • Opcode Fuzzy Hash: 3df1d8774f34f60644f68aedfe049b27b8c98bafc3cc74ece59a92cd6ffba44d
                                                                  • Instruction Fuzzy Hash: EAE06DB0401114BBD7111B60AC0CFEF3E6CEF09392F448075F90589060C7798A598BAD
                                                                  APIs
                                                                  • __EH_prolog3_GS.LIBCMT ref: 00411559
                                                                  • char_traits.LIBCPMT ref: 004116CE
                                                                    • Part of subcall function 0040532C: __EH_prolog3_GS.LIBCMT ref: 00405336
                                                                    • Part of subcall function 00410615: ShowWindow.USER32(?,00000000,?,00411580,0000009C,0041243E,7055389B), ref: 00410644
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3_$ShowWindowchar_traits
                                                                  • String ID: <tD$\tD
                                                                  • API String ID: 1583159508-3212539840
                                                                  • Opcode ID: 187e3ae5121366d6cf71a609f4042e82354bf5ff609e8d0ca2fb2d5f2095b554
                                                                  • Instruction ID: ea5f8b0a1890d54aa32068c50903125ca2b85fda49d5b0a40865c06dde4e03ec
                                                                  • Opcode Fuzzy Hash: 187e3ae5121366d6cf71a609f4042e82354bf5ff609e8d0ca2fb2d5f2095b554
                                                                  • Instruction Fuzzy Hash: 8441A571A00200BBC724EF66DC56DAE77B8DF8534AB10413FB506672E2DB789E44CA6C
                                                                  APIs
                                                                  • FindWindowW.USER32(itorrent-class-name,00000000), ref: 0040DD43
                                                                  • SendMessageTimeoutW.USER32(00000000,?,?,?,00000000,00000BB8,00000000), ref: 0040DD56
                                                                    • Part of subcall function 004085B7: __EH_prolog3.LIBCMT ref: 004085BE
                                                                    • Part of subcall function 0040792F: __EH_prolog3_catch.LIBCMT ref: 00407936
                                                                    • Part of subcall function 0040792F: char_traits.LIBCPMT ref: 0040794D
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: FindH_prolog3H_prolog3_catchMessageSendTimeoutWindowchar_traits
                                                                  • String ID: can't send message$itorrent-class-name
                                                                  • API String ID: 3422181065-242733843
                                                                  • Opcode ID: b843819ff71e2acda081fc91101f02dfae0078d9b181fb62d8f63b876061580a
                                                                  • Instruction ID: 2022d90520a29f8c03f4c7d797f171016e2f1ec82433d37ee9bad13f432537bb
                                                                  • Opcode Fuzzy Hash: b843819ff71e2acda081fc91101f02dfae0078d9b181fb62d8f63b876061580a
                                                                  • Instruction Fuzzy Hash: 6711A572648704AFD324DF55DC45F57B7ACEB84764F00473EB869922D0EB349C08C66A
                                                                  APIs
                                                                  • __EH_prolog3_GS.LIBCMT ref: 00403A2C
                                                                  • InterlockedCompareExchange.KERNEL32(00458710,00000001,00000000), ref: 00403A6A
                                                                    • Part of subcall function 00403832: __EH_prolog3_GS.LIBCMT ref: 00403839
                                                                    • Part of subcall function 00403832: GetComputerNameW.KERNEL32(00000000,?), ref: 00403861
                                                                  • _memset.LIBCMT ref: 00403A97
                                                                    • Part of subcall function 004038C5: __EH_prolog3.LIBCMT ref: 004038CC
                                                                    • Part of subcall function 004038C5: LookupAccountNameW.ADVAPI32(00000000,?,?,00000044,?,?,?), ref: 0040392E
                                                                    • Part of subcall function 004038C5: GetLastError.KERNEL32(?,00000044,?,?,?,?,00000000,00000400,?,00000028,00403AB2), ref: 0040393A
                                                                    • Part of subcall function 004038C5: LookupAccountNameW.ADVAPI32(00000000,?,?,00000044,?,00000400,?), ref: 00403985
                                                                  • InterlockedCompareExchange.KERNEL32(00458710,00000002,00000001), ref: 00403B3F
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: Name$AccountCompareExchangeH_prolog3_InterlockedLookup$ComputerErrorH_prolog3Last_memset
                                                                  • String ID:
                                                                  • API String ID: 948639594-0
                                                                  • Opcode ID: d3241d605ed008ceaad431133dc90c281880e0e23d26046d27db68e369687634
                                                                  • Instruction ID: e36c548cc8532812103bb00674b640a8bb1c579074a91dbbcbc07500ddde12d6
                                                                  • Opcode Fuzzy Hash: d3241d605ed008ceaad431133dc90c281880e0e23d26046d27db68e369687634
                                                                  • Instruction Fuzzy Hash: CB311D709002099EDF20DFA6DC86AAE7BB8EB54309F60457EA445B7192DF385F05CF58
                                                                  APIs
                                                                  • BeginPaint.USER32(?,?), ref: 0040F568
                                                                  • GdipCreateFromHDC.GDIPLUS(00000000,00000000), ref: 0040F57B
                                                                  • EndPaint.USER32(?,?), ref: 0040F5DD
                                                                  • GdipDeleteGraphics.GDIPLUS(00000000), ref: 0040F5E4
                                                                    • Part of subcall function 004034DA: MulDiv.KERNEL32(?,00000060), ref: 004034ED
                                                                    • Part of subcall function 004034BD: MulDiv.KERNEL32(?,00000060), ref: 004034D0
                                                                    • Part of subcall function 0040F3B5: GdipDrawImageRectI.GDIPLUS(?,00000000,?,?,?,?,00000000,00000000,?,?,0040E7BE,?,?,?,?), ref: 0040F3E0
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: Gdip$Paint$BeginCreateDeleteDrawFromGraphicsImageRect
                                                                  • String ID:
                                                                  • API String ID: 592685484-0
                                                                  • Opcode ID: 0a103ca5ba2061105722b5abfc3ed988cc725e8c922bdb30184cd3f89d5cad9e
                                                                  • Instruction ID: 708799fc8ffc8ede8b9af7f270b7d69b0e9536f5fc83431f7467b01dd581b625
                                                                  • Opcode Fuzzy Hash: 0a103ca5ba2061105722b5abfc3ed988cc725e8c922bdb30184cd3f89d5cad9e
                                                                  • Instruction Fuzzy Hash: 6A211D71E00218ABDB11EFE1DC85AAEBBB8FF04715F00407AE905AF295DB749909CB54
                                                                  APIs
                                                                  • _memset.LIBCMT ref: 004037B6
                                                                  • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004037CA
                                                                  • _wcspbrk.LIBCMT ref: 004037E4
                                                                  • GetVolumeInformationW.KERNEL32(?,00000000,00000000,0045870C,00000000,00000000,00000000,00000000), ref: 00403807
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: DirectoryInformationSystemVolume_memset_wcspbrk
                                                                  • String ID:
                                                                  • API String ID: 4207159501-0
                                                                  • Opcode ID: 3851bd57c96e60d986f4afca600b6817bce527d205386beda2cef5a5b6028ce1
                                                                  • Instruction ID: 8d3c35e09ee49b6649952880435fb990dbf5a3863dc0abe60ee6a35b4de795e5
                                                                  • Opcode Fuzzy Hash: 3851bd57c96e60d986f4afca600b6817bce527d205386beda2cef5a5b6028ce1
                                                                  • Instruction Fuzzy Hash: AB118671600358A6DB24DF65AC4AF977BBCEB85705F5044BEE804A3181EE7896448758
                                                                  APIs
                                                                  • GetModuleHandleW.KERNEL32(Winhttp.dll,0044A450,00000010), ref: 004013E4
                                                                  • FormatMessageW.KERNEL32(00001000,00000000,?,00000409,00000000,00000000,00000000,?,?,?,?,?,?,?,0044A450,00000010), ref: 00401414
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: FormatHandleMessageModule
                                                                  • String ID: Winhttp.dll
                                                                  • API String ID: 2046974992-1936088768
                                                                  • Opcode ID: 3f3a43dfaef07a0e8d3274fae0f0b3ac11d86639cd491b6004b7c5f929e18ab0
                                                                  • Instruction ID: 307b5429638d1c4b25c0efe9815543af61af06daa379b25b45bdec2b25166015
                                                                  • Opcode Fuzzy Hash: 3f3a43dfaef07a0e8d3274fae0f0b3ac11d86639cd491b6004b7c5f929e18ab0
                                                                  • Instruction Fuzzy Hash: 33F0A735B8021467FF149660DC46FEE72B5AB88705F60803AF601F61D2DAEC9C498669
                                                                  APIs
                                                                  • Sleep.KERNEL32(0000012C,?,?,?,?,?,?,0044A5B0,00000024), ref: 004020A5
                                                                  • SetEvent.KERNEL32(?,?,?,?,?,?,?,0044A5B0,00000024), ref: 004020B5
                                                                  • LocalFree.KERNEL32(?), ref: 00402151
                                                                    • Part of subcall function 004013BB: GetModuleHandleW.KERNEL32(Winhttp.dll,0044A450,00000010), ref: 004013E4
                                                                    • Part of subcall function 004013BB: FormatMessageW.KERNEL32(00001000,00000000,?,00000409,00000000,00000000,00000000,?,?,?,?,?,?,?,0044A450,00000010), ref: 00401414
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: EventFormatFreeHandleLocalMessageModuleSleep
                                                                  • String ID:
                                                                  • API String ID: 1208760597-0
                                                                  • Opcode ID: 34bbda023f88af172650f5bbb7bae63511b0514b416d847a766aa1df86f5dd56
                                                                  • Instruction ID: 4ed066714402e564278107c9e41f844459bfb99c173ae935f3f9eea081d3dd61
                                                                  • Opcode Fuzzy Hash: 34bbda023f88af172650f5bbb7bae63511b0514b416d847a766aa1df86f5dd56
                                                                  • Instruction Fuzzy Hash: D7314A74A00755DFDB20CF68CA8869EBBF1BF08300F10453EEA46A72D1D7B4A905CB55
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: AllocateH_prolog3_catch_memmove
                                                                  • String ID:
                                                                  • API String ID: 1361164945-0
                                                                  • Opcode ID: 9ec0de90a9d7fcdd0df470cffc4ba2d5c64b30482fa4997d5e23780b65fb35c8
                                                                  • Instruction ID: 94b98c7b50c0e357ab663e93cb74f291f9b316895d6d4c31291414a55532675c
                                                                  • Opcode Fuzzy Hash: 9ec0de90a9d7fcdd0df470cffc4ba2d5c64b30482fa4997d5e23780b65fb35c8
                                                                  • Instruction Fuzzy Hash: 6721D7B1704201AFDB24DF29D94052EB7E5ABC5710B204A3FEA52B73C0E779AE418799
                                                                  APIs
                                                                  • _malloc.LIBCMT ref: 00423D82
                                                                    • Part of subcall function 004233F8: __FF_MSGBANNER.LIBCMT ref: 0042340F
                                                                    • Part of subcall function 004233F8: __NMSG_WRITE.LIBCMT ref: 00423416
                                                                    • Part of subcall function 004233F8: RtlAllocateHeap.NTDLL(00660000,00000000,00000001,?,?,?,?,004011E6), ref: 0042343B
                                                                  • std::exception::exception.LIBCMT ref: 00423DA0
                                                                  • __CxxThrowException@8.LIBCMT ref: 00423DB5
                                                                    • Part of subcall function 004274A2: RaiseException.KERNEL32(?,?,00438F94,?,?,?,?,?,?,?,00438F94,?,0044D650,?), ref: 004274F7
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: AllocateExceptionException@8HeapRaiseThrow_mallocstd::exception::exception
                                                                  • String ID:
                                                                  • API String ID: 3074076210-0
                                                                  • Opcode ID: 6f1030be720939e8951f76b3420b6e3d4ea339633f594cd4e827a920ca4b4c1f
                                                                  • Instruction ID: 8a562d6bdb557be7452c0151b22a5cd5c309c3df1999a798643c3039cde3d4a7
                                                                  • Opcode Fuzzy Hash: 6f1030be720939e8951f76b3420b6e3d4ea339633f594cd4e827a920ca4b4c1f
                                                                  • Instruction Fuzzy Hash: CFF0D63160022D62CB00BEA5F815ADE7BAC9F01355F90406BFC0495142DBBC9B4495DD
                                                                  APIs
                                                                  • GetWindowLongW.USER32(?,000000EB), ref: 0040FCDD
                                                                  • SendMessageW.USER32(?,00000401,00000000,00000000), ref: 0040FD01
                                                                  • CallWindowProcW.USER32(00000000,?,00000115,?,?), ref: 0040FD15
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: Window$CallLongMessageProcSend
                                                                  • String ID:
                                                                  • API String ID: 1710423600-0
                                                                  • Opcode ID: 1f77e6b3df5d134f099b137f7e1addfa66afec787ccef4aac6bd8d4b50375db5
                                                                  • Instruction ID: 2f91cdc8fa920bc7c215477432e628487fa6370c30f5ef08a0ea97e1865c7a30
                                                                  • Opcode Fuzzy Hash: 1f77e6b3df5d134f099b137f7e1addfa66afec787ccef4aac6bd8d4b50375db5
                                                                  • Instruction Fuzzy Hash: F0F0A536440218FBDF215F80EC09F9A3F66FB04761F108535FA56690F0C7B69964EB88
                                                                  APIs
                                                                    • Part of subcall function 0040E337: CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000190,00000000,00000000,00000000,000000CC,00000000,00000000,00000005,00000000,Calibri), ref: 0040E38B
                                                                    • Part of subcall function 0040E337: CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,000000CC,00000000,00000000,00000005,00000000,Calibri), ref: 0040E3B5
                                                                    • Part of subcall function 0040E337: CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,000000CC,00000000,00000000,00000005,00000002,Arial), ref: 0040E3DF
                                                                    • Part of subcall function 004034BD: MulDiv.KERNEL32(?,00000060), ref: 004034D0
                                                                    • Part of subcall function 004034DA: MulDiv.KERNEL32(?,00000060), ref: 004034ED
                                                                    • Part of subcall function 0040E49D: CreateWindowExW.USER32(00000000,?,00445D78,40000000,?,?,?,?,?,00000000,00000000,00000000), ref: 0040E4F2
                                                                    • Part of subcall function 0040E49D: SetWindowLongW.USER32(00000000,000000EB), ref: 0040E4FF
                                                                    • Part of subcall function 00405BC7: CreateWindowExW.USER32(00000000,BUTTON,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00405BF7
                                                                  • SendMessageW.USER32(?,00000030,00000001,000007E9), ref: 004138A7
                                                                  Strings
                                                                  • iTorrentNavigationButtons, xrefs: 004137B4
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: Create$FontWindow$LongMessageSend
                                                                  • String ID: iTorrentNavigationButtons
                                                                  • API String ID: 2996320595-1664891198
                                                                  • Opcode ID: 26bbc0279171d5119fb7f9182f3d60f7d03dd7957a3dd70ad5ccc57641d433dc
                                                                  • Instruction ID: a2f05c57cc26bc3731ab7a79e00e81dd5b6649b0c14f3c3b2f548202be867a25
                                                                  • Opcode Fuzzy Hash: 26bbc0279171d5119fb7f9182f3d60f7d03dd7957a3dd70ad5ccc57641d433dc
                                                                  • Instruction Fuzzy Hash: BD416D72B40205ABDB14DFA5CC56FAFBBB8EB48704F10452EB601BB1C1D6B4A905CB58
                                                                  APIs
                                                                  • __EH_prolog3_GS.LIBCMT ref: 00405336
                                                                    • Part of subcall function 004057A5: __EH_prolog3.LIBCMT ref: 004057AC
                                                                    • Part of subcall function 00405427: char_traits.LIBCPMT ref: 00405436
                                                                    • Part of subcall function 00405457: char_traits.LIBCPMT ref: 00405468
                                                                    • Part of subcall function 0040403B: _memmove.LIBCMT ref: 0040405B
                                                                    • Part of subcall function 00405283: InterlockedExchange.KERNEL32(004585B4,00000001), ref: 004052C4
                                                                    • Part of subcall function 00405283: ResetEvent.KERNEL32 ref: 004052D4
                                                                  Strings
                                                                  • http://s.itorrent.bz/i/, xrefs: 0040535D
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: char_traits$EventExchangeH_prolog3H_prolog3_InterlockedReset_memmove
                                                                  • String ID: http://s.itorrent.bz/i/
                                                                  • API String ID: 1624662650-3304919266
                                                                  • Opcode ID: 5d7a520cb703daf64d2334d41863f1741aea78d79575678961b9c8f46d9ebd25
                                                                  • Instruction ID: e5304d23fb56f1f56c4bdf6b07e9e27f2e8f83a646b3398d09241fe9b780a36c
                                                                  • Opcode Fuzzy Hash: 5d7a520cb703daf64d2334d41863f1741aea78d79575678961b9c8f46d9ebd25
                                                                  • Instruction Fuzzy Hash: DB218F718011549ACB14FBA1DC41FDEBB78EF96308F0040AEA145B3186DF381B49CF26
                                                                  APIs
                                                                  • __EH_prolog3_GS.LIBCMT ref: 0041130D
                                                                    • Part of subcall function 00403E1D: char_traits.LIBCPMT ref: 00403E36
                                                                    • Part of subcall function 00406633: __EH_prolog3_GS.LIBCMT ref: 0040663D
                                                                    • Part of subcall function 00406633: _memset.LIBCMT ref: 0040666B
                                                                    • Part of subcall function 00406633: SHGetFolderPathW.SHELL32(00000000,0000001C,00000000,00000000,?), ref: 0040667F
                                                                    • Part of subcall function 00406857: __EH_prolog3.LIBCMT ref: 0040685E
                                                                    • Part of subcall function 00406857: PathAppendW.SHLWAPI(00000000,?,0000000C,004069FA,?,itorrent-application.exe,0000003C,0040756C), ref: 004068C1
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3_Path$AppendFolderH_prolog3_memsetchar_traits
                                                                  • String ID: itorrent\itorrent.exe
                                                                  • API String ID: 3000136504-428485718
                                                                  • Opcode ID: 3f2f096c239c7e203c40f53230cc7cee27990187422e16f5e1f3c474985c9e4c
                                                                  • Instruction ID: bac4b175f3958acafe5ec37a269995df8cdfe15ddf5df44272d4d6bc2642ff0b
                                                                  • Opcode Fuzzy Hash: 3f2f096c239c7e203c40f53230cc7cee27990187422e16f5e1f3c474985c9e4c
                                                                  • Instruction Fuzzy Hash: 47F05E71E041449ADB18FBA6D892AEDB6709F88704F50802FF511772C1DFB81E06C759
                                                                  APIs
                                                                  • CreateWindowExW.USER32(00000000,BUTTON,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00405BF7
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: CreateWindow
                                                                  • String ID: BUTTON
                                                                  • API String ID: 716092398-3405671355
                                                                  • Opcode ID: 0976db21665150e728b6e0bec13a01459411c321d6fd22b2cfd6a2c934d6ddab
                                                                  • Instruction ID: cb5bb712cf724718036834a1515b45ee0ee342fb5718bc70c8ae12edbfad662f
                                                                  • Opcode Fuzzy Hash: 0976db21665150e728b6e0bec13a01459411c321d6fd22b2cfd6a2c934d6ddab
                                                                  • Instruction Fuzzy Hash: B6E0ED76110209BFDF158F94DC05DDA7BA9EB0C350F004529FE4492210D276D830DF94
                                                                  APIs
                                                                  • __EH_prolog3_GS.LIBCMT ref: 004100E3
                                                                    • Part of subcall function 00423D6A: _malloc.LIBCMT ref: 00423D82
                                                                  • _memmove.LIBCMT ref: 00410242
                                                                    • Part of subcall function 0041444F: __EH_prolog3_GS.LIBCMT ref: 00414456
                                                                    • Part of subcall function 0041444F: CreateWindowExW.USER32(00000000,Static,00447DF8,50000000,00000000,?,00000000,?,?,00000001,00000000,00000000), ref: 00414508
                                                                    • Part of subcall function 0041444F: SendMessageW.USER32(00000000,00000030,00000001), ref: 00414519
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3_$CreateMessageSendWindow_malloc_memmove
                                                                  • String ID:
                                                                  • API String ID: 213686801-0
                                                                  • Opcode ID: 674ff1a0446d0ebce77cad0dcf2fbcbb0bcba57922ea5296775ccbb1c1fe51a4
                                                                  • Instruction ID: cf1365db9e36f3fe3433c11f714061fae5af75ae3dae2beb034331713039c458
                                                                  • Opcode Fuzzy Hash: 674ff1a0446d0ebce77cad0dcf2fbcbb0bcba57922ea5296775ccbb1c1fe51a4
                                                                  • Instruction Fuzzy Hash: A04186B0E11314FADB149FB9AD05ADE7AF5AB48701F10012FF504E7281DB7D8A809B5C
                                                                  APIs
                                                                  • CoInitializeEx.OLE32(00000000,00000002,7055389B,?,?,?,?,?,?,0043D89B,000000FF), ref: 0040DF70
                                                                  • CoUninitialize.OLE32 ref: 0040DFDA
                                                                    • Part of subcall function 0040DD05: FindWindowW.USER32(itorrent-class-name,00000000), ref: 0040DD43
                                                                    • Part of subcall function 0040DD05: SendMessageTimeoutW.USER32(00000000,?,?,?,00000000,00000BB8,00000000), ref: 0040DD56
                                                                    • Part of subcall function 00401CD0: @_EH4_CallFilterFunc@8.LIBCMT ref: 00401D04
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: CallFilterFindFunc@8InitializeMessageSendTimeoutUninitializeWindow
                                                                  • String ID:
                                                                  • API String ID: 3160900150-0
                                                                  • Opcode ID: b6be8f0c1745c311022a3873f2f9863ba97cc8d3a31f1207c33aedeea5871022
                                                                  • Instruction ID: 92c7aa3c30d3524f290666d40b10d53197d06d95191621355e96eca957434557
                                                                  • Opcode Fuzzy Hash: b6be8f0c1745c311022a3873f2f9863ba97cc8d3a31f1207c33aedeea5871022
                                                                  • Instruction Fuzzy Hash: 5E412530604221ABCB14DF26D841A26B7A5FF84754F54853EF946AB3C1CB39EC15CBA9
                                                                  APIs
                                                                    • Part of subcall function 004028EE: @_EH4_CallFilterFunc@8.LIBCMT ref: 0040293E
                                                                  • InterlockedExchange.KERNEL32(004585B4,00000001), ref: 004052C4
                                                                  • ResetEvent.KERNEL32 ref: 004052D4
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: CallEventExchangeFilterFunc@8InterlockedReset
                                                                  • String ID:
                                                                  • API String ID: 1908020965-0
                                                                  • Opcode ID: 1d69a598f727ffd9df85056eadd5e4eee1e9e08fdb52f713ad52038464657bff
                                                                  • Instruction ID: 7569721b6002eb3639a4ac76410eb4389159f527074c472e0e5f513fd6d0fc64
                                                                  • Opcode Fuzzy Hash: 1d69a598f727ffd9df85056eadd5e4eee1e9e08fdb52f713ad52038464657bff
                                                                  • Instruction Fuzzy Hash: 6E113A70904609DFCF14DFA999055AEBBF8EB04305B10007EE845F7281EB789A048FA9
                                                                  APIs
                                                                  • __EH_prolog3_GS.LIBCMT ref: 00403839
                                                                  • GetComputerNameW.KERNEL32(00000000,?), ref: 00403861
                                                                    • Part of subcall function 00404FB3: __EH_prolog3_catch.LIBCMT ref: 00404FBA
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: ComputerH_prolog3_H_prolog3_catchName
                                                                  • String ID:
                                                                  • API String ID: 956767328-0
                                                                  • Opcode ID: effbc79be8bebc1077bc9ea17bef86e5566fb28ddb3ebd15134279ec9c2dbf9f
                                                                  • Instruction ID: 668ca50507ffed8530ddbc0ed6b8868e0dea4c47056d38f7951ea06b0d489dfe
                                                                  • Opcode Fuzzy Hash: effbc79be8bebc1077bc9ea17bef86e5566fb28ddb3ebd15134279ec9c2dbf9f
                                                                  • Instruction Fuzzy Hash: 15011671D012199BDB05EFA5E885EEEB6B9EF44704F50803FF901B6281DB785E048B59
                                                                  APIs
                                                                  • LocalAlloc.KERNEL32(00000040,0000000C,?,?,?,?,?,?,0044A5D0,0000000C), ref: 00402179
                                                                  Strings
                                                                  • WINHTTP-API-SEND-REQUEST, xrefs: 0040219D
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: AllocLocal
                                                                  • String ID: WINHTTP-API-SEND-REQUEST
                                                                  • API String ID: 3494564517-4945329
                                                                  • Opcode ID: 954a9a3123a20bce4e95129222deea2c821534cef3a2db97455d659f1f924333
                                                                  • Instruction ID: 8e94b1e048235f17d67f5e1c50992b9694df62bbdc7251cc7ad3766ab22ba950
                                                                  • Opcode Fuzzy Hash: 954a9a3123a20bce4e95129222deea2c821534cef3a2db97455d659f1f924333
                                                                  • Instruction Fuzzy Hash: C8115274514705DBE7249F108709B2ABAA1BB04344F64C52FA2A66E3C1CBFD8841DB5A
                                                                  APIs
                                                                  • CreateWindowExW.USER32(00000000,?,00445D78,40000000,?,?,?,?,?,00000000,00000000,00000000), ref: 0040E4F2
                                                                  • SetWindowLongW.USER32(00000000,000000EB), ref: 0040E4FF
                                                                    • Part of subcall function 0040E40C: RegisterClassW.USER32(00000000), ref: 0040E484
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: Window$ClassCreateLongRegister
                                                                  • String ID:
                                                                  • API String ID: 3115397960-0
                                                                  • Opcode ID: b1476544bcde4fdae7f6168dd8835245cb4384ae864d72798d68ce068ccfaa5b
                                                                  • Instruction ID: de94d7c2e28488796459062a6801303765502e19b291a76bbd2ac58994dbb77b
                                                                  • Opcode Fuzzy Hash: b1476544bcde4fdae7f6168dd8835245cb4384ae864d72798d68ce068ccfaa5b
                                                                  • Instruction Fuzzy Hash: D3016272510205BFDF048F55DC09EEB7BA9EF48260F00862EF91693160D676EC20DF64
                                                                  APIs
                                                                  • GetDlgItem.USER32(?,00000004), ref: 0041391B
                                                                  • ShowWindow.USER32(00000000,?,00413995,004479DC,004479B4,?,?,00000001,004105F9), ref: 00413922
                                                                    • Part of subcall function 004138C8: GetDlgItem.USER32(?,00000001), ref: 004138CE
                                                                    • Part of subcall function 004138C8: ShowWindow.USER32(00000000,00000005,?,00413935,004479D0,00000001,?,00413995,004479DC,004479B4,?,?), ref: 004138DF
                                                                    • Part of subcall function 004138C8: SetWindowTextW.USER32(00000000,00000000), ref: 004138E9
                                                                    • Part of subcall function 004138C8: KiUserCallbackDispatcher.NTDLL(00000000,00000000), ref: 004138F9
                                                                    • Part of subcall function 004138C8: ShowWindow.USER32(00000000,00000000,?,00413935,004479D0,00000001,?,00413995,004479DC,004479B4,?,?), ref: 00413904
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: Window$Show$Item$CallbackDispatcherTextUser
                                                                  • String ID:
                                                                  • API String ID: 2832717868-0
                                                                  • Opcode ID: 1976d3b9705ca906daaab56296d3c48859cd71da050c80c3c7c9aa46e6e66fa8
                                                                  • Instruction ID: 6f314b82b3daf7277c23850297a14479244c6b2bf14b5ba8ead05a76500dd9b9
                                                                  • Opcode Fuzzy Hash: 1976d3b9705ca906daaab56296d3c48859cd71da050c80c3c7c9aa46e6e66fa8
                                                                  • Instruction Fuzzy Hash: BCF0A07678020433DE242B665C0AFEF3F5ACBC8B31F048035FA084A1D1C9B645959194
                                                                  APIs
                                                                    • Part of subcall function 00401CD0: @_EH4_CallFilterFunc@8.LIBCMT ref: 00401D04
                                                                  • InterlockedDecrement.KERNEL32(004585B4), ref: 00405269
                                                                  • SetEvent.KERNEL32 ref: 00405279
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: CallDecrementEventFilterFunc@8Interlocked
                                                                  • String ID:
                                                                  • API String ID: 4133710543-0
                                                                  • Opcode ID: fe9a648f2fdd4e81a0ae6a2a1d556a9dbdb0e1d07d3134d83d37dbc69bcad8ef
                                                                  • Instruction ID: be76d08ba9279ed93ec029bafc47a4bde4fee03edb845fc57e38135634a852ba
                                                                  • Opcode Fuzzy Hash: fe9a648f2fdd4e81a0ae6a2a1d556a9dbdb0e1d07d3134d83d37dbc69bcad8ef
                                                                  • Instruction Fuzzy Hash: C8E0863020424CDBCF20BF75D94599B7B99DF60752B04807FBC86A62A2EE34D815DE1C
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3
                                                                  • String ID:
                                                                  • API String ID: 431132790-0
                                                                  • Opcode ID: 8fd4919bb3321dfc137b7ffdf4e30d62ccebd8a60f3b6359af548321e3e13bba
                                                                  • Instruction ID: bf3a591855367322f8947fe7c89c3e6f27e2787d064bc30adee706ecd34b53c2
                                                                  • Opcode Fuzzy Hash: 8fd4919bb3321dfc137b7ffdf4e30d62ccebd8a60f3b6359af548321e3e13bba
                                                                  • Instruction Fuzzy Hash: B131C170900318DBDB14DFA6D945B9EBBB1AF04314F50882FE941BB6C1D7B8AA15CB58
                                                                  APIs
                                                                  • __EH_prolog3_GS.LIBCMT ref: 00410670
                                                                    • Part of subcall function 00406500: __EH_prolog3_GS.LIBCMT ref: 0040650A
                                                                    • Part of subcall function 00406500: _memset.LIBCMT ref: 0040652F
                                                                    • Part of subcall function 00406500: SHGetFolderPathW.SHELL32(00000000,00000024,00000000,00000000,?), ref: 00406550
                                                                    • Part of subcall function 00406961: __EH_prolog3_GS.LIBCMT ref: 00406968
                                                                    • Part of subcall function 00406B6C: __EH_prolog3_GS.LIBCMT ref: 00406B73
                                                                    • Part of subcall function 0040DD05: FindWindowW.USER32(itorrent-class-name,00000000), ref: 0040DD43
                                                                    • Part of subcall function 0040DD05: SendMessageTimeoutW.USER32(00000000,?,?,?,00000000,00000BB8,00000000), ref: 0040DD56
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3_$FindFolderMessagePathSendTimeoutWindow_memset
                                                                  • String ID:
                                                                  • API String ID: 2045075680-0
                                                                  • Opcode ID: c34bb9514d26797b4d61bbaa6bcef88f3a8b79c0706fd343ff11ea23375afb23
                                                                  • Instruction ID: bd9c5b4029ddc4b5b14556117afac751290a25f31be6dcf428b13ea730817b6c
                                                                  • Opcode Fuzzy Hash: c34bb9514d26797b4d61bbaa6bcef88f3a8b79c0706fd343ff11ea23375afb23
                                                                  • Instruction Fuzzy Hash: 09214F70901244AEE714EBA5D892FDEB774AF54308F50416EF206771C2EFB91E48CA6A
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: _memmove
                                                                  • String ID:
                                                                  • API String ID: 4104443479-0
                                                                  • Opcode ID: 3aa9390b80d65919700f0d847eb3e7dba5f69850868eb326f71a7f03eb72945e
                                                                  • Instruction ID: 5266540f0ccade041116b49708426db28b9b2cd6d9107cbdd913eff5253ecd6a
                                                                  • Opcode Fuzzy Hash: 3aa9390b80d65919700f0d847eb3e7dba5f69850868eb326f71a7f03eb72945e
                                                                  • Instruction Fuzzy Hash: AF01C4B0300214A7CA309E199D48E17BBB9DBE1B94B10043FFE556B281C7799D8283A9
                                                                  APIs
                                                                    • Part of subcall function 004032D7: InterlockedCompareExchange.KERNEL32(00458700,00000001,00000000), ref: 004032F2
                                                                    • Part of subcall function 004032D7: @_EH4_CallFilterFunc@8.LIBCMT ref: 00403318
                                                                  • WinHttpQueryOption.WINHTTP(?,0000002D,00000000,00000004,?,?,?,?,?,?,?,?,?,0044A640,00000018), ref: 0040280D
                                                                    • Part of subcall function 00401CD0: @_EH4_CallFilterFunc@8.LIBCMT ref: 00401D04
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: CallFilterFunc@8$CompareExchangeHttpInterlockedOptionQuery
                                                                  • String ID:
                                                                  • API String ID: 342496516-0
                                                                  • Opcode ID: 0316bfc44713fbd160e18318ac445caae2788ab8ef5872a50374c19b1f383303
                                                                  • Instruction ID: 23c20c00a59ac8856068a7cfdb68a5b7080264f1448a1c616cae31e354ed7b0d
                                                                  • Opcode Fuzzy Hash: 0316bfc44713fbd160e18318ac445caae2788ab8ef5872a50374c19b1f383303
                                                                  • Instruction Fuzzy Hash: 7F1170369412199BDF11AFA1CA09BEF7671BF08305F04422BE901762D1C7BD8A15DBAD
                                                                  APIs
                                                                    • Part of subcall function 00401C0E: InterlockedCompareExchange.KERNEL32(004586F4,00000001,00000000), ref: 00401C1A
                                                                    • Part of subcall function 004032D7: InterlockedCompareExchange.KERNEL32(00458700,00000001,00000000), ref: 004032F2
                                                                    • Part of subcall function 004032D7: @_EH4_CallFilterFunc@8.LIBCMT ref: 00403318
                                                                  • @_EH4_CallFilterFunc@8.LIBCMT ref: 0040293E
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: CallCompareExchangeFilterFunc@8Interlocked
                                                                  • String ID:
                                                                  • API String ID: 1286560512-0
                                                                  • Opcode ID: 70a45d6c7e8d70a6d568dee7e825a9ce6a202e904796f6987640f99755cc6958
                                                                  • Instruction ID: e43d089a9a5ad46b44628dfb7922b71590fd97a8ed18051ea5f7b3d494a4be53
                                                                  • Opcode Fuzzy Hash: 70a45d6c7e8d70a6d568dee7e825a9ce6a202e904796f6987640f99755cc6958
                                                                  • Instruction Fuzzy Hash: 7C018471F0112987DF14EAB18545BBEB2646F44719F54412EE410B72C2DBBCAA02CB59
                                                                  APIs
                                                                  • GdipDrawImageRectI.GDIPLUS(?,00000000,?,?,?,?,00000000,00000000,?,?,0040E7BE,?,?,?,?), ref: 0040F3E0
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: DrawGdipImageRect
                                                                  • String ID:
                                                                  • API String ID: 2615643336-0
                                                                  • Opcode ID: f9c6cad2bc47a2c1e7e80aba37559eb6afd511dcf033ae19184b0cafe6c434aa
                                                                  • Instruction ID: 79d3491990a948015b7396c0fe7cf8450c1a465bcc16ed5d694a72f56a678ef0
                                                                  • Opcode Fuzzy Hash: f9c6cad2bc47a2c1e7e80aba37559eb6afd511dcf033ae19184b0cafe6c434aa
                                                                  • Instruction Fuzzy Hash: 94F0F875204204AFA720DB2AE884C27BBECEB887A0315C07AFD09D7761D670EC04DA64
                                                                  APIs
                                                                  • SendMessageW.USER32(?,000007E9,00000001,00000000), ref: 00408318
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: MessageSend
                                                                  • String ID:
                                                                  • API String ID: 3850602802-0
                                                                  • Opcode ID: aeaa011d510f7a8c5bf90ee4cdf5a67ec8c24c794ec7388661ee39791820fe25
                                                                  • Instruction ID: dc583202dff9a4218e0daa36061b640b6729f6d3e5afef363736e77094788894
                                                                  • Opcode Fuzzy Hash: aeaa011d510f7a8c5bf90ee4cdf5a67ec8c24c794ec7388661ee39791820fe25
                                                                  • Instruction Fuzzy Hash: B9F08235140609BBDF214E40CE01F6B3B55FB84F10F00843ABE55B61E1CAB79860EB59
                                                                  APIs
                                                                  • SendMessageW.USER32(?,00000111,00000002,00000000), ref: 0041374B
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: MessageSend
                                                                  • String ID:
                                                                  • API String ID: 3850602802-0
                                                                  • Opcode ID: 95dbffa1924bcae8724867c76b01cb424e02993734de465939781a04aa05f91f
                                                                  • Instruction ID: 865921a0c2df3a8d8c525ca2dd410d97855f0108af456c7b7e3e16d034cd462a
                                                                  • Opcode Fuzzy Hash: 95dbffa1924bcae8724867c76b01cb424e02993734de465939781a04aa05f91f
                                                                  • Instruction Fuzzy Hash: 72F0A7B5100108BBDF240E46DC48EEB7B69DF80722F00C02AFA1A662A0D7759961D764
                                                                  APIs
                                                                  • ShowWindow.USER32(?,00000000,?,00411580,0000009C,0041243E,7055389B), ref: 00410644
                                                                    • Part of subcall function 0040F85A: __EH_prolog3.LIBCMT ref: 0040F864
                                                                    • Part of subcall function 0040F85A: GetDlgItem.USER32(?,00000001), ref: 0040F881
                                                                    • Part of subcall function 0040F85A: SetWindowTextW.USER32(00000000), ref: 0040F884
                                                                    • Part of subcall function 0040F85A: GetDlgItem.USER32(?,00000002), ref: 0040F8D4
                                                                    • Part of subcall function 0040F85A: SetWindowTextW.USER32(00000000), ref: 0040F8D7
                                                                    • Part of subcall function 0040F85A: GetDlgItem.USER32(?,00000003), ref: 0040F927
                                                                    • Part of subcall function 0040F85A: ShowWindow.USER32(00000000), ref: 0040F92A
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: Window$Item$ShowText$H_prolog3
                                                                  • String ID:
                                                                  • API String ID: 4168919072-0
                                                                  • Opcode ID: f1d9ea082a38186a43606ba2e145868ed12ef60976f4cfec5558c8d9d83c833b
                                                                  • Instruction ID: 95b2cb5853ba0c240e76f10601e9c141e5e3414a335874457e6c9d5a09da6e6a
                                                                  • Opcode Fuzzy Hash: f1d9ea082a38186a43606ba2e145868ed12ef60976f4cfec5558c8d9d83c833b
                                                                  • Instruction Fuzzy Hash: A0E0C235505308BFC765DFA8E9A286277E4B708343355413DE9069B332DE75A655CB0C
                                                                  APIs
                                                                  • GdipLoadImageFromStream.GDIPLUS(?,00000004,00000000,?,00405E0D,?), ref: 0040823D
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: FromGdipImageLoadStream
                                                                  • String ID:
                                                                  • API String ID: 3292405956-0
                                                                  • Opcode ID: c528bf07c7d919c4e62638fc022b2e6d18728a4da6385d23c9b2e19c8937e459
                                                                  • Instruction ID: 7989904027b07a6b6a4de08db85828f65adb4cd9ff2ac3a1bcc9cb8b60cfb2a0
                                                                  • Opcode Fuzzy Hash: c528bf07c7d919c4e62638fc022b2e6d18728a4da6385d23c9b2e19c8937e459
                                                                  • Instruction Fuzzy Hash: AED0C7B2500714AFD3115F49DC00B92BBECEB19761F11843BE959C3A20D7B1AC548BD4
                                                                  APIs
                                                                  • GetFileAttributesW.KERNEL32(?,0040DDD4,?,00000184,0040DFA6,?,00000000,?,?,?,?,?,?,0043D89B,000000FF), ref: 0040620C
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: AttributesFile
                                                                  • String ID:
                                                                  • API String ID: 3188754299-0
                                                                  • Opcode ID: 764fac2e8fbf55d0d209812d4278c3f2f0950fbfee0a6dfb5b18e54bb2438438
                                                                  • Instruction ID: 3acc1bba6fe9250dac20ed5de61099a30abc45875877385f2527a4616a95420f
                                                                  • Opcode Fuzzy Hash: 764fac2e8fbf55d0d209812d4278c3f2f0950fbfee0a6dfb5b18e54bb2438438
                                                                  • Instruction Fuzzy Hash: 2AC012300006045ADD285FB89A4815633117A9336A7A616FDD8779E5F2D23A883BDE18
                                                                  APIs
                                                                  • CloseHandle.KERNEL32(?,?,0040132B,?,00000000,?,00000000,00000000,00000002), ref: 004012D8
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: CloseHandle
                                                                  • String ID:
                                                                  • API String ID: 2962429428-0
                                                                  • Opcode ID: cfaa3d518079ea921169961b9f67efe39045ed32a5a7b471eddeac3bf3b24d2a
                                                                  • Instruction ID: 57364a660a17844b1e2c4155598bf2ba4be5a8d9723bb35b302bda452d35a581
                                                                  • Opcode Fuzzy Hash: cfaa3d518079ea921169961b9f67efe39045ed32a5a7b471eddeac3bf3b24d2a
                                                                  • Instruction Fuzzy Hash: 80D05E311181218BDB340E58B4443D273E45B11335F1106BFD0E0A11F0E37508C3CB48
                                                                  APIs
                                                                  • LocalAlloc.KERNEL32(00000040,000020B8,00000000,0040341B,0044A768,00000014,00402920,00000000,0044A660,00000010,004031CF,0044A708,00000040,00405325), ref: 00403487
                                                                    • Part of subcall function 00401D74: InterlockedIncrement.KERNEL32(00458704), ref: 00401D89
                                                                    • Part of subcall function 00401D74: CreateMutexW.KERNEL32(00000000,00000000,00000000), ref: 00401DA3
                                                                    • Part of subcall function 00401D74: CreateEventW.KERNEL32(00000000,00000000,00000000,00000000), ref: 00401DB0
                                                                    • Part of subcall function 00401D74: _memset.LIBCMT ref: 00401DF5
                                                                    • Part of subcall function 00401D74: RegisterWaitForSingleObject.KERNEL32(?,000000FF,00402979,?,000000FF,00000000), ref: 00401E4D
                                                                    • Part of subcall function 00401D74: _memset.LIBCMT ref: 00401E65
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: Create_memset$AllocEventIncrementInterlockedLocalMutexObjectRegisterSingleWait
                                                                  • String ID:
                                                                  • API String ID: 776868893-0
                                                                  • Opcode ID: e61d3bdc11ef1b1f56088c94409b99b2c9a9fba792d46c415c5e10c5ca171d39
                                                                  • Instruction ID: ff94d46f0bf551bc38da25d8bbc101c6da522402658c84efb967a27928ea67d4
                                                                  • Opcode Fuzzy Hash: e61d3bdc11ef1b1f56088c94409b99b2c9a9fba792d46c415c5e10c5ca171d39
                                                                  • Instruction Fuzzy Hash: AEC0123175431046D7756F35681DA562A988B00715B00093B6645EA1D1EA79CD018249
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: _memmove
                                                                  • String ID: Function has to be applied to node set$Out of memory$ThD$Unrecognized function or wrong parameter count$boolean$ceiling$concat$contains$count$false$floor$lang$last$local-name$name$namespace-uri$normalize-space$not$number$position$round$starts-with$string$string-length$substring$substring-after$substring-before$sum$translate$true
                                                                  • API String ID: 4104443479-292099856
                                                                  • Opcode ID: 00c1030bac0152f232b82cfa2fa631db5cdf3bcd992ecc23c22cd4d482a3f4ca
                                                                  • Instruction ID: dd2a558a63235b3a275755d240b47145ee984e9e40b6e92bab569130a6b2bb24
                                                                  • Opcode Fuzzy Hash: 00c1030bac0152f232b82cfa2fa631db5cdf3bcd992ecc23c22cd4d482a3f4ca
                                                                  • Instruction Fuzzy Hash: A132B078B006029BCB149F1AD4A45EA7796AF86314B18C45FE9068B391DF7DCDC2CB8D
                                                                  APIs
                                                                  • ___crtGetLocaleInfoA.LIBCMT ref: 00426448
                                                                    • Part of subcall function 0042F095: _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 0042F0A1
                                                                    • Part of subcall function 0042F095: __crtGetLocaleInfoA_stat.LIBCMT ref: 0042F0B6
                                                                  • GetLastError.KERNEL32(?,?,00000000,00000000,00000000), ref: 0042645A
                                                                  • ___crtGetLocaleInfoA.LIBCMT ref: 0042647A
                                                                  • ___crtGetLocaleInfoA.LIBCMT ref: 004264BC
                                                                  • __calloc_crt.LIBCMT ref: 0042648F
                                                                    • Part of subcall function 004260BF: __calloc_impl.LIBCMT ref: 004260CE
                                                                  • __calloc_crt.LIBCMT ref: 004264D1
                                                                  • _free.LIBCMT ref: 004264E9
                                                                  • _free.LIBCMT ref: 00426529
                                                                  • __calloc_crt.LIBCMT ref: 00426553
                                                                  • _free.LIBCMT ref: 00426579
                                                                  • __invoke_watson.LIBCMT ref: 004265C9
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: Locale$Info$___crt__calloc_crt_free$A_statErrorLastUpdateUpdate::___calloc_impl__crt__invoke_watson
                                                                  • String ID:
                                                                  • API String ID: 1731282729-0
                                                                  • Opcode ID: 2891f7f746bfcc08d5776edf2e941d83e6da90e5c3001e4ca6aca0ca3295f226
                                                                  • Instruction ID: b45ed7a188d37cc480fdbc60ee6aefe836d3705baec1dd2b2ffc4f9a3fe51c1b
                                                                  • Opcode Fuzzy Hash: 2891f7f746bfcc08d5776edf2e941d83e6da90e5c3001e4ca6aca0ca3295f226
                                                                  • Instruction Fuzzy Hash: 1C51A971A00225ABDF20AF75FC41B6B77B9EF04310F9140AAF94892241EF39CD94CB69
                                                                  Strings
                                                                  • Out of memory, xrefs: 0041E7BB
                                                                  • Unknown variable: variable set is not provided, xrefs: 0041E86F
                                                                  • Unmatched braces, xrefs: 0041E852
                                                                  • Unrecognized function call, xrefs: 0041E6FF
                                                                  • Unmatched square brace, xrefs: 0041E9A0
                                                                  • Predicate has to be applied to node set, xrefs: 0041E999
                                                                  • No comma between function arguments, xrefs: 0041E78D
                                                                  • Unknown variable: variable set does not contain the given name, xrefs: 0041E88C
                                                                  • Unrecognizable primary expression, xrefs: 0041E8DD
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: No comma between function arguments$Out of memory$Predicate has to be applied to node set$Unknown variable: variable set does not contain the given name$Unknown variable: variable set is not provided$Unmatched braces$Unmatched square brace$Unrecognizable primary expression$Unrecognized function call
                                                                  • API String ID: 0-3813216300
                                                                  • Opcode ID: 5252733e0a5684f79bab422b6ab25595581707d1f63b8439a664b84db0d7b7d2
                                                                  • Instruction ID: 01272e44c623096963bb3a2eb6df8d26170ca37a4bf71b21bc6642ef08071c1b
                                                                  • Opcode Fuzzy Hash: 5252733e0a5684f79bab422b6ab25595581707d1f63b8439a664b84db0d7b7d2
                                                                  • Instruction Fuzzy Hash: 4F9126746047018BD720FF2BC4415EBB7E5EF44704B50892FE85AC7291DB78E98ACB8A
                                                                  APIs
                                                                  • _wcscmp.LIBCMT ref: 00435CFE
                                                                  • _wcscmp.LIBCMT ref: 00435D0F
                                                                  • GetLocaleInfoW.KERNEL32(?,2000000B,?,00000002,?,?,00435FAD,?,00000000), ref: 00435D2B
                                                                  • GetLocaleInfoW.KERNEL32(?,20001004,?,00000002,?,?,00435FAD,?,00000000), ref: 00435D55
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: InfoLocale_wcscmp
                                                                  • String ID: ACP$OCP
                                                                  • API String ID: 1351282208-711371036
                                                                  • Opcode ID: bd02c2f78d9f965cf9d33363220fe477c8f8661e286fb4df1c28877fb5a6d962
                                                                  • Instruction ID: 1b7f410931fcb0878abe7377ea319cad40b6847f393f2ecf2253e92768810b8c
                                                                  • Opcode Fuzzy Hash: bd02c2f78d9f965cf9d33363220fe477c8f8661e286fb4df1c28877fb5a6d962
                                                                  • Instruction Fuzzy Hash: E101D235241905AAEB109E65EC09FDB73A8AF0C765F10D427F904DE190EB28DA81878C
                                                                  APIs
                                                                  • __EH_prolog3_GS.LIBCMT ref: 0040A72D
                                                                  • _memset.LIBCMT ref: 0040A74A
                                                                  • GetVersionExW.KERNEL32(?), ref: 0040A75F
                                                                    • Part of subcall function 0040DCB3: swprintf.LIBCMT ref: 0040DCDB
                                                                    • Part of subcall function 0040403B: _memmove.LIBCMT ref: 0040405B
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3_Version_memmove_memsetswprintf
                                                                  • String ID:
                                                                  • API String ID: 4236661430-0
                                                                  • Opcode ID: 02e30233b3e23df57af844f2654d147a4014cec4e5117c52e53ae322f5b99df3
                                                                  • Instruction ID: c0de6514043eb7f622a24806a7c7daaada07686435340e00f8371b03e72e0744
                                                                  • Opcode Fuzzy Hash: 02e30233b3e23df57af844f2654d147a4014cec4e5117c52e53ae322f5b99df3
                                                                  • Instruction Fuzzy Hash: 0111A3B1D001089FEB04EBA4DC92BEE7778EF54348F5040BAF109B7182DAB95E45CB55
                                                                  APIs
                                                                  • SetUnhandledExceptionFilter.KERNEL32(00000000,?,004266DA,?,?,?,00000001), ref: 004278DD
                                                                  • UnhandledExceptionFilter.KERNEL32(?,?,?,00000001), ref: 004278E6
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: ExceptionFilterUnhandled
                                                                  • String ID:
                                                                  • API String ID: 3192549508-0
                                                                  • Opcode ID: 38b3e6874888d3a42b5397abe011dc5c6b01961766eb3b81d8264b20c528dda9
                                                                  • Instruction ID: af6de2e61c71192848096d70edd5c8408ffed4fca3a895c46d12f408ea406cc4
                                                                  • Opcode Fuzzy Hash: 38b3e6874888d3a42b5397abe011dc5c6b01961766eb3b81d8264b20c528dda9
                                                                  • Instruction Fuzzy Hash: 79B09231444208FFEE002B91FD09B883F28EB04672F001130F60D480708BA258549A99
                                                                  APIs
                                                                  • EnumSystemLocalesW.KERNEL32(0042F1F8,00000001,?,004351C2,00435260,00000003,00000000,?,?,00000000,00000000,00000000,00000000,00000000), ref: 0042F23A
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: EnumLocalesSystem
                                                                  • String ID:
                                                                  • API String ID: 2099609381-0
                                                                  • Opcode ID: 38001fd31d1add0093c49b9527e5aca8a2cd63c3bb6e206131bfe828f7e2f9bf
                                                                  • Instruction ID: 9cc43e68d90e22861979d7e59596372d6bab58e04aa4918d4e4cb832f1511fe7
                                                                  • Opcode Fuzzy Hash: 38001fd31d1add0093c49b9527e5aca8a2cd63c3bb6e206131bfe828f7e2f9bf
                                                                  • Instruction Fuzzy Hash: 14E04F35150308EBCB01CF94FC05BA937A4B708B21F944431B5085A1A1C676E4A0DF5C
                                                                  APIs
                                                                  • GetLocaleInfoW.KERNEL32(00000000,20001004,?,0042AB86,?,0042AB86,?,20001004,?,00000002,?,00000004,?,00000000), ref: 0042F270
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: InfoLocale
                                                                  • String ID:
                                                                  • API String ID: 2299586839-0
                                                                  • Opcode ID: f8af4819089cf00e42733982af5ee5bd8d28f682a3fe1c23c77db3c80989f079
                                                                  • Instruction ID: b3f803decc9e7ba590f29807339ab5c22a421047010f3369bfce5bbc694bfc38
                                                                  • Opcode Fuzzy Hash: f8af4819089cf00e42733982af5ee5bd8d28f682a3fe1c23c77db3c80989f079
                                                                  • Instruction Fuzzy Hash: 55D0123A040108FF8F019FD0FC0586A3B69FB08314B844466F91845121DA36E8209B29
                                                                  APIs
                                                                  • SetUnhandledExceptionFilter.KERNEL32(?), ref: 004278AD
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: ExceptionFilterUnhandled
                                                                  • String ID:
                                                                  • API String ID: 3192549508-0
                                                                  • Opcode ID: b5a942b7675521a605ffe18ce34dd21548eb4d05a3e796add064e69d7b2c77c5
                                                                  • Instruction ID: 10f971bb0326bd7009c60a64240b1fbb5a1fdfcc27efec36c7c6e23c0b953b6c
                                                                  • Opcode Fuzzy Hash: b5a942b7675521a605ffe18ce34dd21548eb4d05a3e796add064e69d7b2c77c5
                                                                  • Instruction Fuzzy Hash: 61A0113000020CFB8E002B82FC088883F2CEA002B2B000030F80C000208BA2A8A08A88
                                                                  APIs
                                                                  • GetProcessHeap.KERNEL32(00424FB4,0044D308,00000014), ref: 00425B2B
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: HeapProcess
                                                                  • String ID:
                                                                  • API String ID: 54951025-0
                                                                  • Opcode ID: 00b80de3463a0d9e6ea1085b6c1fe51a06b18940714df758908610c8ec8d5998
                                                                  • Instruction ID: 142edf32b74de3a78c56cb3a2f6e40ecc835f1eb8f0eb077e2109450793ec1c1
                                                                  • Opcode Fuzzy Hash: 00b80de3463a0d9e6ea1085b6c1fe51a06b18940714df758908610c8ec8d5998
                                                                  • Instruction Fuzzy Hash: 30B012B1701202C7CB090B39BC1400936E45748206304903D7003C5160EF30CD509F0C
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                                                  • Instruction ID: 02bad44cecd2c6049edf1280c85819ca2a502d08f75b982852eefa0f76671011
                                                                  • Opcode Fuzzy Hash: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                                                  • Instruction Fuzzy Hash: 1BC1E77220909309EF6D4A3988341BFFAA05EE67B171A275FD4B3CB2C4EF18E564D614
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                                                  • Instruction ID: 7672d54e93f85cd8a16eeab0d7a5c4c3aa7c5d02c8e32d07cf552138fea52549
                                                                  • Opcode Fuzzy Hash: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                                                  • Instruction Fuzzy Hash: F6C1E97220909309EF6D4639C8341BFFBA15AE67B171A275FD4B3CB2C4EE18E564C524
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 693fc2a06020ee0ee57da02a4a933cd5ad315ff3ac21a4b032580d2a5e4f36f6
                                                                  • Instruction ID: 110388b41a8a85aa8984566e8cc88d65fb3d77f316fe50e055081a62d4041e4a
                                                                  • Opcode Fuzzy Hash: 693fc2a06020ee0ee57da02a4a933cd5ad315ff3ac21a4b032580d2a5e4f36f6
                                                                  • Instruction Fuzzy Hash: 7FC1D9722090530AEF5D4A39C8340BFFAA15BE57B171A276FD8B3CB2C4EE18E564D614
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                                                  • Instruction ID: 7e0835685f72089923f2dc3e572eb494ea09dd40ccd7b53904858578875af7d6
                                                                  • Opcode Fuzzy Hash: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                                                  • Instruction Fuzzy Hash: 8FC1F77220945309EF6D4A39C83407FBBB15AE57B271A276FD4B3CB2C4EE28D664C614
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                                  • Instruction ID: 3552f0cd7b9b658e97edb6d4a675185b2e94d444d86f84920ccf4e9a3b1d9c2a
                                                                  • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                                  • Instruction Fuzzy Hash: F51138F730007143D614CA3EF4B46B7E795EBC63247AD436BD0814B758D12AA9C5D90C
                                                                  APIs
                                                                  • __EH_prolog3_GS.LIBCMT ref: 0040EB44
                                                                    • Part of subcall function 0040E337: CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000190,00000000,00000000,00000000,000000CC,00000000,00000000,00000005,00000000,Calibri), ref: 0040E38B
                                                                    • Part of subcall function 0040E337: CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,000000CC,00000000,00000000,00000005,00000000,Calibri), ref: 0040E3B5
                                                                    • Part of subcall function 0040E337: CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,000000CC,00000000,00000000,00000005,00000002,Arial), ref: 0040E3DF
                                                                  • GetSysColorBrush.USER32(0000000F), ref: 0040EB8B
                                                                    • Part of subcall function 00423D6A: _malloc.LIBCMT ref: 00423D82
                                                                  • CreateWindowExW.USER32(00000000,Static,00445D78,50000005,00000000,00000000,00000000,00000001,00000001,00000000,00000000,00000000), ref: 0040EC02
                                                                  • CreateWindowExW.USER32(00000000,Static,00445D78,50000005,00000000,00000000,00000000,00000001,00000001,00000000,00000000,00000000), ref: 0040EC36
                                                                  • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000190,00000000,00000001,00000000,000000CC,00000000,00000000,00000005,00000000,Calibri), ref: 0040EC61
                                                                  • CreateWindowExW.USER32(00000000,SysLink,?,50000000,?,?,?,00000000,00000001,00000000,00000000,00000000), ref: 0040ECE9
                                                                  • SendMessageW.USER32(00000000,00000030,00000001), ref: 0040ECFD
                                                                  • GetDC.USER32(?), ref: 0040ED18
                                                                  • _memset.LIBCMT ref: 0040EE28
                                                                  • GetSystemMetrics.USER32(00000047), ref: 0040EE66
                                                                  • SelectObject.GDI32 ref: 0040EEC0
                                                                  • DrawTextExW.USER32(?,?,000000FF,?,00000410,00000014), ref: 0040EEE3
                                                                  • SendMessageW.USER32(?,00000030,00000001), ref: 0040EF5F
                                                                  • SendMessageW.USER32(?,000000F1,00000001,00000000), ref: 0040EF70
                                                                  • DeleteDC.GDI32(?), ref: 0040EFFF
                                                                  • CreateWindowExW.USER32(00000000,SysLink,?,50000000,?,?,?,00000000,00000004,?,00000000,00000000), ref: 0040F0F0
                                                                  • SendMessageW.USER32(00000000,00000030,00000001), ref: 0040F104
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: Create$FontMessageSendWindow$BrushColorDeleteDrawH_prolog3_MetricsObjectSelectSystemText_malloc_memset
                                                                  • String ID: <\br>$Calibri$Static$SysLink$iTorretPartner
                                                                  • API String ID: 3734728168-218324882
                                                                  • Opcode ID: 0d9aa247b02eee198412bbbb28e29d8c53bba193d96e6fc9d60c859a00f26050
                                                                  • Instruction ID: f7c31dfe1de222369878051e5d4a65a24d521bc2a574b3db0c5e1926632f38d1
                                                                  • Opcode Fuzzy Hash: 0d9aa247b02eee198412bbbb28e29d8c53bba193d96e6fc9d60c859a00f26050
                                                                  • Instruction Fuzzy Hash: 99029171A00215AFDB20DF65CC89F9ABBB5EF44304F1041EAF508AB291DB75AE85CF58
                                                                  APIs
                                                                  • __EH_prolog3_GS.LIBCMT ref: 00405F21
                                                                  • _memset.LIBCMT ref: 00405F3D
                                                                  • SHGetFileInfoW.SHELL32(?,00000080,?,000002B4,00000110), ref: 00405F5C
                                                                  • GetIconInfo.USER32(?,?), ref: 00405F81
                                                                  • GetObjectW.GDI32(?,00000018,?), ref: 00405FA9
                                                                  • GdipCreateBitmapFromHBITMAP.GDIPLUS(?,00000000,?), ref: 00405FCD
                                                                  • GdipGetImageHeight.GDIPLUS(?,?), ref: 00406009
                                                                  • GdipGetImageWidth.GDIPLUS(?,?), ref: 00406033
                                                                  • GdipGetImagePixelFormat.GDIPLUS(?,?), ref: 0040606A
                                                                  • GdipBitmapLockBits.GDIPLUS(?,?,00000001,?,?), ref: 0040608C
                                                                  • GdipCreateBitmapFromScan0.GDIPLUS(?,?,?,0026200A,?,?), ref: 004060D6
                                                                  • GdipBitmapUnlockBits.GDIPLUS(?,?), ref: 004060FF
                                                                  • CreateStreamOnHGlobal.OLE32(00000000,00000001,?), ref: 00406120
                                                                  • GdipDisposeImage.GDIPLUS(?), ref: 004061E8
                                                                    • Part of subcall function 00405E25: GdipGetImageEncodersSize.GDIPLUS(?,?,0044AAF8,0000001C,0040613A), ref: 00405E47
                                                                    • Part of subcall function 00405E25: _malloc.LIBCMT ref: 00405E58
                                                                    • Part of subcall function 00405E25: @_EH4_CallFilterFunc@8.LIBCMT ref: 00405E72
                                                                  • GdipSaveImageToStream.GDIPLUS(?,?,?,00000000), ref: 00406146
                                                                  • _memset.LIBCMT ref: 0040616C
                                                                  • GetHGlobalFromStream.OLE32(?,?), ref: 004061A9
                                                                  • GdipAlloc.GDIPLUS(00000010), ref: 004061B1
                                                                  • DestroyIcon.USER32(?), ref: 004061E1
                                                                  • GdipDisposeImage.GDIPLUS(?), ref: 004061F5
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: Gdip$Image$Bitmap$CreateFromStream$BitsDisposeGlobalIconInfo_memset$AllocCallDestroyEncodersFileFilterFormatFunc@8H_prolog3_HeightLockObjectPixelSaveScan0SizeUnlockWidth_malloc
                                                                  • String ID: 0iD$0iD
                                                                  • API String ID: 1811296648-2033341097
                                                                  • Opcode ID: 369f2c2faa093f7e23144f7d859fa1ec431cc9f10f85c9bea900f7f74f1185d6
                                                                  • Instruction ID: c2310c256fee42b348955dbd8a2c8a4d8f8b7f20bac021223fe14250f8c2c259
                                                                  • Opcode Fuzzy Hash: 369f2c2faa093f7e23144f7d859fa1ec431cc9f10f85c9bea900f7f74f1185d6
                                                                  • Instruction Fuzzy Hash: 2381A4B1D10228AFDB629F64CC84B9DB7FDAF08701F4050FAE909A6261D7749F988F14
                                                                  APIs
                                                                  • __EH_prolog3_GS.LIBCMT ref: 0040AB98
                                                                  • RegOpenKeyExA.ADVAPI32(80000002,00000000,00000000,00020019,?), ref: 0040AD7A
                                                                  • RegQueryValueExA.ADVAPI32(?,?,00000000,?,00000000,?,00000001,00000000), ref: 0040ADDA
                                                                  • RegCloseKey.ADVAPI32(?), ref: 0040ADF2
                                                                  • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 0040AE24
                                                                  • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,?,?), ref: 0040AE9F
                                                                  • RegCloseKey.ADVAPI32(?), ref: 0040AEAB
                                                                  • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 0040AEDE
                                                                  • RegCloseKey.ADVAPI32(?), ref: 0040AEF0
                                                                    • Part of subcall function 0040DC5E: _memcmp.LIBCMT ref: 0040DC8E
                                                                  • _memset.LIBCMT ref: 0040AF19
                                                                  • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,?,00000800), ref: 0040AF56
                                                                  • RegCloseKey.ADVAPI32(?), ref: 0040AF60
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: Close$QueryValue$Ios_base_dtorstd::ios_base::_$H_prolog3_Open_memcmp_memset
                                                                  • String ID: HKEY_LOCAL_MACHINE$HKLM$XjD
                                                                  • API String ID: 3935406371-4261972424
                                                                  • Opcode ID: 2500f77a7c44371c49748dff05714a83dd6c6678d8f9533a268f9b92aab20f84
                                                                  • Instruction ID: f0804e70ace95674ef501eb3e146ac404a74af6e9c1c1e85689251813562c2a3
                                                                  • Opcode Fuzzy Hash: 2500f77a7c44371c49748dff05714a83dd6c6678d8f9533a268f9b92aab20f84
                                                                  • Instruction Fuzzy Hash: 54B15F70A002299BEB24DB25CC81BADB7F9BF44305F1480EEA189762C1DF795E84CF95
                                                                  APIs
                                                                  • __EH_prolog3_GS.LIBCMT ref: 00406A23
                                                                    • Part of subcall function 00403E1D: char_traits.LIBCPMT ref: 00403E36
                                                                    • Part of subcall function 00406203: GetFileAttributesW.KERNEL32(?,0040DDD4,?,00000184,0040DFA6,?,00000000,?,?,?,?,?,?,0043D89B,000000FF), ref: 0040620C
                                                                  • _wcsstr.LIBCMT ref: 00406A65
                                                                  • _wcsstr.LIBCMT ref: 00406A7A
                                                                  • _wcsstr.LIBCMT ref: 00406A8F
                                                                  • _memset.LIBCMT ref: 00406AB2
                                                                    • Part of subcall function 0040814F: vswprintf.LIBCMT ref: 0040817E
                                                                  • _memset.LIBCMT ref: 00406B1D
                                                                  • ShellExecuteExW.SHELL32(0000003C), ref: 00406B60
                                                                    • Part of subcall function 004085B7: __EH_prolog3.LIBCMT ref: 004085BE
                                                                    • Part of subcall function 0040792F: __EH_prolog3_catch.LIBCMT ref: 00407936
                                                                    • Part of subcall function 0040792F: char_traits.LIBCPMT ref: 0040794D
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: _wcsstr$_memsetchar_traits$AttributesExecuteFileH_prolog3H_prolog3_H_prolog3_catchShellvswprintf
                                                                  • String ID: .tor$.torrent$/select,"%s"$<$Buffer is to small$magnet:$open
                                                                  • API String ID: 704264854-4123487340
                                                                  • Opcode ID: 75c90b2619ce1bfbfea703ecf74f0d8971c150563373a7ddae02cd2ccae2eecf
                                                                  • Instruction ID: 212b6c8557b5fdd9c3aff150e2e9ced611f0d46174c403d626fc3777eed81db7
                                                                  • Opcode Fuzzy Hash: 75c90b2619ce1bfbfea703ecf74f0d8971c150563373a7ddae02cd2ccae2eecf
                                                                  • Instruction Fuzzy Hash: D93161B1D0022859EB20AB21DC02F9A7778AF51318F5101AFB509B61C2EF7C6B85CE5D
                                                                  APIs
                                                                  • __EH_prolog3_GS.LIBCMT ref: 00406F72
                                                                  • SHGetFolderPathW.SHELL32(00000000,0000001C,00000000,00000000,?,000004EC,0041255F), ref: 00406F85
                                                                    • Part of subcall function 00406D16: __EH_prolog3_GS.LIBCMT ref: 00406D1D
                                                                    • Part of subcall function 00406203: GetFileAttributesW.KERNEL32(?,0040DDD4,?,00000184,0040DFA6,?,00000000,?,?,?,?,?,?,0043D89B,000000FF), ref: 0040620C
                                                                  • char_traits.LIBCPMT ref: 00406FD7
                                                                  • char_traits.LIBCPMT ref: 00406FF6
                                                                  • _memset.LIBCMT ref: 00407116
                                                                  • _memset.LIBCMT ref: 00407183
                                                                  • ShellExecuteExW.SHELL32(0000003C), ref: 004071DE
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3__memsetchar_traits$AttributesExecuteFileFolderPathShell
                                                                  • String ID: --open="$.tor$.torrent$<$\itorrent\itorrent.exe$open
                                                                  • API String ID: 4193501842-3462142208
                                                                  • Opcode ID: f4ae6e7149f36a7cfdabc5e4a40df40ae3c7b7fb17e9a311e54cc06aef381cba
                                                                  • Instruction ID: f1d9275b18be2ccb85f51f7cd8635cb2fe1089ba137f86c06f2eecf062f57159
                                                                  • Opcode Fuzzy Hash: f4ae6e7149f36a7cfdabc5e4a40df40ae3c7b7fb17e9a311e54cc06aef381cba
                                                                  • Instruction Fuzzy Hash: 806112B18011589ADB21EB65CC85FDEB77C9F95308F1045EFA60973182EB781F48CE29
                                                                  APIs
                                                                  • __EH_prolog3_GS.LIBCMT ref: 0040A7E0
                                                                  • AssocQueryStringA.SHLWAPI(00000000,00000002,http,open,?,?), ref: 0040A814
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: AssocH_prolog3_QueryString
                                                                  • String ID: amigo$chrome$firefox$google$http$internet explorer$launcher$open$opera$operaold$yandex
                                                                  • API String ID: 4091812397-2656646387
                                                                  • Opcode ID: 16eade287d4c975c282bde898b1b5c5d2e2d40b3f03e88ed2727a6d46930e4c3
                                                                  • Instruction ID: 1ca0e9bf9c97b3c973a072714cd0145f7793694ff2ff57f7b62195b4a4ae5754
                                                                  • Opcode Fuzzy Hash: 16eade287d4c975c282bde898b1b5c5d2e2d40b3f03e88ed2727a6d46930e4c3
                                                                  • Instruction Fuzzy Hash: 4E41A6B1A10214ABE724EB14CC82DFE76799F42724F2146AFB016711D1EB786F45CA1E
                                                                  APIs
                                                                  • __EH_prolog3_catch_GS.LIBCMT ref: 0040B410
                                                                    • Part of subcall function 0041F6AD: __EH_prolog3_GS.LIBCMT ref: 0041F6B4
                                                                    • Part of subcall function 0040AB8E: __EH_prolog3_GS.LIBCMT ref: 0040AB98
                                                                    • Part of subcall function 0040403B: _memmove.LIBCMT ref: 0040405B
                                                                    • Part of subcall function 0041F5DC: __EH_prolog3_GS.LIBCMT ref: 0041F5E3
                                                                    • Part of subcall function 0040A7D6: __EH_prolog3_GS.LIBCMT ref: 0040A7E0
                                                                    • Part of subcall function 0040A7D6: AssocQueryStringA.SHLWAPI(00000000,00000002,http,open,?,?), ref: 0040A814
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3_$AssocH_prolog3_catch_QueryString_memmove
                                                                  • String ID: $iD$//d/defbrowser$//d/guid$//d/machineid$//d/os$//d/ps/p/fs/f$//d/ps/p/installed/i$//d/ps/p/rs/r$0Rg$<?xml version="1.0"?><d></d>$name
                                                                  • API String ID: 1042467588-1638684382
                                                                  • Opcode ID: e73b2d61270da91b5a81bc98c462a2675a3b2cf4469aae1f846bd2b321e783f1
                                                                  • Instruction ID: d76b2f650c13571c75fc5c3975ccd6c63a0524fb5aa4f1e8f787a0c2f55eadc5
                                                                  • Opcode Fuzzy Hash: e73b2d61270da91b5a81bc98c462a2675a3b2cf4469aae1f846bd2b321e783f1
                                                                  • Instruction Fuzzy Hash: ECF15C71D012189BDB24EBA4CD55BDDB7B4AF14308F1004EEE549B7282EB786F88CB59
                                                                  APIs
                                                                  • SetBkColor.GDI32(?,00FFFFFF), ref: 0040F99E
                                                                  • GetStockObject.GDI32(00000000), ref: 0040F9A6
                                                                  • GetClientRect.USER32(?,?), ref: 0040F9B7
                                                                  • FillRect.USER32(?,?,00000000), ref: 0040F9C5
                                                                  • BeginPaint.USER32(?,?), ref: 0040F9D6
                                                                  • CreateCompatibleDC.GDI32(00000000), ref: 0040F9E9
                                                                  • SelectObject.GDI32(00000000,?), ref: 0040F9F7
                                                                  • GetObjectW.GDI32(?,00000018,?), ref: 0040FA09
                                                                  • BitBlt.GDI32(?,?,00000000,?,?,00000000,00000000,00000000,00CC0020), ref: 0040FA47
                                                                  • SelectObject.GDI32(00000000,00000000), ref: 0040FA53
                                                                  • DeleteDC.GDI32(00000000), ref: 0040FA5A
                                                                  • EndPaint.USER32(?,?), ref: 0040FA6A
                                                                  • DeleteObject.GDI32(?), ref: 0040FA7F
                                                                  • DeleteObject.GDI32(?), ref: 0040FA84
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: Object$Delete$PaintRectSelect$BeginClientColorCompatibleCreateFillStock
                                                                  • String ID:
                                                                  • API String ID: 4023296310-0
                                                                  • Opcode ID: 1a3314baad03eca1980ec1e35441a67d4816b03bef98c5e8db4810d4407adde9
                                                                  • Instruction ID: 18a01c523534795561b10c64a133362bf040a50cf47bbf0961f21ff9f5858b99
                                                                  • Opcode Fuzzy Hash: 1a3314baad03eca1980ec1e35441a67d4816b03bef98c5e8db4810d4407adde9
                                                                  • Instruction Fuzzy Hash: A0414E72604305AFD710DF65DC48E5B7BB8FB48310F00593AF945926A1C774E9188F6A
                                                                  APIs
                                                                  • GetCharWidth32W.GDI32(?,00000020,00000020,?,?), ref: 004142B3
                                                                  • GetDlgItem.USER32(?,00000004), ref: 004142BE
                                                                  • GetWindowTextW.USER32(00000000,?,00000100), ref: 004142D1
                                                                  • _wcsstr.LIBCMT ref: 004142E3
                                                                  • SetTextColor.GDI32(?,00000000), ref: 004142F5
                                                                  • SetBkMode.GDI32(?,00000001), ref: 00414306
                                                                  • SelectObject.GDI32(?), ref: 0041431B
                                                                  • DrawTextExW.USER32(?,?,?,?,00008410,00000014), ref: 00414378
                                                                  • DrawTextW.USER32(?,?,?,?,00008010), ref: 00414395
                                                                  • SelectObject.GDI32(?,?), ref: 004143F7
                                                                  • DrawTextExW.USER32(?,?,000000FF,?,00000050,00000014), ref: 00414416
                                                                  • SetBkMode.GDI32(?,?), ref: 00414425
                                                                  • SetTextColor.GDI32(?,?), ref: 00414434
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: Text$Draw$ColorModeObjectSelect$CharItemWidth32Window_wcsstr
                                                                  • String ID:
                                                                  • API String ID: 2368306080-0
                                                                  • Opcode ID: 87c8e5fe06cd33e68f9cd46dd9978dcdef1c7ab8bc6e35990bf884b91bdabd1a
                                                                  • Instruction ID: 541550f45bf0a577c103bbec627b4e515e91e1287cf71a6f34bc75e33a74a6f0
                                                                  • Opcode Fuzzy Hash: 87c8e5fe06cd33e68f9cd46dd9978dcdef1c7ab8bc6e35990bf884b91bdabd1a
                                                                  • Instruction Fuzzy Hash: B35130B1900218AFDF159F54DC85BEA7779FB08300F4041F5FA05A61A1DB719E99CF98
                                                                  APIs
                                                                  • RegOpenKeyA.ADVAPI32(?,?,?), ref: 0040AFC7
                                                                  • RegQueryInfoKeyW.ADVAPI32(?,00000000,00000000,00000000,?,?,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,7055389B), ref: 0040AFFD
                                                                  • RegCloseKey.ADVAPI32(?,?,?,?,7055389B,?,?,?,?,0043D55D,000000FF), ref: 0040B00D
                                                                  • _memset.LIBCMT ref: 0040B057
                                                                  • RegEnumKeyExA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000), ref: 0040B07A
                                                                  • RegOpenKeyA.ADVAPI32(?,00000000,?), ref: 0040B0CA
                                                                  • _memset.LIBCMT ref: 0040B117
                                                                  • RegQueryValueExW.ADVAPI32(?,DisplayName,00000000,00000000,?,00000800), ref: 0040B144
                                                                  • RegCloseKey.ADVAPI32(?), ref: 0040B152
                                                                  • RegCloseKey.ADVAPI32(?), ref: 0040B21B
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: Close$OpenQuery_memset$EnumInfoValue
                                                                  • String ID: DisplayName
                                                                  • API String ID: 4115459675-3786665039
                                                                  • Opcode ID: 7dd6568487ecf3bc725f41336c05b8e7f0d34bfb483fa9fb6d04fb273294813c
                                                                  • Instruction ID: 144dbe2e757f2f4985787b3fadc91b2d135954a141e078a8bc2745067885a018
                                                                  • Opcode Fuzzy Hash: 7dd6568487ecf3bc725f41336c05b8e7f0d34bfb483fa9fb6d04fb273294813c
                                                                  • Instruction Fuzzy Hash: 57815C75900128AFDB28DF14DC95BEAB7B8EB05304F1041EAE619B2191DB355F88CF99
                                                                  APIs
                                                                  • __EH_prolog3_GS.LIBCMT ref: 0040DDB9
                                                                    • Part of subcall function 00403E1D: char_traits.LIBCPMT ref: 00403E36
                                                                    • Part of subcall function 00406203: GetFileAttributesW.KERNEL32(?,0040DDD4,?,00000184,0040DFA6,?,00000000,?,?,?,?,?,?,0043D89B,000000FF), ref: 0040620C
                                                                  • DeleteFileW.KERNEL32(?,00000001,00000000,?,00000184,0040DFA6,?,00000000,?,?,?,?,?,?,0043D89B,000000FF), ref: 0040DDE8
                                                                  • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000002,00000080,00000000,00000001,00000000,?,00000184,0040DFA6,?,00000000), ref: 0040DDFE
                                                                  • WriteFile.KERNEL32(00000000,?,?,?,00000000,?,40000000,00000000,00000000,00000002,00000080,00000000,00000001,00000000,?,00000184), ref: 0040DE5B
                                                                  • CloseHandle.KERNEL32(00000000,?,40000000,00000000,00000000,00000002,00000080,00000000,00000001,00000000,?,00000184,0040DFA6,?,00000000), ref: 0040DE67
                                                                  • CloseHandle.KERNEL32(00000000,?,40000000,00000000,00000000,00000002,00000080,00000000,00000001,00000000,?,00000184,0040DFA6,?,00000000), ref: 0040DE92
                                                                  • DeleteFileW.KERNEL32(?,?,40000000,00000000,00000000,00000002,00000080,00000000,00000001,00000000,?,00000184,0040DFA6,?,00000000), ref: 0040DEAB
                                                                  • DeleteFileW.KERNEL32(?,?,40000000,00000000,00000000,00000002,00000080,00000000,00000001,00000000,?,00000184,0040DFA6,?,00000000), ref: 0040DEEA
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: File$Delete$CloseHandle$AttributesCreateH_prolog3_Writechar_traits
                                                                  • String ID: Can't create file.$Can't write into file$can't unzip
                                                                  • API String ID: 1041538757-295860728
                                                                  • Opcode ID: f6d36239a41848457fd82fbce1256d1e90007453654904a8da5e3a4ce0339fa4
                                                                  • Instruction ID: 4253ead06432f5fcbbb7e2ce94929fb0bfdea561c01916292099495b58fe3e2f
                                                                  • Opcode Fuzzy Hash: f6d36239a41848457fd82fbce1256d1e90007453654904a8da5e3a4ce0339fa4
                                                                  • Instruction Fuzzy Hash: 2A31BE70C00114ABDB28EBA1CC49BEEB778AF59314F00817EF506762D1DB385E48CB68
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: _memmove
                                                                  • String ID: invalid string position$string too long
                                                                  • API String ID: 4104443479-4289949731
                                                                  • Opcode ID: 198aeaef6a32dbd09c69d4550dae73d903ff877653bbd5ba4ee90b087fdf51a6
                                                                  • Instruction ID: bc122013e4202fd5fbf91448f186c4fd0103758f21e97906f5fe699026bb53c5
                                                                  • Opcode Fuzzy Hash: 198aeaef6a32dbd09c69d4550dae73d903ff877653bbd5ba4ee90b087fdf51a6
                                                                  • Instruction Fuzzy Hash: 60D13C71E00315DFCB20CF88D98199AB7B5BF88704B24493EE941E7341D738EA598BA9
                                                                  APIs
                                                                  • __EH_prolog3.LIBCMT ref: 00409B28
                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00409B32
                                                                    • Part of subcall function 004393B0: __lock.LIBCMT ref: 004393C1
                                                                  • int.LIBCPMT ref: 00409B49
                                                                    • Part of subcall function 004095F0: std::_Lockit::_Lockit.LIBCPMT ref: 00409601
                                                                  • std::locale::_Getfacet.LIBCPMT ref: 00409B52
                                                                  • ctype.LIBCPMT ref: 00409B6C
                                                                  • std::bad_exception::bad_exception.LIBCMT ref: 00409B80
                                                                  • __CxxThrowException@8.LIBCMT ref: 00409B8E
                                                                  • std::_Facet_Register.LIBCPMT ref: 00409BA4
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: std::_$LockitLockit::_$Exception@8Facet_GetfacetH_prolog3RegisterThrow__lockctypestd::bad_exception::bad_exceptionstd::locale::_
                                                                  • String ID: QE$bad cast
                                                                  • API String ID: 2017145326-2735596557
                                                                  • Opcode ID: fd2251292eb0867b88d1a95ed54d19448e67e80e1c0e61218183979806b6751d
                                                                  • Instruction ID: 17104c48661f21eaaf1db8c8683a270d0f529b345491ddce3e4a4550693cb700
                                                                  • Opcode Fuzzy Hash: fd2251292eb0867b88d1a95ed54d19448e67e80e1c0e61218183979806b6751d
                                                                  • Instruction Fuzzy Hash: A8017C31A006149BCB14EB61E842AAE7364BB48324F20152FE401772D3CF7DAD00CB98
                                                                  APIs
                                                                  • __EH_prolog3_GS.LIBCMT ref: 00407228
                                                                    • Part of subcall function 0041F5DC: __EH_prolog3_GS.LIBCMT ref: 0041F5E3
                                                                    • Part of subcall function 00405851: __EH_prolog3.LIBCMT ref: 00405858
                                                                    • Part of subcall function 0040403B: _memmove.LIBCMT ref: 0040405B
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3_$H_prolog3_memmove
                                                                  • String ID: $iD$//checks$<?xml version="1.0"?><checks></checks>$check$content$type$url$when
                                                                  • API String ID: 448379309-1664345494
                                                                  • Opcode ID: b80dc27e736c35f02b943c3d308e4b403c98a872a2e1f7c98542a463872f2caf
                                                                  • Instruction ID: aba2335a108dca9bbb128d6fe9e6a0bb2298540d490b94bd0073ea5d2e5761b8
                                                                  • Opcode Fuzzy Hash: b80dc27e736c35f02b943c3d308e4b403c98a872a2e1f7c98542a463872f2caf
                                                                  • Instruction Fuzzy Hash: 7771C271D012189ADF14EFA1D885BEDB7B9AF04304F1044ABE505B7181DB78AF88CF5A
                                                                  APIs
                                                                  • __EH_prolog3.LIBCMT ref: 0040D82F
                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0040D839
                                                                    • Part of subcall function 004393B0: __lock.LIBCMT ref: 004393C1
                                                                  • int.LIBCPMT ref: 0040D850
                                                                    • Part of subcall function 004095F0: std::_Lockit::_Lockit.LIBCPMT ref: 00409601
                                                                  • std::locale::_Getfacet.LIBCPMT ref: 0040D859
                                                                  • ctype.LIBCPMT ref: 0040D873
                                                                  • std::bad_exception::bad_exception.LIBCMT ref: 0040D887
                                                                  • __CxxThrowException@8.LIBCMT ref: 0040D895
                                                                  • std::_Facet_Register.LIBCPMT ref: 0040D8AB
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: std::_$LockitLockit::_$Exception@8Facet_GetfacetH_prolog3RegisterThrow__lockctypestd::bad_exception::bad_exceptionstd::locale::_
                                                                  • String ID: bad cast
                                                                  • API String ID: 2017145326-3145022300
                                                                  • Opcode ID: c1080736745e3c33a9aed501182a711e8bd6542b3e2751d62e058be6eee30fe8
                                                                  • Instruction ID: 8676ee6086b56fcf14aab3e5aa4defeafc6ec2ee5079ad56fc6bda837db51ad3
                                                                  • Opcode Fuzzy Hash: c1080736745e3c33a9aed501182a711e8bd6542b3e2751d62e058be6eee30fe8
                                                                  • Instruction Fuzzy Hash: E0018E32D006149BCB04FBA1D852AAD7364AF48728F20452FE8117B2D2CF7C9D05CB9D
                                                                  APIs
                                                                  • MultiByteToWideChar.KERNEL32(00000008,00000000,?,?,00000000,00000000,00000100,00000000,?,?,?,?,0042A703,?,00000008,?), ref: 0042A536
                                                                  • _malloc.LIBCMT ref: 0042A588
                                                                  • MultiByteToWideChar.KERNEL32(00000008,00000001,?,?,00000000,00000000,?,?,?,0042A703,?,00000008,?,?,?,?), ref: 0042A5B6
                                                                  • _malloc.LIBCMT ref: 0042A656
                                                                    • Part of subcall function 004233F8: __FF_MSGBANNER.LIBCMT ref: 0042340F
                                                                    • Part of subcall function 004233F8: __NMSG_WRITE.LIBCMT ref: 00423416
                                                                    • Part of subcall function 004233F8: RtlAllocateHeap.NTDLL(00660000,00000000,00000001,?,?,?,?,004011E6), ref: 0042343B
                                                                  • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,?,00000000,00000000,?,?,?,?,?,?,?,?), ref: 0042A6A5
                                                                  • __freea.LIBCMT ref: 0042A6AE
                                                                  • __freea.LIBCMT ref: 0042A6B5
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: ByteCharMultiWide$__freea_malloc$AllocateHeap
                                                                  • String ID: 9E(j
                                                                  • API String ID: 442409405-705430000
                                                                  • Opcode ID: 253a7d083789c16bb4497e9c23e87dbb566d67de0742e3419c3ba9106a75ca69
                                                                  • Instruction ID: eae4b8fc467da8829f52f0b5777bbfb99bdecfffda808a4d31fcec4edae714b2
                                                                  • Opcode Fuzzy Hash: 253a7d083789c16bb4497e9c23e87dbb566d67de0742e3419c3ba9106a75ca69
                                                                  • Instruction Fuzzy Hash: 0351E172700225AFEF249F55EC45EAF37A9EB54314F98052AFC05E7250D738DC60C6AA
                                                                  APIs
                                                                  • __EH_prolog3_GS.LIBCMT ref: 0040629B
                                                                    • Part of subcall function 00406221: _memset.LIBCMT ref: 00406242
                                                                    • Part of subcall function 00406221: VerSetConditionMask.KERNEL32(00000000,00000000,00000002,00000001), ref: 00406266
                                                                    • Part of subcall function 00406221: VerifyVersionInfoW.KERNEL32(0000011C,00000002,00000000), ref: 00406277
                                                                  • _memset.LIBCMT ref: 004062CD
                                                                  • CoTaskMemFree.OLE32(?,?), ref: 00406440
                                                                    • Part of subcall function 0040792F: __EH_prolog3_catch.LIBCMT ref: 00407936
                                                                    • Part of subcall function 0040792F: char_traits.LIBCPMT ref: 0040794D
                                                                  • SHGetFolderPathW.SHELL32(00000000,00000005,00000000,00000000,?), ref: 004062E1
                                                                    • Part of subcall function 004085B7: __EH_prolog3.LIBCMT ref: 004085BE
                                                                  • CoCreateInstance.OLE32(0043F4F0,00000000,00000001,004468FC,?,0000039C,00406D6B,00000001,00000000,00000054,0041256B), ref: 0040635D
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: _memset$ConditionCreateFolderFreeH_prolog3H_prolog3_H_prolog3_catchInfoInstanceMaskPathTaskVerifyVersionchar_traits
                                                                  • String ID: Can't get folder path$Can't get path$Can't get path manager
                                                                  • API String ID: 1415865164-2805621233
                                                                  • Opcode ID: 5f908d3b0e1b2593efe7d562c91a9fdeb02cd0ca8d4c057800c5db6346feb313
                                                                  • Instruction ID: cda54d0edd6cc6a380d5e662025ca81617251cfa486a44f9c08fafff5f68c7d9
                                                                  • Opcode Fuzzy Hash: 5f908d3b0e1b2593efe7d562c91a9fdeb02cd0ca8d4c057800c5db6346feb313
                                                                  • Instruction Fuzzy Hash: F0518470A00219ABDB20DB61CC49BAEB778AF94704F1141FEA44AB71D1DB789F85CF19
                                                                  APIs
                                                                  • __EH_prolog3_GS.LIBCMT ref: 00411A3D
                                                                  • _memset.LIBCMT ref: 00411A9E
                                                                    • Part of subcall function 004135A4: vswprintf.LIBCMT ref: 004135D3
                                                                    • Part of subcall function 0041079B: __EH_prolog3_GS.LIBCMT ref: 004107A2
                                                                    • Part of subcall function 0040B25D: __EH_prolog3_GS.LIBCMT ref: 0040B264
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3_$_memsetvswprintf
                                                                  • String ID: Content-Type: application/xml;$ip%ib%i$pif$x6E$x6E$x6E
                                                                  • API String ID: 4124506358-3644493703
                                                                  • Opcode ID: 8d647bbd49e4cdce378f12b6fa3485bc0664f3254850d1bad4daf1daeff0d60f
                                                                  • Instruction ID: 65d12f4c91cbe42406175b64e498fdc30aa3fbb403da9430d641dee05db7ce33
                                                                  • Opcode Fuzzy Hash: 8d647bbd49e4cdce378f12b6fa3485bc0664f3254850d1bad4daf1daeff0d60f
                                                                  • Instruction Fuzzy Hash: 8151F7719002049BD724EF60CD86FE9B375AB50349F5080AEE506673D2EF78BE89CB58
                                                                  APIs
                                                                  • __EH_prolog3_GS.LIBCMT ref: 004180B7
                                                                    • Part of subcall function 0040BB7F: __EH_prolog3.LIBCMT ref: 0040BB86
                                                                  • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 004181F1
                                                                    • Part of subcall function 0040CAE1: __EH_prolog3_catch.LIBCMT ref: 0040CAE8
                                                                    • Part of subcall function 0040C966: __EH_prolog3_catch.LIBCMT ref: 0040C96D
                                                                  Strings
                                                                  • "; filename=", xrefs: 0041811F
                                                                  • Content-Disposition: form-data; name=", xrefs: 0041810A
                                                                  • XjD, xrefs: 004181E6
                                                                  • "Content-Type: text/plain, xrefs: 00418134
                                                                  • --4jhf94jdfksjhf452f186c710c89c4--, xrefs: 00418160
                                                                  • --4jhf94jdfksjhf452f186c710c89c4, xrefs: 004180FA
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3_catch$H_prolog3H_prolog3_Ios_base_dtorstd::ios_base::_
                                                                  • String ID: --4jhf94jdfksjhf452f186c710c89c4$Content-Disposition: form-data; name="$"Content-Type: text/plain$"; filename="$--4jhf94jdfksjhf452f186c710c89c4--$XjD
                                                                  • API String ID: 1279379151-4271319089
                                                                  • Opcode ID: 52c36b5fdd49bb6d37e744863eec194dd96ed2336a592a43435246916bba976c
                                                                  • Instruction ID: 4b995c2a744c1ddece03d463ebd6e9d0b7c18df028cc2e0fe8b65ffdd6eb92b1
                                                                  • Opcode Fuzzy Hash: 52c36b5fdd49bb6d37e744863eec194dd96ed2336a592a43435246916bba976c
                                                                  • Instruction Fuzzy Hash: EE415D70E00218CBDF14EFA5C8917DEB7B1AF58304F10856EE405B7282EB789E45CB98
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: char_traits$H_prolog3_
                                                                  • String ID: ILIGHT=1$--partner 350760 --distr /passive /msicl "$rp%ib%i
                                                                  • API String ID: 1272491415-1483123067
                                                                  • Opcode ID: 5663259c243dc02f892eddd9eff1ea7f81b4e1aa06a1de34d7789f12ec617c51
                                                                  • Instruction ID: 26454d8ca1d1010b6d5119bef454d6ffad1006b850a88020fd325884435a407d
                                                                  • Opcode Fuzzy Hash: 5663259c243dc02f892eddd9eff1ea7f81b4e1aa06a1de34d7789f12ec617c51
                                                                  • Instruction Fuzzy Hash: EA91B4719042449EDB14EF65CC91BEEB774AF54308F1041AFE4096B2C2EBB86EC9CB59
                                                                  APIs
                                                                  • __EH_prolog3_GS.LIBCMT ref: 00411368
                                                                  • char_traits.LIBCPMT ref: 004113A3
                                                                    • Part of subcall function 004069BD: __EH_prolog3_GS.LIBCMT ref: 004069C4
                                                                    • Part of subcall function 0040E246: __EH_prolog3.LIBCMT ref: 0040E24D
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3_$H_prolog3char_traits
                                                                  • String ID: --install$HsD$set-autoload$set-default$set-firewall
                                                                  • API String ID: 2082697881-219580848
                                                                  • Opcode ID: dfc987fb44fc86c8156e66c2880e7ad32ad173f73f139ab832ad5a5e5ede8716
                                                                  • Instruction ID: fa1b93f12dd47e36ae9365630b89337ca43310f328a9a2e76c0d5b1c177d9476
                                                                  • Opcode Fuzzy Hash: dfc987fb44fc86c8156e66c2880e7ad32ad173f73f139ab832ad5a5e5ede8716
                                                                  • Instruction Fuzzy Hash: B441C2B0900244AEDB11EFA5DD52BEE77A89B14309F10406FE601732E2DBB85F48CB69
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: _memmove$Allocate
                                                                  • String ID: 7;@$vector<T> too long
                                                                  • API String ID: 164242391-310408468
                                                                  • Opcode ID: 3a38c6e5aa2ddd81e7ca97e13ed13f45947669089b0a7f624e790382fe837168
                                                                  • Instruction ID: 846c4cfc3cd499f754bbaa1b7810af9ea4576ad6024d936176250d48cf1bf8ef
                                                                  • Opcode Fuzzy Hash: 3a38c6e5aa2ddd81e7ca97e13ed13f45947669089b0a7f624e790382fe837168
                                                                  • Instruction Fuzzy Hash: 8931A6317003046FCB18DF79DC8595B3B6AEB88315724853EF505E73A2DE79E5048A9C
                                                                  APIs
                                                                    • Part of subcall function 00401437: LocalAlloc.KERNEL32(00000040,?,0040147B), ref: 00401447
                                                                  • GetTempPathW.KERNEL32(000007FF,00000000,?,?,?,?,?,?,?,?,0044A470,00000018), ref: 004014D6
                                                                  • InterlockedIncrement.KERNEL32(004586F8), ref: 004014F2
                                                                  • GetCurrentProcessId.KERNEL32(?,?,?,?,?,?,?,?,0044A470,00000018), ref: 004014FA
                                                                  • GetCurrentThreadId.KERNEL32 ref: 00401502
                                                                    • Part of subcall function 0040138B: FormatMessageW.KERNEL32(00000500,?,00000000,00000000,?,00000000,?), ref: 004013AE
                                                                  • @_EH4_CallFilterFunc@8.LIBCMT ref: 00401540
                                                                  • @_EH4_CallFilterFunc@8.LIBCMT ref: 0040158F
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: CallCurrentFilterFunc@8$AllocFormatIncrementInterlockedLocalMessagePathProcessTempThread
                                                                  • String ID: %1!X!%2!X!%3!X!.tmp
                                                                  • API String ID: 895105491-2542139142
                                                                  • Opcode ID: 17b2f3322326ef919418e8528f8c480b59b22b2ba456cc8b28584e246cd9f1df
                                                                  • Instruction ID: 030fafe0c2975669cb7042466d1401b9c3cc9c1d745b3c4a0464b4ee223eca41
                                                                  • Opcode Fuzzy Hash: 17b2f3322326ef919418e8528f8c480b59b22b2ba456cc8b28584e246cd9f1df
                                                                  • Instruction Fuzzy Hash: ED21D770E002256BDB10EFB49C45AAE76B4AF88715B54013AE416F72E2EA3C8905CB69
                                                                  APIs
                                                                  • FindCompleteObject.LIBCMT ref: 0043BB45
                                                                  • FindMITargetTypeInstance.LIBCMT ref: 0043BB7E
                                                                    • Part of subcall function 0043B7E4: PMDtoOffset.LIBCMT ref: 0043B876
                                                                  • FindVITargetTypeInstance.LIBCMT ref: 0043BB85
                                                                  • PMDtoOffset.LIBCMT ref: 0043BB96
                                                                  • std::bad_exception::bad_exception.LIBCMT ref: 0043BBBF
                                                                  • __CxxThrowException@8.LIBCMT ref: 0043BBCD
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: Find$InstanceOffsetTargetType$CompleteException@8ObjectThrowstd::bad_exception::bad_exception
                                                                  • String ID: Bad dynamic_cast!
                                                                  • API String ID: 1565299582-2956939130
                                                                  • Opcode ID: 247727003ec0a2bc7ea7e4db58ce68e8253137726b72f01529c68a74c4b03ecd
                                                                  • Instruction ID: c701a43b06601729c5de3573edf4b4d4ae75f9a7e87b509fe8e824d4d288e2d9
                                                                  • Opcode Fuzzy Hash: 247727003ec0a2bc7ea7e4db58ce68e8253137726b72f01529c68a74c4b03ecd
                                                                  • Instruction Fuzzy Hash: D3216272A002149FDB00DFA5DC42BAEB764EF4C715F54101FFA1597246DF39AA01DBA8
                                                                  APIs
                                                                  • _memset.LIBCMT ref: 0040E17F
                                                                  • ShellExecuteExW.SHELL32(0000003C), ref: 0040E1C3
                                                                  • WaitForSingleObject.KERNEL32(?,000493E0), ref: 0040E1DE
                                                                  • GetExitCodeProcess.KERNEL32(?,?), ref: 0040E1F2
                                                                  • CloseHandle.KERNEL32(?), ref: 0040E1FF
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: CloseCodeExecuteExitHandleObjectProcessShellSingleWait_memset
                                                                  • String ID: <$open
                                                                  • API String ID: 92095861-1930408713
                                                                  • Opcode ID: 4ac1cbbead16c8b053b55380fce2543cb3ea706b32947fd5fe14654f946cfc95
                                                                  • Instruction ID: d725bc00e6e62d2de4ac386822da2e0cda6000ace5d5e7403746e75202f8aecb
                                                                  • Opcode Fuzzy Hash: 4ac1cbbead16c8b053b55380fce2543cb3ea706b32947fd5fe14654f946cfc95
                                                                  • Instruction Fuzzy Hash: 63115BB0D00218EBDF108F96EC88A9EBBB9FB05355F10047AE804B7250D7355E59CB68
                                                                  APIs
                                                                  • GlobalAlloc.KERNEL32(00000002,?), ref: 004158C7
                                                                  • GlobalLock.KERNEL32(00000000), ref: 004158D4
                                                                  • _memmove.LIBCMT ref: 004158DB
                                                                  • CreateStreamOnHGlobal.OLE32(00000000,00000000,?), ref: 004158EC
                                                                  • GdipAlloc.GDIPLUS(00000010), ref: 004158F4
                                                                  • GlobalUnlock.KERNEL32(00000000), ref: 0041590C
                                                                  • GlobalFree.KERNEL32(00000000), ref: 00415913
                                                                  • _free.LIBCMT ref: 0041591A
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: Global$Alloc$CreateFreeGdipLockStreamUnlock_free_memmove
                                                                  • String ID:
                                                                  • API String ID: 776961203-0
                                                                  • Opcode ID: 1007a58431882b9d728c5888b88a845bbbbf69567934408229e29289a486088e
                                                                  • Instruction ID: 56b9bdeed27106255a21f31d47d9c7fe0531014287572c4d2997165b34963398
                                                                  • Opcode Fuzzy Hash: 1007a58431882b9d728c5888b88a845bbbbf69567934408229e29289a486088e
                                                                  • Instruction Fuzzy Hash: 04115E72A00208FBDB009FA0EC49CAE3B6DEB89751710447EF905CA251DA359E41D7A8
                                                                  APIs
                                                                  • Concurrency::details::_Concurrent_queue_base_v4::_Internal_throw_exception.LIBCPMT ref: 0040A5DE
                                                                  • _memmove.LIBCMT ref: 0040A633
                                                                  • _memmove.LIBCMT ref: 0040A63F
                                                                  • _memmove.LIBCMT ref: 0040A651
                                                                    • Part of subcall function 00423D6A: _malloc.LIBCMT ref: 00423D82
                                                                  • _memmove.LIBCMT ref: 0040A688
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: _memmove$Concurrency::details::_Concurrent_queue_base_v4::_Internal_throw_exception_malloc
                                                                  • String ID: vector<T> too long
                                                                  • API String ID: 3237892064-3788999226
                                                                  • Opcode ID: 8c9ce6eef54e065c700bb1f32dcd1f56be48b58ae709b7cd79e7479662b4d7b9
                                                                  • Instruction ID: 657a951124ff5660cc4f6895092ec2017f0db79183c45ed3381f691874610855
                                                                  • Opcode Fuzzy Hash: 8c9ce6eef54e065c700bb1f32dcd1f56be48b58ae709b7cd79e7479662b4d7b9
                                                                  • Instruction Fuzzy Hash: F841B1B1600306ABCB14AF69D88195ABBA9FF04354714862EF518D7740DB39E9608A99
                                                                  APIs
                                                                  • BeginPaint.USER32(?,?,?,?,?), ref: 0040E6D3
                                                                  • GdipGetImageWidth.GDIPLUS(?,?,?,?), ref: 0040E6FE
                                                                  • GdipGetImageWidth.GDIPLUS(?,00000000,?,?), ref: 0040E729
                                                                  • GdipGetImageHeight.GDIPLUS(?,00000000,?,?), ref: 0040E769
                                                                  • GdipCreateFromHDC.GDIPLUS(?,00000000,?,?), ref: 0040E79A
                                                                  • EndPaint.USER32(?,?,?,?,?,?), ref: 0040E7C5
                                                                  • GdipDeleteGraphics.GDIPLUS(?,?,?), ref: 0040E7CE
                                                                    • Part of subcall function 004034BD: MulDiv.KERNEL32(?,00000060), ref: 004034D0
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: Gdip$Image$PaintWidth$BeginCreateDeleteFromGraphicsHeight
                                                                  • String ID:
                                                                  • API String ID: 4241542294-0
                                                                  • Opcode ID: 604be2dc801cd5b4f9220c9ec80bd64fcac1708e77a14548fbf8d3262f9031e2
                                                                  • Instruction ID: a4c6f071edd989cd3f68b29b07f2f166a5072e78da37956864840872c0ad15fa
                                                                  • Opcode Fuzzy Hash: 604be2dc801cd5b4f9220c9ec80bd64fcac1708e77a14548fbf8d3262f9031e2
                                                                  • Instruction Fuzzy Hash: 534116B2D002199FCB00DFE5CC44AAEBBB8FF08315F14417AE905EB295EB75A919CB54
                                                                  APIs
                                                                  • __EH_prolog3_GS.LIBCMT ref: 0040650A
                                                                  • _memset.LIBCMT ref: 0040652F
                                                                    • Part of subcall function 00406221: _memset.LIBCMT ref: 00406242
                                                                    • Part of subcall function 00406221: VerSetConditionMask.KERNEL32(00000000,00000000,00000002,00000001), ref: 00406266
                                                                    • Part of subcall function 00406221: VerifyVersionInfoW.KERNEL32(0000011C,00000002,00000000), ref: 00406277
                                                                  • SHGetFolderPathW.SHELL32(00000000,00000024,00000000,00000000,?), ref: 00406550
                                                                  • GetFileAttributesW.KERNEL32(00000000,?), ref: 00406595
                                                                  • GetTempPathW.KERNEL32(00000105,?), ref: 0040660F
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: Path_memset$AttributesConditionFileFolderH_prolog3_InfoMaskTempVerifyVersion
                                                                  • String ID: \temp
                                                                  • API String ID: 2535338759-299273985
                                                                  • Opcode ID: df9413112d858ae19dfa6ab64a1c60492b827e2df9359407288a046e8d3ba5a5
                                                                  • Instruction ID: 5c1c7ce91fb6459ef8daeaefebc89d3eae4d0ca7ec1dc087fe013dec4e8bf918
                                                                  • Opcode Fuzzy Hash: df9413112d858ae19dfa6ab64a1c60492b827e2df9359407288a046e8d3ba5a5
                                                                  • Instruction Fuzzy Hash: 5731B671601215ABDB14FBA0DD89B9E77A89F04708F5005BBA10AB71D1DB789E44CF58
                                                                  APIs
                                                                  • GdipGetImageEncodersSize.GDIPLUS(?,?,0044AAF8,0000001C,0040613A), ref: 00405E47
                                                                  • _malloc.LIBCMT ref: 00405E58
                                                                    • Part of subcall function 004233F8: __FF_MSGBANNER.LIBCMT ref: 0042340F
                                                                    • Part of subcall function 004233F8: __NMSG_WRITE.LIBCMT ref: 00423416
                                                                    • Part of subcall function 004233F8: RtlAllocateHeap.NTDLL(00660000,00000000,00000001,?,?,?,?,004011E6), ref: 0042343B
                                                                  • @_EH4_CallFilterFunc@8.LIBCMT ref: 00405E72
                                                                  • GdipGetImageEncoders.GDIPLUS(?,?,00000000), ref: 00405E88
                                                                  • @_EH4_CallFilterFunc@8.LIBCMT ref: 00405EEB
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: CallEncodersFilterFunc@8GdipImage$AllocateHeapSize_malloc
                                                                  • String ID: image/png
                                                                  • API String ID: 4055285158-2966254431
                                                                  • Opcode ID: 0a7cffdaabb71e51b5a8023522bc28de60615dac7ba0e56e69e1f258c5dac84b
                                                                  • Instruction ID: 6f443ea867ac21ee6a7213a428923c9fee71e815441b008d7ca8109a3a937655
                                                                  • Opcode Fuzzy Hash: 0a7cffdaabb71e51b5a8023522bc28de60615dac7ba0e56e69e1f258c5dac84b
                                                                  • Instruction Fuzzy Hash: AD21D671D006159ACB00DFA5C9419EFB675FF54315B64423BE825B72D1D7398A01CF98
                                                                  APIs
                                                                  • __init_pointers.LIBCMT ref: 00428BC6
                                                                    • Part of subcall function 00425C8F: EncodePointer.KERNEL32(00000000,?,00428BCB,00424FC5,0044D308,00000014), ref: 00425C92
                                                                    • Part of subcall function 00425C8F: __initp_misc_winsig.LIBCMT ref: 00425CAD
                                                                    • Part of subcall function 00425C8F: GetModuleHandleW.KERNEL32(kernel32.dll), ref: 00427623
                                                                    • Part of subcall function 00425C8F: GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00427637
                                                                    • Part of subcall function 00425C8F: GetProcAddress.KERNEL32(00000000,FlsFree), ref: 0042764A
                                                                    • Part of subcall function 00425C8F: GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 0042765D
                                                                    • Part of subcall function 00425C8F: GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00427670
                                                                    • Part of subcall function 00425C8F: GetProcAddress.KERNEL32(00000000,InitializeCriticalSectionEx), ref: 00427683
                                                                    • Part of subcall function 00425C8F: GetProcAddress.KERNEL32(00000000,CreateEventExW), ref: 00427696
                                                                    • Part of subcall function 00425C8F: GetProcAddress.KERNEL32(00000000,CreateSemaphoreExW), ref: 004276A9
                                                                    • Part of subcall function 00425C8F: GetProcAddress.KERNEL32(00000000,SetThreadStackGuarantee), ref: 004276BC
                                                                    • Part of subcall function 00425C8F: GetProcAddress.KERNEL32(00000000,CreateThreadpoolTimer), ref: 004276CF
                                                                    • Part of subcall function 00425C8F: GetProcAddress.KERNEL32(00000000,SetThreadpoolTimer), ref: 004276E2
                                                                    • Part of subcall function 00425C8F: GetProcAddress.KERNEL32(00000000,WaitForThreadpoolTimerCallbacks), ref: 004276F5
                                                                    • Part of subcall function 00425C8F: GetProcAddress.KERNEL32(00000000,CloseThreadpoolTimer), ref: 00427708
                                                                    • Part of subcall function 00425C8F: GetProcAddress.KERNEL32(00000000,CreateThreadpoolWait), ref: 0042771B
                                                                    • Part of subcall function 00425C8F: GetProcAddress.KERNEL32(00000000,SetThreadpoolWait), ref: 0042772E
                                                                    • Part of subcall function 00425C8F: GetProcAddress.KERNEL32(00000000,CloseThreadpoolWait), ref: 00427741
                                                                  • __mtinitlocks.LIBCMT ref: 00428BCB
                                                                  • __mtterm.LIBCMT ref: 00428BD4
                                                                    • Part of subcall function 00428C3C: DeleteCriticalSection.KERNEL32(00000000,00000000,?,?,00428BD9,00424FC5,0044D308,00000014), ref: 0042E663
                                                                    • Part of subcall function 00428C3C: _free.LIBCMT ref: 0042E66A
                                                                    • Part of subcall function 00428C3C: DeleteCriticalSection.KERNEL32(NE,?,?,00428BD9,00424FC5,0044D308,00000014), ref: 0042E68C
                                                                  • __calloc_crt.LIBCMT ref: 00428BF9
                                                                  • __initptd.LIBCMT ref: 00428C1B
                                                                  • GetCurrentThreadId.KERNEL32 ref: 00428C22
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: AddressProc$CriticalDeleteSection$CurrentEncodeHandleModulePointerThread__calloc_crt__init_pointers__initp_misc_winsig__initptd__mtinitlocks__mtterm_free
                                                                  • String ID:
                                                                  • API String ID: 3567560977-0
                                                                  • Opcode ID: a32198b9bcabd6873260add76403e05d1b6b5325740bc30518d5badc756f72a2
                                                                  • Instruction ID: f0c7057509e3e750efa4d8641e8d526bdca92d4d33bf0d2653a26df3bbe9a948
                                                                  • Opcode Fuzzy Hash: a32198b9bcabd6873260add76403e05d1b6b5325740bc30518d5badc756f72a2
                                                                  • Instruction Fuzzy Hash: AFF0C23231B73129E2347677BC0665F6A848F00778FA4062FF420C52D2FF1D9882015D
                                                                  APIs
                                                                  • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoInitialize,00424BCE,?), ref: 00424B1F
                                                                  • GetProcAddress.KERNEL32(00000000), ref: 00424B26
                                                                  • EncodePointer.KERNEL32(00000000), ref: 00424B32
                                                                  • DecodePointer.KERNEL32(00000001,00424BCE,?), ref: 00424B4F
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                                                  • String ID: RoInitialize$combase.dll
                                                                  • API String ID: 3489934621-340411864
                                                                  • Opcode ID: 74b4986fd06737f2fc19b801d9999ea9f8d89ee42acaf29ddd3938cd89a5deaa
                                                                  • Instruction ID: 60ded4eba2b11c77984f842998915a91ede2d89ca29cb36594c39c1d66d79ed2
                                                                  • Opcode Fuzzy Hash: 74b4986fd06737f2fc19b801d9999ea9f8d89ee42acaf29ddd3938cd89a5deaa
                                                                  • Instruction Fuzzy Hash: 35E07575A90304BBEE115F70FD09B153A65B785B0AF906435F609DA1B1FBB898889A0C
                                                                  APIs
                                                                  • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,00424AF4), ref: 00424BF4
                                                                  • GetProcAddress.KERNEL32(00000000), ref: 00424BFB
                                                                  • EncodePointer.KERNEL32(00000000), ref: 00424C06
                                                                  • DecodePointer.KERNEL32(00424AF4), ref: 00424C21
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                                                  • String ID: RoUninitialize$combase.dll
                                                                  • API String ID: 3489934621-2819208100
                                                                  • Opcode ID: 088e486a9ba555f9930cbf190732dad374a4be7a57b7722e1af24b7f9980c213
                                                                  • Instruction ID: 9180643d3b947f2e6e7c6fc3fb523e52f09163adab373c5fed473728b426bc46
                                                                  • Opcode Fuzzy Hash: 088e486a9ba555f9930cbf190732dad374a4be7a57b7722e1af24b7f9980c213
                                                                  • Instruction Fuzzy Hash: 59E09274A40304FBEA145FA5FD09B063BA4A788707F61A435F609D51B2EBB888888F1C
                                                                  APIs
                                                                  • IsDlgButtonChecked.USER32(?), ref: 0040E81D
                                                                  • CheckDlgButton.USER32(?,?,00000000), ref: 0040E82D
                                                                  • SendMessageW.USER32(?,?,00000004,?), ref: 0040E866
                                                                  • CheckDlgButton.USER32(?,?,00000001), ref: 0040E88E
                                                                  • SendMessageW.USER32(?,?,00000004,?), ref: 0040E8CD
                                                                  • IsDlgButtonChecked.USER32(?,00000001), ref: 0040E915
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: Button$CheckCheckedMessageSend
                                                                  • String ID:
                                                                  • API String ID: 2408100105-0
                                                                  • Opcode ID: 472b8f54255d852f9face60a643a1eb80f8aec402a8091215071d6098ffdb10e
                                                                  • Instruction ID: 78d7a78f5e75b3976611ac763487d974ce810b690b8bb11ef96d569ec44b3381
                                                                  • Opcode Fuzzy Hash: 472b8f54255d852f9face60a643a1eb80f8aec402a8091215071d6098ffdb10e
                                                                  • Instruction Fuzzy Hash: 8F419139200102AFC754DF29C984E95BBE4FF05314F40826EF9499BA92C732F965CB90
                                                                  APIs
                                                                  • GetSysColor.USER32(0000000F), ref: 0040E61A
                                                                  • SetBkColor.GDI32(?,00000000), ref: 0040E622
                                                                  • GetSysColorBrush.USER32(0000000F), ref: 0040E62A
                                                                  • LoadCursorW.USER32(00000000,00007F00), ref: 0040E669
                                                                  • SetCursor.USER32(00000000), ref: 0040E670
                                                                  • DeleteObject.GDI32(?), ref: 0040E694
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: Color$Cursor$BrushDeleteLoadObject
                                                                  • String ID:
                                                                  • API String ID: 68902092-0
                                                                  • Opcode ID: 75fda9e00c082a758571a55cdf75c5b9acdc5033b11deeb7ccee7f84baa65166
                                                                  • Instruction ID: 21d982b2bc617361d25c2d73ed5eedcd270f8ddd4930c6fff6136c33668945b7
                                                                  • Opcode Fuzzy Hash: 75fda9e00c082a758571a55cdf75c5b9acdc5033b11deeb7ccee7f84baa65166
                                                                  • Instruction Fuzzy Hash: 74212035104101ABCB145B6ABD48E7B3BACEB74701F840D3BF546E22E0CA7A9C21962D
                                                                  APIs
                                                                  • GetDlgItem.USER32(?,00000001), ref: 004140AF
                                                                  • GetDlgItem.USER32(?,00000002), ref: 004140B9
                                                                  • GetDlgItem.USER32(?,00000004), ref: 004140C3
                                                                  • GetDlgItem.USER32(?,00000003), ref: 004140CD
                                                                  • SetBkColor.GDI32(?,00FFFFFF), ref: 004140F6
                                                                  • GetStockObject.GDI32(00000000), ref: 004140FE
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: Item$ColorObjectStock
                                                                  • String ID:
                                                                  • API String ID: 1663661790-0
                                                                  • Opcode ID: 74e6638b04db83bc42c776e8a198510084f21e84bc49845e598d9efcc5b7e8f3
                                                                  • Instruction ID: e68e0145347c8531725b75692787a5094fd1bdf21b098dd9e7d3f6c177e7002d
                                                                  • Opcode Fuzzy Hash: 74e6638b04db83bc42c776e8a198510084f21e84bc49845e598d9efcc5b7e8f3
                                                                  • Instruction Fuzzy Hash: 46115E75E00209ABCB00DFA5DC85AAEBFB5FF48311F40456AEA14A7290DB74AA54CF94
                                                                  APIs
                                                                  • SendMessageW.USER32(?,?,00000005,?), ref: 0040FC71
                                                                  • GetSysColor.USER32(0000000F), ref: 0040FC80
                                                                  • SetBkColor.GDI32(?,00000000), ref: 0040FC8A
                                                                  • GetSysColorBrush.USER32(0000000F), ref: 0040FC92
                                                                  • GetWindowLongW.USER32(?,000000EB), ref: 0040FCA0
                                                                  • SetWindowLongW.USER32(?,000000FC,00000000), ref: 0040FCAF
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: Color$LongWindow$BrushMessageSend
                                                                  • String ID:
                                                                  • API String ID: 3134631659-0
                                                                  • Opcode ID: 3619c2774414eaec061f0fdb97f556c073a8d28213c83b691242146af6d3e8a1
                                                                  • Instruction ID: 04b4360ad2418072fc9eecead2d52ce8374078c2759cf49105debdeec3dea7bf
                                                                  • Opcode Fuzzy Hash: 3619c2774414eaec061f0fdb97f556c073a8d28213c83b691242146af6d3e8a1
                                                                  • Instruction Fuzzy Hash: 4201693A10850ABFEB211F55ED09D6B7B29FB04321F104236F926A19F0CB369864DB69
                                                                  APIs
                                                                  • GetDlgItem.USER32(?,00000065), ref: 00413E3F
                                                                  • GetWindowTextW.USER32(00000000,?,00000100), ref: 00413E54
                                                                  • StrCmpNW.SHLWAPI(?,?,00000100), ref: 00413E67
                                                                  • SetWindowTextW.USER32(00000000,?), ref: 00413E73
                                                                  • GetDlgItem.USER32(?,00000064), ref: 00413E7E
                                                                  • SendMessageW.USER32(00000000,00000402,?,00000000), ref: 00413E92
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: ItemTextWindow$MessageSend
                                                                  • String ID:
                                                                  • API String ID: 4055436057-0
                                                                  • Opcode ID: 089d0d5649ec4f42a748250fe2006293db44323a309b83aa7fcefd21ef9160fe
                                                                  • Instruction ID: b6a96d4c0f11765226092326f1092f5a0e29bab5f2deebaa6c4358c42e104295
                                                                  • Opcode Fuzzy Hash: 089d0d5649ec4f42a748250fe2006293db44323a309b83aa7fcefd21ef9160fe
                                                                  • Instruction Fuzzy Hash: 5511C87AA40308FBDB109F60DC4DF9B7B7CEB48701F1080BAFA05D6191DA769A04CB54
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: __ecvt_s_memset
                                                                  • String ID: -Infinity$Infinity$NaN
                                                                  • API String ID: 3060828135-2857212649
                                                                  • Opcode ID: 6a3563ee6f0f34d9b020c45c55d6a3601027cc1fd3e195601a8b24256f03aa2a
                                                                  • Instruction ID: 3c052919c6b56ad4ec93c6d0a9317e79f532a1b55d9ee855025736cc9d9ee39d
                                                                  • Opcode Fuzzy Hash: 6a3563ee6f0f34d9b020c45c55d6a3601027cc1fd3e195601a8b24256f03aa2a
                                                                  • Instruction Fuzzy Hash: 38518C759147488ADB11DF38D8507EEBBF8DF16300F14419FE885B7301DB288882C7A8
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: _memmove
                                                                  • String ID: invalid string position$string too long
                                                                  • API String ID: 4104443479-4289949731
                                                                  • Opcode ID: 0bdcc3451a53281bb960ee85ce237becb9989f0f8433b0534d582434e9e9ff0f
                                                                  • Instruction ID: ab53bd61a4523f349316453517cc98c962f88d700f191e107e846823d9ea553e
                                                                  • Opcode Fuzzy Hash: 0bdcc3451a53281bb960ee85ce237becb9989f0f8433b0534d582434e9e9ff0f
                                                                  • Instruction Fuzzy Hash: 2B41B331B003049BDB24DE98DD84A5B77B6EF45704B14053EF846AB2C1CB79DD4AC7AA
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: _memmove
                                                                  • String ID: invalid string position$string too long
                                                                  • API String ID: 4104443479-4289949731
                                                                  • Opcode ID: 7c276d3c5873862efdea44384aa9aeb6e09a192408702faf637d3b0a9b6c394d
                                                                  • Instruction ID: 02d075121d4be4ee1b85eaf10d9a8e82ebae89402b7e90d8b5869852c7e5a3f7
                                                                  • Opcode Fuzzy Hash: 7c276d3c5873862efdea44384aa9aeb6e09a192408702faf637d3b0a9b6c394d
                                                                  • Instruction Fuzzy Hash: 99419D71200204DBDB34CF18D9C096A77AAEB857047204B3FE856AB3C1D739E942CBE9
                                                                  APIs
                                                                  • __EH_prolog3_GS.LIBCMT ref: 0040841C
                                                                  • EnterCriticalSection.KERNEL32(004585BC,000000BC,00412BD4), ref: 00408427
                                                                  • LeaveCriticalSection.KERNEL32(004585BC), ref: 00408441
                                                                    • Part of subcall function 00405851: __EH_prolog3.LIBCMT ref: 00405858
                                                                    • Part of subcall function 00403E1D: char_traits.LIBCPMT ref: 00403E36
                                                                    • Part of subcall function 004091F7: __EH_prolog3_catch.LIBCMT ref: 004091FE
                                                                    • Part of subcall function 004091F7: Concurrency::details::_Concurrent_queue_base_v4::_Internal_throw_exception.LIBCPMT ref: 004092A1
                                                                    • Part of subcall function 004180AD: __EH_prolog3_GS.LIBCMT ref: 004180B7
                                                                    • Part of subcall function 004180AD: std::ios_base::_Ios_base_dtor.LIBCPMT ref: 004181F1
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: CriticalH_prolog3_Section$Concurrency::details::_Concurrent_queue_base_v4::_EnterH_prolog3H_prolog3_catchInternal_throw_exceptionIos_base_dtorLeavechar_traitsstd::ios_base::_
                                                                  • String ID: DjD$http://g.itorrent.bz/support.i
                                                                  • API String ID: 2386813964-735448917
                                                                  • Opcode ID: 8d926f27aaf359c690fbe4c147ecd8f5e885a50eb5bb1b6ded04a17aa4cd3c61
                                                                  • Instruction ID: d0984ec074dcb09c385c0921564facf04c5eaffe129efd5ce336abd474970a4a
                                                                  • Opcode Fuzzy Hash: 8d926f27aaf359c690fbe4c147ecd8f5e885a50eb5bb1b6ded04a17aa4cd3c61
                                                                  • Instruction Fuzzy Hash: F6414F30900268EADB15EB51CC55BDEBB38AF51304F5040AEE54573182DF781F89CA6A
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: _memmove
                                                                  • String ID: vector<T> too long
                                                                  • API String ID: 4104443479-3788999226
                                                                  • Opcode ID: c3596f2e22a591598f36a6820c99c5f2b17c7e27e4fd3f96c9cfd97b63f6d4be
                                                                  • Instruction ID: 64cad27290486e1f9f9ebf741cbbaf24fd12648acc7f64256846290041c3cb19
                                                                  • Opcode Fuzzy Hash: c3596f2e22a591598f36a6820c99c5f2b17c7e27e4fd3f96c9cfd97b63f6d4be
                                                                  • Instruction Fuzzy Hash: 8221A5B2600116BFCB04DF69DD8599ABB79FF08344B10852EF51897301EB35E960CBD8
                                                                  APIs
                                                                  • _memset.LIBCMT ref: 0041185C
                                                                    • Part of subcall function 004135A4: vswprintf.LIBCMT ref: 004135D3
                                                                    • Part of subcall function 0041079B: __EH_prolog3_GS.LIBCMT ref: 004107A2
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3__memsetvswprintf
                                                                  • String ID: dp%ib%i$pdf$x6E$x6E
                                                                  • API String ID: 29975221-2371465077
                                                                  • Opcode ID: 69732abc92f7fb45f1d8a4ba851c339690ef2b4a4f1aedf00280aefbac49a363
                                                                  • Instruction ID: 3c4bf2cfdbd2524e31ae69215d8d6fffb08cf6c0925edf3b2a5da57a9cb51153
                                                                  • Opcode Fuzzy Hash: 69732abc92f7fb45f1d8a4ba851c339690ef2b4a4f1aedf00280aefbac49a363
                                                                  • Instruction Fuzzy Hash: 76212731B00304ABD708EFB9D895BBD7BA5EB44319F40402EF6065B392DB79AD858798
                                                                  APIs
                                                                    • Part of subcall function 004034A0: MulDiv.KERNEL32(?,00000048), ref: 004034B3
                                                                  • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000190,00000000,00000000,00000000,000000CC,00000000,00000000,00000005,00000000,Calibri), ref: 0040E38B
                                                                  • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,000000CC,00000000,00000000,00000005,00000000,Calibri), ref: 0040E3B5
                                                                  • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,000000CC,00000000,00000000,00000005,00000002,Arial), ref: 0040E3DF
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: CreateFont
                                                                  • String ID: Arial$Calibri
                                                                  • API String ID: 1830492434-3143271472
                                                                  • Opcode ID: 1119b04e1f4adc43f96847dbbbed878917360d826fff803a159736cb13d469ad
                                                                  • Instruction ID: a26e272c2c31c8bcbbee2ac165e69fd93a116824182e96f6c85807be2a5464a8
                                                                  • Opcode Fuzzy Hash: 1119b04e1f4adc43f96847dbbbed878917360d826fff803a159736cb13d469ad
                                                                  • Instruction Fuzzy Hash: 07112DF0B807097EF6109B399C46F376E9CD749756F514126BD08EB1C2E6B84C004A78
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3_
                                                                  • String ID:
                                                                  • API String ID: 2427045233-0
                                                                  • Opcode ID: 10b0db66d8254bf1cfc03125b96b8ab86d6a5c4c8afa3918e48a377d182d9c3a
                                                                  • Instruction ID: 4ae37cd0ea27515cf6dc1486d50d573136b41ad5f042b35645b980e5770ddf8f
                                                                  • Opcode Fuzzy Hash: 10b0db66d8254bf1cfc03125b96b8ab86d6a5c4c8afa3918e48a377d182d9c3a
                                                                  • Instruction Fuzzy Hash: 43E18D71C40A09DACB05DFA4D8905EEBB76FF4E314F24824EE4057B151EB3999C2CBA8
                                                                  APIs
                                                                  • SetLastError.KERNEL32(00000000,0044A4D0,00000018,004030F4,0044A6E8,00000018,00403254), ref: 00401702
                                                                    • Part of subcall function 00401664: GetFileSizeEx.KERNEL32(?,?), ref: 00401683
                                                                  • LocalAlloc.KERNEL32(00000040,00000014), ref: 0040172A
                                                                  • CreateFileMappingW.KERNEL32(00000000,00000000,00000004,00000000,00000000,00000000), ref: 00401754
                                                                  • MapViewOfFile.KERNEL32(00000000,00000006,00000000,00000000,00000000), ref: 0040176C
                                                                  • @_EH4_CallFilterFunc@8.LIBCMT ref: 00401790
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: File$AllocCallCreateErrorFilterFunc@8LastLocalMappingSizeView
                                                                  • String ID:
                                                                  • API String ID: 1189735882-0
                                                                  • Opcode ID: 2d1a410b74ab523735f7a634867ffcd70156b9e1a80247a65af1311bcbcfd06c
                                                                  • Instruction ID: 70a6bceb7bf200b0760ee97c2e066cac7ed96d84eeb14adb82ff5478da5bc847
                                                                  • Opcode Fuzzy Hash: 2d1a410b74ab523735f7a634867ffcd70156b9e1a80247a65af1311bcbcfd06c
                                                                  • Instruction Fuzzy Hash: A82195B4A003099FDB24DFA8C885ABE77F4AF48314F14417EE405B73D1C6798D048B28
                                                                  APIs
                                                                  • _malloc.LIBCMT ref: 0042EDF4
                                                                    • Part of subcall function 004233F8: __FF_MSGBANNER.LIBCMT ref: 0042340F
                                                                    • Part of subcall function 004233F8: __NMSG_WRITE.LIBCMT ref: 00423416
                                                                    • Part of subcall function 004233F8: RtlAllocateHeap.NTDLL(00660000,00000000,00000001,?,?,?,?,004011E6), ref: 0042343B
                                                                  • _free.LIBCMT ref: 0042EE07
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: AllocateHeap_free_malloc
                                                                  • String ID:
                                                                  • API String ID: 1020059152-0
                                                                  • Opcode ID: c177ffb7d49970c6ecea95cc6c63f60acfa8dbb714a9a763cecf45e75d3c1f06
                                                                  • Instruction ID: 84ea3e0069e41ae92f8b6924154eb98145f09f121d242a3e9220bc6b8a468d72
                                                                  • Opcode Fuzzy Hash: c177ffb7d49970c6ecea95cc6c63f60acfa8dbb714a9a763cecf45e75d3c1f06
                                                                  • Instruction Fuzzy Hash: B4119431B00639ABCF253B77BC45B5B36989F00368BA1053BF9099A251DA7DC880C69D
                                                                  APIs
                                                                  • GetDlgItem.USER32(?,00000001), ref: 0040F4EB
                                                                  • GetDlgItem.USER32(?,00000002), ref: 0040F4F5
                                                                  • GetDlgItem.USER32(?,00000003), ref: 0040F4FF
                                                                  • SetBkColor.GDI32(?,00FFFFFF), ref: 0040F528
                                                                  • GetStockObject.GDI32(00000000), ref: 0040F530
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: Item$ColorObjectStock
                                                                  • String ID:
                                                                  • API String ID: 1663661790-0
                                                                  • Opcode ID: e4cd8d67397070eb732ff8e967f9d5f6ed5987914a2923e4647e894c17b6b053
                                                                  • Instruction ID: aaf89cb2323c3a222a27202acc0b89cdf8fe8c20a197071689c9442db659b279
                                                                  • Opcode Fuzzy Hash: e4cd8d67397070eb732ff8e967f9d5f6ed5987914a2923e4647e894c17b6b053
                                                                  • Instruction Fuzzy Hash: FF118B71E00209FBCB10DFA9DD45AAEBBB5FF08300F50417AE905E7291DB70AA14CBA0
                                                                  APIs
                                                                  • __EH_prolog3_GS.LIBCMT ref: 00417EDA
                                                                    • Part of subcall function 00418943: _memmove.LIBCMT ref: 0041899B
                                                                    • Part of subcall function 00418943: _memmove.LIBCMT ref: 004189C0
                                                                    • Part of subcall function 0040403B: _memmove.LIBCMT ref: 0040405B
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: _memmove$H_prolog3_
                                                                  • String ID: "$--4jhf94jdfksjhf452f186c710c89c4--$4jhf94jdfksjhf452f186c710c89c4
                                                                  • API String ID: 4009893447-2352833847
                                                                  • Opcode ID: 505750287b12934479f406604c73c7c4ebc13b4842395b508f80f47a993fb619
                                                                  • Instruction ID: 425c3565a9a7e986c2dbe40d211d3f7a5773420f2704f13f84d35c73ec18e22c
                                                                  • Opcode Fuzzy Hash: 505750287b12934479f406604c73c7c4ebc13b4842395b508f80f47a993fb619
                                                                  • Instruction Fuzzy Hash: DA512070A00218DEEB14EF65CD91BDDBBB1AF18304F6080AEE605772C2DBB46E48CB55
                                                                  APIs
                                                                  • __EH_prolog3_GS.LIBCMT ref: 00417ACF
                                                                    • Part of subcall function 00423D6A: _malloc.LIBCMT ref: 00423D82
                                                                  • __beginthreadex.LIBCMT ref: 00417B0F
                                                                  • CloseHandle.KERNEL32(00000000,0000009C,00412372,7055389B), ref: 00417B18
                                                                  Strings
                                                                  • Content-Type: application/json;, xrefs: 00417B23
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: CloseH_prolog3_Handle__beginthreadex_malloc
                                                                  • String ID: Content-Type: application/json;
                                                                  • API String ID: 2846763876-3482751464
                                                                  • Opcode ID: ea637636dd78e14735a57ccfaa2af261f4987a2df7a6af3613cbbd433f167944
                                                                  • Instruction ID: abe3bf597a8ed785c1617d037b6195b758e9967ab08d788d91e817086635b175
                                                                  • Opcode Fuzzy Hash: ea637636dd78e14735a57ccfaa2af261f4987a2df7a6af3613cbbd433f167944
                                                                  • Instruction Fuzzy Hash: BA319071C05114AADB15EBA6DC46EDFBB7C9F51348F1041AFB10573182EE782F48CA69
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: _memmove
                                                                  • String ID: invalid string position$string too long
                                                                  • API String ID: 4104443479-4289949731
                                                                  • Opcode ID: 78aba3436c9a7563c23e2985ea3885af1175cc28d285cda10b3844a8a782f7c8
                                                                  • Instruction ID: fbf1768666f47b327ecce23165898225bad4220c164bf76617ce4ecf6e37835f
                                                                  • Opcode Fuzzy Hash: 78aba3436c9a7563c23e2985ea3885af1175cc28d285cda10b3844a8a782f7c8
                                                                  • Instruction Fuzzy Hash: 593192303007049BDB249F1DEA4499BBBA9EF85754B10092FF856C7381C7B9E9A087A9
                                                                  APIs
                                                                  • __EH_prolog3_GS.LIBCMT ref: 00411913
                                                                  • ShellExecuteW.SHELL32(00000000,00000000,00000000,--start,00000000,00000005), ref: 00411959
                                                                  • MoveFileW.KERNEL32(00000000,00000000), ref: 004119B1
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: ExecuteFileH_prolog3_MoveShell
                                                                  • String ID: --start
                                                                  • API String ID: 3648082551-3513725784
                                                                  • Opcode ID: 439ae14c3850e0988b9e93d5669a17e3e7c3ef785926392691b4cb9135b18039
                                                                  • Instruction ID: b0b3ebde7b29dd6ec17f2134c6303d1cd5aabd18c28d123de16a5e3ee5c198e2
                                                                  • Opcode Fuzzy Hash: 439ae14c3850e0988b9e93d5669a17e3e7c3ef785926392691b4cb9135b18039
                                                                  • Instruction Fuzzy Hash: 5E31D5B0811244EBC724EFA5ED559AE7774EF8530AB10013FF112671B2DB789A44CB6D
                                                                  APIs
                                                                  • __EH_prolog3_GS.LIBCMT ref: 00406E1C
                                                                    • Part of subcall function 0040814F: vswprintf.LIBCMT ref: 0040817E
                                                                    • Part of subcall function 00403E1D: char_traits.LIBCPMT ref: 00403E36
                                                                    • Part of subcall function 00406500: __EH_prolog3_GS.LIBCMT ref: 0040650A
                                                                    • Part of subcall function 00406500: _memset.LIBCMT ref: 0040652F
                                                                    • Part of subcall function 00406500: SHGetFolderPathW.SHELL32(00000000,00000024,00000000,00000000,?), ref: 00406550
                                                                    • Part of subcall function 00406857: __EH_prolog3.LIBCMT ref: 0040685E
                                                                    • Part of subcall function 00406857: PathAppendW.SHLWAPI(00000000,?,0000000C,004069FA,?,itorrent-application.exe,0000003C,0040756C), ref: 004068C1
                                                                    • Part of subcall function 00406203: GetFileAttributesW.KERNEL32(?,0040DDD4,?,00000184,0040DFA6,?,00000000,?,?,?,?,?,?,0043D89B,000000FF), ref: 0040620C
                                                                  • DeleteFileW.KERNEL32(?), ref: 00406ED7
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: FileH_prolog3_Path$AppendAttributesDeleteFolderH_prolog3_memsetchar_traitsvswprintf
                                                                  • String ID: Too small buffer$ipartner%i_%i_%i.exe
                                                                  • API String ID: 4035436367-3067181009
                                                                  • Opcode ID: 14a51824f434d8a7b114c2fc91d093794c287e62e5b26666278070245492a1aa
                                                                  • Instruction ID: cfa7cd92500677f9f9e30e4361c46c9faf066bbab61363879bcc592718f51b70
                                                                  • Opcode Fuzzy Hash: 14a51824f434d8a7b114c2fc91d093794c287e62e5b26666278070245492a1aa
                                                                  • Instruction Fuzzy Hash: 38319C70A002199BDB24EB21CD46BDEB374AF54708F5041FEA20AB60D1DF785F98CE99
                                                                  APIs
                                                                  • Concurrency::details::_Concurrent_queue_base_v4::_Internal_throw_exception.LIBCPMT ref: 00412F63
                                                                    • Part of subcall function 00423D6A: _malloc.LIBCMT ref: 00423D82
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: Concurrency::details::_Concurrent_queue_base_v4::_Internal_throw_exception_malloc
                                                                  • String ID: 8Qi$8Ui$XQi
                                                                  • API String ID: 657562460-2883074133
                                                                  • Opcode ID: 061db7dda5efb9cc6466accdb2582fbd956c9f32197d9b06a35faff5fb125a9e
                                                                  • Instruction ID: 4a1b863313415172712ea5aedceaa5400e341e34423d22cca9ea566d14fe6b80
                                                                  • Opcode Fuzzy Hash: 061db7dda5efb9cc6466accdb2582fbd956c9f32197d9b06a35faff5fb125a9e
                                                                  • Instruction Fuzzy Hash: 1A21E7736002101B97089F7CAEC18A67769E798321719433FFA19E32D5CDB4EC91969C
                                                                  APIs
                                                                  • __EH_prolog3_GS.LIBCMT ref: 00411735
                                                                    • Part of subcall function 0040532C: __EH_prolog3_GS.LIBCMT ref: 00405336
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3_
                                                                  • String ID: <tD$dtD$ptD
                                                                  • API String ID: 2427045233-1265484696
                                                                  • Opcode ID: 47b2b227d705f3038caf3793f565e692366c2756fe2908b3c523cc5aab8ec2b3
                                                                  • Instruction ID: c65b5cd9b2b8ae70545eca1a4f468770e385d552eddece3f99c1c34840a2c244
                                                                  • Opcode Fuzzy Hash: 47b2b227d705f3038caf3793f565e692366c2756fe2908b3c523cc5aab8ec2b3
                                                                  • Instruction Fuzzy Hash: B811EB71601200AFD718BFA5AC529AE3665DB4434AB50403FF2026B3E3CF7C9E45865D
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: _wcscmp
                                                                  • String ID: ACP$OCP
                                                                  • API String ID: 856254489-711371036
                                                                  • Opcode ID: a3ee4c64dfe03094497c873a060030730c42dbe5755b05517f704ffc56aee54f
                                                                  • Instruction ID: f964b9b60d69c3079d81f8f20d37274d23a6ada51bccc06082724ac4ba31a21f
                                                                  • Opcode Fuzzy Hash: a3ee4c64dfe03094497c873a060030730c42dbe5755b05517f704ffc56aee54f
                                                                  • Instruction Fuzzy Hash: FD01D621600A05BAEB106E69EC46BDB33B99F0C359F045827F904DA285F77CF65042DD
                                                                  APIs
                                                                    • Part of subcall function 00403E1D: char_traits.LIBCPMT ref: 00403E36
                                                                  • char_traits.LIBCPMT ref: 00406C2C
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: char_traits
                                                                  • String ID: FreeSpacer_setup.exe.[tfile.ru].torrent.exe.torrent$http://tfile.me/forum/download.php?id=706491&ak=11xxxxxxxx$magnet:
                                                                  • API String ID: 1158913984-586054935
                                                                  • Opcode ID: 5cd5758db9c10e71c92e291b0142349a20150dbca2dac376d4d1542878734df8
                                                                  • Instruction ID: 474f0db7c1ce3e7e2187bd7b67d33717d050057802253f82ba6b5abeb153908d
                                                                  • Opcode Fuzzy Hash: 5cd5758db9c10e71c92e291b0142349a20150dbca2dac376d4d1542878734df8
                                                                  • Instruction Fuzzy Hash: 92F0F971B4020867D604EA669C53BBE736CDF85719F50023FB911772C1EE7C6E45825D
                                                                  APIs
                                                                    • Part of subcall function 00401367: LocalFlags.KERNEL32(?,00000000,00401920,?,?,00000000,00000000,?,00000000,?,?,00000000,00000000,?,00000000), ref: 00401371
                                                                    • Part of subcall function 00401367: LocalFree.KERNEL32(?,?,?,00000000,00000000,?,00000000,?,?,00000000,00000000,?,00000000), ref: 00401380
                                                                  • LocalFree.KERNEL32(?,00402DA0,0044A680,00000080), ref: 00402DD0
                                                                    • Part of subcall function 0040205C: Sleep.KERNEL32(0000012C,?,?,?,?,?,?,0044A5B0,00000024), ref: 004020A5
                                                                    • Part of subcall function 0040205C: SetEvent.KERNEL32(?,?,?,?,?,?,?,0044A5B0,00000024), ref: 004020B5
                                                                  • Sleep.KERNEL32(0000012C,?,?,?,?,?,?,?,?,00402DA0,0044A680,00000080), ref: 00402E05
                                                                  • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,00402DA0,0044A680,00000080), ref: 00402E15
                                                                  Strings
                                                                  • Can't start downloading, xrefs: 00402E1E
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: Local$EventFreeSleep$Flags
                                                                  • String ID: Can't start downloading
                                                                  • API String ID: 2595757405-642209808
                                                                  • Opcode ID: 10c81494cf74317edd1eda8ab10f892169d5b856f7118f0cafd6986c6e518e89
                                                                  • Instruction ID: e5fd38ee2cefbb517b0654aa061f1c99f74be26c97c525d6d25c6fdc7e604d85
                                                                  • Opcode Fuzzy Hash: 10c81494cf74317edd1eda8ab10f892169d5b856f7118f0cafd6986c6e518e89
                                                                  • Instruction Fuzzy Hash: C0019230A002048BEF28AF21DA48B6F76B1BF45705F44043EE002719D1CBB86D45CA8D
                                                                  APIs
                                                                  • IsWindow.USER32(00000000), ref: 0040328B
                                                                  • RemovePropW.USER32(00000000,USER-CALLBACK-STRUCT-8CF23F47-B5D4-49C5-ABA8-E10617869E66), ref: 0040329B
                                                                  • DestroyWindow.USER32(00000000), ref: 004032A2
                                                                  Strings
                                                                  • USER-CALLBACK-STRUCT-8CF23F47-B5D4-49C5-ABA8-E10617869E66, xrefs: 00403295
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: Window$DestroyPropRemove
                                                                  • String ID: USER-CALLBACK-STRUCT-8CF23F47-B5D4-49C5-ABA8-E10617869E66
                                                                  • API String ID: 1208278663-191918380
                                                                  • Opcode ID: 6996b86ec5bbe6ba5e5ec4ad52f708c87b2612037b5128482b0a4a3e23218315
                                                                  • Instruction ID: e06217b19a75a683b1bb0284ae50b9f1197288f63c37a9c8cbf8fc27fd0636fc
                                                                  • Opcode Fuzzy Hash: 6996b86ec5bbe6ba5e5ec4ad52f708c87b2612037b5128482b0a4a3e23218315
                                                                  • Instruction Fuzzy Hash: 64E06D75A1020597CB00AFB2DC859AE7A7C6E04706B4411BEA802B22E2DF3CCA04862C
                                                                  APIs
                                                                    • Part of subcall function 00439AC1: _memset.LIBCMT ref: 00439ACE
                                                                    • Part of subcall function 00418C17: InitializeCriticalSectionAndSpinCount.KERNEL32(004552A4,00000000,00455290,00439A9D,?,?,?,00401167), ref: 00418C1C
                                                                    • Part of subcall function 00418C17: GetLastError.KERNEL32(?,?,?,00401167), ref: 00418C26
                                                                  • IsDebuggerPresent.KERNEL32(?,?,?,00401167), ref: 00439AA1
                                                                  • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,00401167), ref: 00439AB0
                                                                  Strings
                                                                  • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00439AAB
                                                                  • pYD, xrefs: 00439A91
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: CountCriticalDebugDebuggerErrorInitializeLastOutputPresentSectionSpinString_memset
                                                                  • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule$pYD
                                                                  • API String ID: 436010757-2140561303
                                                                  • Opcode ID: 308374348299f4ca63c200ba3b0e9b3b67c7fe22f00814d5b093fb3b34925bbd
                                                                  • Instruction ID: 3e4de3afa981b8ae560b05c1c24c26c8cdcbdb6888c865af24a87a0343b9d94d
                                                                  • Opcode Fuzzy Hash: 308374348299f4ca63c200ba3b0e9b3b67c7fe22f00814d5b093fb3b34925bbd
                                                                  • Instruction Fuzzy Hash: A4E06DB0600750CBD720EF66E8047427AE4AB08358F10992EE896C2241DBB8D8488F69
                                                                  APIs
                                                                  • ShellExecuteW.SHELL32(00000000,00000000,00000000,00000000,00000000,00000005), ref: 0040EA20
                                                                  • _memmove.LIBCMT ref: 0040E9BA
                                                                    • Part of subcall function 00403E1D: char_traits.LIBCPMT ref: 00403E36
                                                                    • Part of subcall function 004078C5: __EH_prolog3.LIBCMT ref: 004078CC
                                                                    • Part of subcall function 004078C5: char_traits.LIBCPMT ref: 004078F7
                                                                    • Part of subcall function 004078C5: char_traits.LIBCPMT ref: 0040790C
                                                                    • Part of subcall function 00405457: char_traits.LIBCPMT ref: 00405468
                                                                    • Part of subcall function 004068F9: AssocQueryStringW.SHLWAPI(00000000,00000002,http,open,?,?), ref: 0040693C
                                                                  • _memmove.LIBCMT ref: 0040EA7B
                                                                  • ShellExecuteW.SHELL32(00000000,00000000,00000000,00000000,00000000,00000005), ref: 0040EAE5
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: char_traits$ExecuteShell_memmove$AssocH_prolog3QueryString
                                                                  • String ID:
                                                                  • API String ID: 4019695314-0
                                                                  • Opcode ID: 4e60f385890f64c278c05d73b90f2a0ed8ede64ae6f7a0d9dbfb3fd9eeeef69f
                                                                  • Instruction ID: 2d207d9e68e4e9dfe2bcd2d990fef91c5353be8775d14a75848bc9dc490b0d30
                                                                  • Opcode Fuzzy Hash: 4e60f385890f64c278c05d73b90f2a0ed8ede64ae6f7a0d9dbfb3fd9eeeef69f
                                                                  • Instruction Fuzzy Hash: 92516C71A00208AEDB10EB95DC85FDEB7B8EB04318F50457EE206A71C1EB74AE44CB65
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: AdjustPointer_memmove
                                                                  • String ID:
                                                                  • API String ID: 1721217611-0
                                                                  • Opcode ID: bb0439265f5064f9e4e9b6b47625b802f0fb418c9bd08e7fa8f732ed6e6d4337
                                                                  • Instruction ID: b5ca4326ca5c214d94ade9f8f836757ded19b9425b26b1c03e64a02441901986
                                                                  • Opcode Fuzzy Hash: bb0439265f5064f9e4e9b6b47625b802f0fb418c9bd08e7fa8f732ed6e6d4337
                                                                  • Instruction Fuzzy Hash: 08413A322803035EEB249F65D851B2773E6DF09324F24501FFA85862E1EB7EE860C65A
                                                                  APIs
                                                                  • __Getcvt.LIBCPMT ref: 004396B9
                                                                  • MultiByteToWideChar.KERNEL32(?,00000009,?,00000002,00000000,00000000,?,?,?), ref: 00439707
                                                                  • MultiByteToWideChar.KERNEL32(?,00000009,?,00000001,00000000,00000000,?,?,?), ref: 0043977D
                                                                  • MultiByteToWideChar.KERNEL32(?,00000009,?,00000001,00000000,00000000,?,?,?), ref: 004397A5
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: ByteCharMultiWide$Getcvt
                                                                  • String ID:
                                                                  • API String ID: 3195005509-0
                                                                  • Opcode ID: d16f6a421d07191767b8cc63d80c54c6e72dac664fa6b748cad2a349bbdb683d
                                                                  • Instruction ID: 111df32dc8aa6f4cc0793f73f0051f1d0de3f51e74bf94a3680989757f8134ea
                                                                  • Opcode Fuzzy Hash: d16f6a421d07191767b8cc63d80c54c6e72dac664fa6b748cad2a349bbdb683d
                                                                  • Instruction Fuzzy Hash: CC410F31A11345EFDB218F64D881BABB7F9EF49310F14502AF8518B290D7B9DC54CB58
                                                                  APIs
                                                                    • Part of subcall function 00401CD0: @_EH4_CallFilterFunc@8.LIBCMT ref: 00401D04
                                                                  • LocalAlloc.KERNEL32(00000040,00000019,0044A6A8,00000024,00403230,Function_0000313F,?,00000000), ref: 00402F59
                                                                  • WinHttpCrackUrl.WINHTTP(?,?,00000000,00002074,0044A6A8,00000024,00403230,Function_0000313F,?,00000000), ref: 00402FCA
                                                                  • SetEvent.KERNEL32(?), ref: 00402FE4
                                                                  • @_EH4_CallFilterFunc@8.LIBCMT ref: 00402FF5
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: CallFilterFunc@8$AllocCrackEventHttpLocal
                                                                  • String ID:
                                                                  • API String ID: 3069150556-0
                                                                  • Opcode ID: e27651e2f4193711a8fba06376fe38715b0384a0f38c59bd44f3ded85e17deb6
                                                                  • Instruction ID: d3bce951d455c649fc0e85e28c2efb29aee1857387ac8cb35a7e46944641a1c5
                                                                  • Opcode Fuzzy Hash: e27651e2f4193711a8fba06376fe38715b0384a0f38c59bd44f3ded85e17deb6
                                                                  • Instruction Fuzzy Hash: E5418B30A013019BDF18DF64C8847AA7BB1BF48319F14027AE815BB2D2D7B9A951CB58
                                                                  APIs
                                                                  • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 0043047C
                                                                  • __isleadbyte_l.LIBCMT ref: 004304AA
                                                                  • MultiByteToWideChar.KERNEL32(00000080,00000009,00428774,00000001,00000000,00000000,?,00000000,00000000,?,?,00428774,00000000), ref: 004304D8
                                                                  • MultiByteToWideChar.KERNEL32(00000080,00000009,00428774,00000001,00000000,00000000,?,00000000,00000000,?,?,00428774,00000000), ref: 0043050E
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                                  • String ID:
                                                                  • API String ID: 3058430110-0
                                                                  • Opcode ID: 31cca6a267a7a79c81f2495e93ba3531c260cbc37dc32a86dcb123380b114288
                                                                  • Instruction ID: 3df82db2bdd0cbb165ff717a9585900bb89539ec5c4b03ae7926247feabab6d4
                                                                  • Opcode Fuzzy Hash: 31cca6a267a7a79c81f2495e93ba3531c260cbc37dc32a86dcb123380b114288
                                                                  • Instruction Fuzzy Hash: B231F230A00206AFDB21CF35C854B7B7BB5FF49310F15522AE964872A0E738D950DB94
                                                                  APIs
                                                                    • Part of subcall function 004069BD: __EH_prolog3_GS.LIBCMT ref: 004069C4
                                                                  • DeleteFileW.KERNEL32(00000000), ref: 0040757B
                                                                  • DeleteFileW.KERNEL32(00000000,00000001,00000000), ref: 0040759B
                                                                  • DeleteFileW.KERNEL32(00000000,00000001,00000000), ref: 004075B9
                                                                  • DeleteFileW.KERNEL32(?,00000001,00000000), ref: 004075EE
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: DeleteFile$H_prolog3_
                                                                  • String ID:
                                                                  • API String ID: 3558260747-0
                                                                  • Opcode ID: 62f9de8935547a17f4cabcdc230e40f1e66d87e06f546796a5ee407423873112
                                                                  • Instruction ID: 1d7fec56eb948ce4b8726a670cfc9a7252243acae89278369a45da634ed6429e
                                                                  • Opcode Fuzzy Hash: 62f9de8935547a17f4cabcdc230e40f1e66d87e06f546796a5ee407423873112
                                                                  • Instruction Fuzzy Hash: C0214B71D05214ABCB14EB65DC849EEB3B4EF05304B01407AE502B7691DA38FD09CBAA
                                                                  APIs
                                                                    • Part of subcall function 004028EE: @_EH4_CallFilterFunc@8.LIBCMT ref: 0040293E
                                                                  • CreateEventW.KERNEL32(00000000,00000000,00000000,00000000,0044A708,00000040,00405325), ref: 004031E1
                                                                  • CreateEventW.KERNEL32(00000000,00000000,00000000,00000000), ref: 004031EC
                                                                    • Part of subcall function 00402EBF: LocalAlloc.KERNEL32(00000040,00000019,0044A6A8,00000024,00403230,Function_0000313F,?,00000000), ref: 00402F59
                                                                    • Part of subcall function 00402EBF: WinHttpCrackUrl.WINHTTP(?,?,00000000,00002074,0044A6A8,00000024,00403230,Function_0000313F,?,00000000), ref: 00402FCA
                                                                    • Part of subcall function 00402EBF: SetEvent.KERNEL32(?), ref: 00402FE4
                                                                    • Part of subcall function 00402EBF: @_EH4_CallFilterFunc@8.LIBCMT ref: 00402FF5
                                                                  • WaitForMultipleObjects.KERNEL32(00000002,?,00000000,000000FF), ref: 00403246
                                                                    • Part of subcall function 004030AE: @_EH4_CallFilterFunc@8.LIBCMT ref: 00403101
                                                                  • @_EH4_CallFilterFunc@8.LIBCMT ref: 00403261
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: CallFilterFunc@8$Event$Create$AllocCrackHttpLocalMultipleObjectsWait
                                                                  • String ID:
                                                                  • API String ID: 3533588738-0
                                                                  • Opcode ID: fb7d263850bbc8059c594a7e2dd3b49fc220ec3b190de1d6228af82cdf39d5c0
                                                                  • Instruction ID: dca8789877530075bc3908bd566b60e54a7fb258f35c6f6ba95e276bb25d8812
                                                                  • Opcode Fuzzy Hash: fb7d263850bbc8059c594a7e2dd3b49fc220ec3b190de1d6228af82cdf39d5c0
                                                                  • Instruction Fuzzy Hash: 312119B1D0121CABDB10DFEADC819AEBABCBF48715F64026FE414B7291D6744E018B68
                                                                  APIs
                                                                  • ___BuildCatchObject.LIBCMT ref: 0043A32A
                                                                    • Part of subcall function 0043A952: ___AdjustPointer.LIBCMT ref: 0043A99B
                                                                  • _UnwindNestedFrames.LIBCMT ref: 0043A341
                                                                  • ___FrameUnwindToState.LIBCMT ref: 0043A353
                                                                  • CallCatchBlock.LIBCMT ref: 0043A377
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: CatchUnwind$AdjustBlockBuildCallFrameFramesNestedObjectPointerState
                                                                  • String ID:
                                                                  • API String ID: 2633735394-0
                                                                  • Opcode ID: b3cdfde7ad9c98751fdf5e820463348c1216ecb7041a313df150442cb574fb80
                                                                  • Instruction ID: 1f2ad22f670f09560bb290a3af2385551b11a67cbc7e3ba1de8c3b78ac9ce2b7
                                                                  • Opcode Fuzzy Hash: b3cdfde7ad9c98751fdf5e820463348c1216ecb7041a313df150442cb574fb80
                                                                  • Instruction Fuzzy Hash: F4011732040109BBCF129F56CC01EDB3FAAEF5C754F15911AFD5865121C37AE8719BA5
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                                                  • String ID:
                                                                  • API String ID: 3016257755-0
                                                                  • Opcode ID: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                                                  • Instruction ID: 4b6a9445c5ae121d29ce48bec7989c6fa23d7f71ebdfbcb7f82741279fafcf5d
                                                                  • Opcode Fuzzy Hash: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                                                  • Instruction Fuzzy Hash: 4C016D3210015EBBCF125E84EC418EE3F32BB59354B998426FE1898131D33AC9B6AB85
                                                                  APIs
                                                                  • IsDlgButtonChecked.USER32(?), ref: 00413A07
                                                                  • CheckDlgButton.USER32(?,?,00000000), ref: 00413A17
                                                                  • CheckDlgButton.USER32(?,?,00000001), ref: 00413A24
                                                                  • SendMessageW.USER32(?,00000111,00000004), ref: 00413A39
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: Button$Check$CheckedMessageSend
                                                                  • String ID:
                                                                  • API String ID: 1986796423-0
                                                                  • Opcode ID: 8f9342e8cce7af186aeda7e8d511e8b295a5678a8325ffec57e19b9ef501b0ab
                                                                  • Instruction ID: f645c338b8c0d7f113f7494d0b159f51ee7d163187acc0653bf0e04128d043e0
                                                                  • Opcode Fuzzy Hash: 8f9342e8cce7af186aeda7e8d511e8b295a5678a8325ffec57e19b9ef501b0ab
                                                                  • Instruction Fuzzy Hash: BAF0C23A110180BFDB311F59DC09EE3BEADEB80B52B40813AB98381530C6659D86D66C
                                                                  APIs
                                                                  • __EH_prolog3_GS.LIBCMT ref: 004039AC
                                                                  • ConvertSidToStringSidW.ADVAPI32(?,?), ref: 004039D7
                                                                  • char_traits.LIBCPMT ref: 004039E9
                                                                  • LocalFree.KERNEL32(?,?,00000000,?,?,00000024,00403AC5), ref: 004039FE
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: ConvertFreeH_prolog3_LocalStringchar_traits
                                                                  • String ID:
                                                                  • API String ID: 169268410-0
                                                                  • Opcode ID: 18a71a8801d695ad9a1a79c4b9705fc52f2e20e91ed8b57db0e9f48f8ecbc2e9
                                                                  • Instruction ID: 330d9bc12d9727ac1ac3f0f7a88a301a3c85e4169af4813c262263d67a8e7101
                                                                  • Opcode Fuzzy Hash: 18a71a8801d695ad9a1a79c4b9705fc52f2e20e91ed8b57db0e9f48f8ecbc2e9
                                                                  • Instruction Fuzzy Hash: AB010C74E002499BDF04EFAAD8859EEBA79BF4C318F54903EE505B2291DB785D048F28
                                                                  APIs
                                                                  • SetLastError.KERNEL32(00000000,0044A490,0000000C), ref: 004015C9
                                                                    • Part of subcall function 004014A5: GetTempPathW.KERNEL32(000007FF,00000000,?,?,?,?,?,?,?,?,0044A470,00000018), ref: 004014D6
                                                                    • Part of subcall function 004014A5: InterlockedIncrement.KERNEL32(004586F8), ref: 004014F2
                                                                    • Part of subcall function 004014A5: GetCurrentProcessId.KERNEL32(?,?,?,?,?,?,?,?,0044A470,00000018), ref: 004014FA
                                                                    • Part of subcall function 004014A5: GetCurrentThreadId.KERNEL32 ref: 00401502
                                                                    • Part of subcall function 004014A5: @_EH4_CallFilterFunc@8.LIBCMT ref: 00401540
                                                                  • @_EH4_CallFilterFunc@8.LIBCMT ref: 004015EC
                                                                  • CreateFileW.KERNEL32(00000000,C0000000,00000000,00000000,00000002,04000180,00000000), ref: 0040160C
                                                                  • @_EH4_CallFilterFunc@8.LIBCMT ref: 00401625
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: CallFilterFunc@8$Current$CreateErrorFileIncrementInterlockedLastPathProcessTempThread
                                                                  • String ID:
                                                                  • API String ID: 3475211110-0
                                                                  • Opcode ID: 34b87f0dbcbe3df7386f326c4b5b9c3e8a1a737779554f15d66951518aee7c16
                                                                  • Instruction ID: 3e42059fc0f5822d4af85387583df8ecc2e3d4aade6683734adf05e26881119b
                                                                  • Opcode Fuzzy Hash: 34b87f0dbcbe3df7386f326c4b5b9c3e8a1a737779554f15d66951518aee7c16
                                                                  • Instruction Fuzzy Hash: 17F0FC74E0013576EB20ABB55C06F6F7A689F84725F914337F824E50D2EA7C85058BD9
                                                                  APIs
                                                                  • IsDlgButtonChecked.USER32(?), ref: 0040F481
                                                                  • CheckDlgButton.USER32(?,?,00000000), ref: 0040F491
                                                                  • CheckDlgButton.USER32(?,?,00000001), ref: 0040F49F
                                                                  • SendMessageW.USER32(?,?,00000004), ref: 0040F4B4
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: Button$Check$CheckedMessageSend
                                                                  • String ID:
                                                                  • API String ID: 1986796423-0
                                                                  • Opcode ID: a739c95703bed1df9eee9445c3692930df16dbbc5381ef42d85f35f4dce13d78
                                                                  • Instruction ID: 2dd1631989e9fb7164fb77f5827661894abfcb801cdf10967938aef3d0dc2dbf
                                                                  • Opcode Fuzzy Hash: a739c95703bed1df9eee9445c3692930df16dbbc5381ef42d85f35f4dce13d78
                                                                  • Instruction Fuzzy Hash: ADF0A735100200FFCA305B56DC09F83BFBDEBD0B21F008039F54591570C772A854DA68
                                                                  APIs
                                                                  • GetDlgItem.USER32(?,00000065), ref: 00413BF9
                                                                  • GetSysColor.USER32(0000000F), ref: 00413C06
                                                                  • SetBkColor.GDI32(?,00000000), ref: 00413C10
                                                                  • GetSysColorBrush.USER32(0000000F), ref: 00413C18
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: Color$BrushItem
                                                                  • String ID:
                                                                  • API String ID: 3803424071-0
                                                                  • Opcode ID: fecbe8c2bfac452e58defb22ee1d628d190a85a930236f64c590d68ff21d41b0
                                                                  • Instruction ID: 7bd2706b96af9ea98ffd0390f34b300d1e0f6ffff7780355e58701eae065b045
                                                                  • Opcode Fuzzy Hash: fecbe8c2bfac452e58defb22ee1d628d190a85a930236f64c590d68ff21d41b0
                                                                  • Instruction Fuzzy Hash: B3F0123654011AEBCF115F50DE08AEF3B66EB14712F004076F915641B1D7764A60EB99
                                                                  APIs
                                                                  • GetDC.USER32(00000000), ref: 00403539
                                                                  • GetDeviceCaps.GDI32(00000000,00000058), ref: 00403548
                                                                  • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00403556
                                                                  • ReleaseDC.USER32(00000000,00000000), ref: 00403564
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: CapsDevice$Release
                                                                  • String ID:
                                                                  • API String ID: 1035833867-0
                                                                  • Opcode ID: 2da7e04bd421032d5aa95e48f3d49375f71dfc27a8c331f257f8a82925c83d4b
                                                                  • Instruction ID: 813063950483375aaa198c9ca935c761bd9f72d4ac645af099198c97e3464c41
                                                                  • Opcode Fuzzy Hash: 2da7e04bd421032d5aa95e48f3d49375f71dfc27a8c331f257f8a82925c83d4b
                                                                  • Instruction Fuzzy Hash: 2AE0E575944741BAD7214F79AC0CF0B3E64A791B83F101179F601A62E2CAB98209CF18
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3_
                                                                  • String ID: xml:lang
                                                                  • API String ID: 2427045233-1948011537
                                                                  • Opcode ID: 924a20635c3bfcac2b6e5bda8936e3db9bf50112da069c52851502780b8c9a03
                                                                  • Instruction ID: 7fc906d94d09242db3d9e4f75970ca516389942f3187305b824f8e7da6cb0be9
                                                                  • Opcode Fuzzy Hash: 924a20635c3bfcac2b6e5bda8936e3db9bf50112da069c52851502780b8c9a03
                                                                  • Instruction Fuzzy Hash: B6B190B19442199FCF04DF94CCD19FFBBB6AF49704B14805FE405AB241C778A986CBA9
                                                                  APIs
                                                                  • __EH_prolog3_GS.LIBCMT ref: 004176EA
                                                                    • Part of subcall function 0040CC96: __EH_prolog3.LIBCMT ref: 0040CC9D
                                                                    • Part of subcall function 0040403B: _memmove.LIBCMT ref: 0040405B
                                                                    • Part of subcall function 00417C27: __EH_prolog3.LIBCMT ref: 00417C2E
                                                                    • Part of subcall function 00403C90: __EH_prolog3.LIBCMT ref: 00403C97
                                                                  Strings
                                                                  • {"event" : "%s","data" : "%s","sig" : "%s"}, xrefs: 00417827
                                                                  • 0Rg, xrefs: 0041771A
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3$H_prolog3__memmove
                                                                  • String ID: 0Rg${"event" : "%s","data" : "%s","sig" : "%s"}
                                                                  • API String ID: 2656386499-3338501967
                                                                  • Opcode ID: d3924819417c2322680ee298debf6e84a43b7705bb6dde07e2fec652c55780b4
                                                                  • Instruction ID: 094cf1ca1e528da2df96152cc5edfa81d088ece3f7dd7b99d285d6d9b9260e12
                                                                  • Opcode Fuzzy Hash: d3924819417c2322680ee298debf6e84a43b7705bb6dde07e2fec652c55780b4
                                                                  • Instruction Fuzzy Hash: 1951F6319001149BDB14EB65CC56FEEB7B49F95309F2080AEE405B71C2DB786F49CBA9
                                                                  APIs
                                                                  • __EH_prolog3_catch.LIBCMT ref: 004091FE
                                                                  • Concurrency::details::_Concurrent_queue_base_v4::_Internal_throw_exception.LIBCPMT ref: 004092A1
                                                                    • Part of subcall function 00438F67: std::exception::exception.LIBCMT ref: 00438F7A
                                                                    • Part of subcall function 00438F67: __CxxThrowException@8.LIBCMT ref: 00438F8F
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: Concurrency::details::_Concurrent_queue_base_v4::_Exception@8H_prolog3_catchInternal_throw_exceptionThrowstd::exception::exception
                                                                  • String ID: vector<T> too long
                                                                  • API String ID: 2196761064-3788999226
                                                                  • Opcode ID: 50f161bb024fd402a996a34298e67b17f92c3a76f47c4b922eb2a7c16730a005
                                                                  • Instruction ID: d32636fd632dd939f6c43186c43b6d3e0230567c02531e69011925aeb2a68dea
                                                                  • Opcode Fuzzy Hash: 50f161bb024fd402a996a34298e67b17f92c3a76f47c4b922eb2a7c16730a005
                                                                  • Instruction Fuzzy Hash: 2D5186B1A002069FCF14DF69C98196FB7E6BF88300B24492EF459E7381DA38ED118F58
                                                                  APIs
                                                                  • __EH_prolog3_catch.LIBCMT ref: 00416866
                                                                  • Concurrency::details::_Concurrent_queue_base_v4::_Internal_throw_exception.LIBCPMT ref: 00416909
                                                                    • Part of subcall function 00438F67: std::exception::exception.LIBCMT ref: 00438F7A
                                                                    • Part of subcall function 00438F67: __CxxThrowException@8.LIBCMT ref: 00438F8F
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: Concurrency::details::_Concurrent_queue_base_v4::_Exception@8H_prolog3_catchInternal_throw_exceptionThrowstd::exception::exception
                                                                  • String ID: vector<T> too long
                                                                  • API String ID: 2196761064-3788999226
                                                                  • Opcode ID: ad012233b0d62cc780076187e19e8683dec9f6ecc03d351a04a50b95379f2c1e
                                                                  • Instruction ID: 966c2bce5b770d1417b1b740f316cf37358aca0302ae19f5cf79a87638a628d1
                                                                  • Opcode Fuzzy Hash: ad012233b0d62cc780076187e19e8683dec9f6ecc03d351a04a50b95379f2c1e
                                                                  • Instruction Fuzzy Hash: 715184B1A002069FCB14DFA9C9819AFB7F6FF98304B25852EF41697740E738E950CB58
                                                                  APIs
                                                                  • __EH_prolog3_GS.LIBCMT ref: 0040B264
                                                                    • Part of subcall function 0040403B: _memmove.LIBCMT ref: 0040405B
                                                                    • Part of subcall function 0040AF75: RegOpenKeyA.ADVAPI32(?,?,?), ref: 0040AFC7
                                                                  Strings
                                                                  • SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall, xrefs: 0040B2B5
                                                                  • SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall, xrefs: 0040B2E5
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3_Open_memmove
                                                                  • String ID: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall$SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall
                                                                  • API String ID: 85986989-1750963809
                                                                  • Opcode ID: a68f33e86a2a0bc9c310702993d01b30ae31d5b04ba8614e826e85d312bfba87
                                                                  • Instruction ID: 805a0fbb681dcf5349d56f255c34f8674dde5e42f1a4e95d4e17d34e83914e70
                                                                  • Opcode Fuzzy Hash: a68f33e86a2a0bc9c310702993d01b30ae31d5b04ba8614e826e85d312bfba87
                                                                  • Instruction Fuzzy Hash: 2A513E71E002489FDB05EFE9C891ADDBBB5EF54304F60802EE501B7285DB786A45CB98
                                                                  APIs
                                                                  • __EH_prolog3.LIBCMT ref: 00410264
                                                                  • ShowWindow.USER32(?,00000000,000000BC,004104DB), ref: 004102C8
                                                                    • Part of subcall function 004085B7: __EH_prolog3.LIBCMT ref: 004085BE
                                                                    • Part of subcall function 0040792F: __EH_prolog3_catch.LIBCMT ref: 00407936
                                                                    • Part of subcall function 0040792F: char_traits.LIBCPMT ref: 0040794D
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3$H_prolog3_catchShowWindowchar_traits
                                                                  • String ID: Bad window index
                                                                  • API String ID: 2526409513-1287430197
                                                                  • Opcode ID: 07b5ee588237bf904d2136cf72bd35c0108d251ca0cf413e34e8ce784df8561d
                                                                  • Instruction ID: 7d011e043c78b9c06423b48061126039c91e59c1662077e147c3f8eff1043837
                                                                  • Opcode Fuzzy Hash: 07b5ee588237bf904d2136cf72bd35c0108d251ca0cf413e34e8ce784df8561d
                                                                  • Instruction Fuzzy Hash: BF41B170501209EFDB18DFA4DD85EEEB7B4EB08341F00022EA415E72A1EF74AA85CB58
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: _memmove
                                                                  • String ID: vector<T> too long
                                                                  • API String ID: 4104443479-3788999226
                                                                  • Opcode ID: dfe9b2357dd71786d2b4e3184f956ad495caa8656b71fd7d1a03d122a40787a4
                                                                  • Instruction ID: 2ceebf3dc30350cb5fdce0ba3b3cf4fab00ec49c91918505cd37ab47ab174493
                                                                  • Opcode Fuzzy Hash: dfe9b2357dd71786d2b4e3184f956ad495caa8656b71fd7d1a03d122a40787a4
                                                                  • Instruction Fuzzy Hash: F231A7B2A00116BFCB04DFA9DD8599ABB69FF08344B10862EF508D7701DB35E960CBD8
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: _memmove
                                                                  • String ID: invalid string position$string too long
                                                                  • API String ID: 4104443479-4289949731
                                                                  • Opcode ID: e37e43fd939d48b1885aead5057c881767ec1a3ae7c76a65fa9594d6057ef017
                                                                  • Instruction ID: 0bcd57328078da1b194361534639658119dd40e7fbe2774f0f3651dda5f50c36
                                                                  • Opcode Fuzzy Hash: e37e43fd939d48b1885aead5057c881767ec1a3ae7c76a65fa9594d6057ef017
                                                                  • Instruction Fuzzy Hash: DC110A71300300ABCB309E1DD980E97BBB9EB85755B20062FF4568B381C778DA858799
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: _memmove
                                                                  • String ID: invalid string position$string too long
                                                                  • API String ID: 4104443479-4289949731
                                                                  • Opcode ID: 8ea752484cdd7eb11063283ea1d477fc95695ea833f676be24a405ab69786a32
                                                                  • Instruction ID: a97adef301f66b1f39f9cc2a7ea8021cef7e24b056427baa2dfe479ba610f6ea
                                                                  • Opcode Fuzzy Hash: 8ea752484cdd7eb11063283ea1d477fc95695ea833f676be24a405ab69786a32
                                                                  • Instruction Fuzzy Hash: CE11B4313003049FDB249E6DDA80A5ABBA9EF41714B15093EF895D73C1CB75E848C799
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3_
                                                                  • String ID: 0Rg$a8b13a8ef5c233e82e7c47bb5977f38a
                                                                  • API String ID: 2427045233-2354034299
                                                                  • Opcode ID: 08ac53c39c4c0738de248b6c5749d7bd360076cde0304ca3f4f4d950315a64d1
                                                                  • Instruction ID: 1634d216166dc5bfbc208c8ebbed16df643e4e0600036a04649637733a775ed9
                                                                  • Opcode Fuzzy Hash: 08ac53c39c4c0738de248b6c5749d7bd360076cde0304ca3f4f4d950315a64d1
                                                                  • Instruction Fuzzy Hash: FD217F70A06300AFDB05DF68EC95BDA36B1AB28306F14403EE405B72A3DF795985CB19
                                                                  APIs
                                                                  • __EH_prolog3_GS.LIBCMT ref: 0040AABD
                                                                    • Part of subcall function 0040BBF6: __EH_prolog3.LIBCMT ref: 0040BBFD
                                                                    • Part of subcall function 0040403B: _memmove.LIBCMT ref: 0040405B
                                                                    • Part of subcall function 0040CF12: __EH_prolog3_catch.LIBCMT ref: 0040CF19
                                                                  • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 0040AB66
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3H_prolog3_H_prolog3_catchIos_base_dtor_memmovestd::ios_base::_
                                                                  • String ID: XjD
                                                                  • API String ID: 3074314683-1934467262
                                                                  • Opcode ID: 9a5d34f583db22e663bf59615d247061f0f5ea4d0a61db15a78f32e60f44db78
                                                                  • Instruction ID: 79d5122f8eedc78ac3cd60a7f7d468408fd99b56dfde330293e89be4bf19b51f
                                                                  • Opcode Fuzzy Hash: 9a5d34f583db22e663bf59615d247061f0f5ea4d0a61db15a78f32e60f44db78
                                                                  • Instruction Fuzzy Hash: 8C2174B1C042489BCB14DF99C480ADEFFB8AF48314F14816FE50573291DB785984CF69
                                                                  APIs
                                                                  • __EH_prolog3.LIBCMT ref: 0040685E
                                                                  • PathAppendW.SHLWAPI(00000000,?,0000000C,004069FA,?,itorrent-application.exe,0000003C,0040756C), ref: 004068C1
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: AppendH_prolog3Path
                                                                  • String ID: x]D
                                                                  • API String ID: 836219880-3674687082
                                                                  • Opcode ID: a1dd4a4d40d3b192a00968e1b8e0469992f9541c9062868e331d3a146d866326
                                                                  • Instruction ID: 3d71d78a3c93ff7f99db55a5496d25abaf90584dbcf779209f6e2ddbc7973630
                                                                  • Opcode Fuzzy Hash: a1dd4a4d40d3b192a00968e1b8e0469992f9541c9062868e331d3a146d866326
                                                                  • Instruction Fuzzy Hash: F611E672B012119BEF04EF65C84676F7BB5BF48355F14402AE905BB381CB78DA148BD9
                                                                  APIs
                                                                  • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 00423E28
                                                                  • ___raise_securityfailure.LIBCMT ref: 00423F0F
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: FeaturePresentProcessor___raise_securityfailure
                                                                  • String ID: AE
                                                                  • API String ID: 3761405300-199581639
                                                                  • Opcode ID: 68550388874296f281947afdcc5ac1e694873c2c59e698be7a14ef7cb0000940
                                                                  • Instruction ID: 5a92eb1bd9c43e1a17d09ca0765fab1e8f4d2f3270d48c312b9f701cd5a03b78
                                                                  • Opcode Fuzzy Hash: 68550388874296f281947afdcc5ac1e694873c2c59e698be7a14ef7cb0000940
                                                                  • Instruction Fuzzy Hash: D42116B8500321AAD700CF55F945B557BB4BB9838AF5041BAF9088F3B2E3B49AD1CB4D
                                                                  APIs
                                                                  • __EH_prolog3.LIBCMT ref: 00408D53
                                                                  • std::ios_base::_Init.LIBCPMT ref: 00408D89
                                                                    • Part of subcall function 00409BBA: std::locale::_Init.LIBCPMT ref: 00409BFE
                                                                    • Part of subcall function 00408F50: __EH_prolog3.LIBCMT ref: 00408F57
                                                                    • Part of subcall function 00407EE4: __CxxThrowException@8.LIBCMT ref: 00407EDE
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3Init$Exception@8Throwstd::ios_base::_std::locale::_
                                                                  • String ID: (jD
                                                                  • API String ID: 3098306399-666683630
                                                                  • Opcode ID: 5957b3bb5992a43b6d482d713fd5ff5e45d0b073b18218991bc1276621fb7667
                                                                  • Instruction ID: 92e7e0dcc73fe81dc545668da8b4023718a84c8f914c6f031257bb904a158ecc
                                                                  • Opcode Fuzzy Hash: 5957b3bb5992a43b6d482d713fd5ff5e45d0b073b18218991bc1276621fb7667
                                                                  • Instruction Fuzzy Hash: 5A21F278600A058FC720DF29C18491AFBE1FF49318755C86EE58AAB742C775F901CF84
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3_
                                                                  • String ID: 8Qi$XQi
                                                                  • API String ID: 2427045233-2401306797
                                                                  • Opcode ID: b4082af5aba9fe6f76ef53e0916f0e440bd14519d210cdeef02934480600a70c
                                                                  • Instruction ID: 6314f63fd75c3e340bbaa2f116aed151d6a6dac4d3027abf62476dc2390f0e04
                                                                  • Opcode Fuzzy Hash: b4082af5aba9fe6f76ef53e0916f0e440bd14519d210cdeef02934480600a70c
                                                                  • Instruction Fuzzy Hash: B4114231D002099FDB14EF95C992AEEBB74AF18715F54102EE60177282DBB56DC0CAA9
                                                                  APIs
                                                                    • Part of subcall function 00403E1D: char_traits.LIBCPMT ref: 00403E36
                                                                  • char_traits.LIBCPMT ref: 00406DC6
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: char_traits
                                                                  • String ID: http://tfile.me/forum/download.php?id=706491&ak=11xxxxxxxx$magnet:
                                                                  • API String ID: 1158913984-3854302047
                                                                  • Opcode ID: d836288970b80e51ab2a17acc0723cc9b047d2d03eb224bc1099ba0fe82b8181
                                                                  • Instruction ID: 572149a27aca25cfca9c870ac1502b70b8008e2bc83f23603b3816d4b6a37b80
                                                                  • Opcode Fuzzy Hash: d836288970b80e51ab2a17acc0723cc9b047d2d03eb224bc1099ba0fe82b8181
                                                                  • Instruction Fuzzy Hash: 6EF04971B4020867D600EB669C52BBE7359DF8071AF50023FB812672C1EE7C6D04825D
                                                                  APIs
                                                                  Strings
                                                                  • http://cdn.itorrent.bz/itorrent-application/itorrent.zip, xrefs: 00406B7F
                                                                  • aHR0cDovL2Nkbi5pdG9ycmVudC5iei9pdG9ycmVudC1hcHBsaWNhdGlvbi9pdG9ycmVudC56aXA=, xrefs: 00406BAE
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3_
                                                                  • String ID: aHR0cDovL2Nkbi5pdG9ycmVudC5iei9pdG9ycmVudC1hcHBsaWNhdGlvbi9pdG9ycmVudC56aXA=$http://cdn.itorrent.bz/itorrent-application/itorrent.zip
                                                                  • API String ID: 2427045233-1856409452
                                                                  • Opcode ID: 4cecf25357ddcf4c5376e12d94b02e5308af13a66a30fd59fae689bfdf013837
                                                                  • Instruction ID: 564d93e8e4282d32b1a61a4e5103a280cd599198a6e55330564bda99e6c9b3e4
                                                                  • Opcode Fuzzy Hash: 4cecf25357ddcf4c5376e12d94b02e5308af13a66a30fd59fae689bfdf013837
                                                                  • Instruction Fuzzy Hash: 93016271D001089ADF15EB96C8859EDBBB4EF88714F44502FE501771C1DB7C5A45CB69
                                                                  APIs
                                                                  • AssocQueryStringW.SHLWAPI(00000000,00000002,http,open,?,?), ref: 0040693C
                                                                    • Part of subcall function 00403E1D: char_traits.LIBCPMT ref: 00403E36
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: AssocQueryStringchar_traits
                                                                  • String ID: http$open
                                                                  • API String ID: 424878394-2346222845
                                                                  • Opcode ID: 3c1484ef58ff2317e9d48c29b76d1492501d90181ac593e560173d4930a7e10d
                                                                  • Instruction ID: e8ee0ac40116fb7bacb662222dbbf9b6cd8e06dc5d7bb2d71e672399e87dbc5c
                                                                  • Opcode Fuzzy Hash: 3c1484ef58ff2317e9d48c29b76d1492501d90181ac593e560173d4930a7e10d
                                                                  • Instruction Fuzzy Hash: 1EF05B70A4121C57DB10DF51DC49BDEB778EB04715F4001EAA804A7281DAB85F448BD5
                                                                  APIs
                                                                  • @_EH4_CallFilterFunc@8.LIBCMT ref: 00402765
                                                                  • WinHttpQueryDataAvailable.WINHTTP(?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,0044A5F0), ref: 0040278F
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: AvailableCallDataFilterFunc@8HttpQuery
                                                                  • String ID: Got invalid header$WINTHTTP-API-QUERY-HEADERS
                                                                  • API String ID: 3800719210-3722912770
                                                                  • Opcode ID: d484d4a53486ce6aabb8e12d59caee894002c5a507791a65f7965e7276817b21
                                                                  • Instruction ID: 50c241de748868880c71ccb603d52a102d06b14d859d0a930707b90afe821e5c
                                                                  • Opcode Fuzzy Hash: d484d4a53486ce6aabb8e12d59caee894002c5a507791a65f7965e7276817b21
                                                                  • Instruction Fuzzy Hash: 29E09234A40308ABEF10EA90AD46BAE73309B15719F20002BE911331C3D7BC194587AA
                                                                  APIs
                                                                  • __lock.LIBCMT ref: 0042A750
                                                                    • Part of subcall function 0042E618: __mtinitlocknum.LIBCMT ref: 0042E62A
                                                                    • Part of subcall function 0042E618: EnterCriticalSection.KERNEL32(?,?,00428B5C,0000000D), ref: 0042E643
                                                                  • __updatetlocinfoEx_nolock.LIBCMT ref: 0042A760
                                                                    • Part of subcall function 00429C96: ___addlocaleref.LIBCMT ref: 00429CB2
                                                                    • Part of subcall function 00429C96: ___removelocaleref.LIBCMT ref: 00429CBD
                                                                    • Part of subcall function 00429C96: ___freetlocinfo.LIBCMT ref: 00429CD1
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: CriticalEnterEx_nolockSection___addlocaleref___freetlocinfo___removelocaleref__lock__mtinitlocknum__updatetlocinfo
                                                                  • String ID: @f
                                                                  • API String ID: 547918592-729109391
                                                                  • Opcode ID: 40d7bdbf81b0d63fc45a8e07d0f0f7915ef6b2b97eab5bfc524eb746ccc9c5c6
                                                                  • Instruction ID: 3bd358f887d281f96dd0d5e7b1265939ae43fa3d4a10319c74f96995d0b1f0ea
                                                                  • Opcode Fuzzy Hash: 40d7bdbf81b0d63fc45a8e07d0f0f7915ef6b2b97eab5bfc524eb746ccc9c5c6
                                                                  • Instruction Fuzzy Hash: 09E04FB5682320A6F630ABA27D03769A3A05F4072BFE1029FA804562C7C97C5540895E
                                                                  APIs
                                                                  • __CxxThrowException@8.LIBCMT ref: 0043BBCD
                                                                    • Part of subcall function 004274A2: RaiseException.KERNEL32(?,?,00438F94,?,?,?,?,?,?,?,00438F94,?,0044D650,?), ref: 004274F7
                                                                  • std::bad_exception::bad_exception.LIBCMT ref: 0043BBF4
                                                                    • Part of subcall function 004243AE: std::bad_exception::bad_exception.LIBCMT ref: 004243B7
                                                                  Strings
                                                                  • Access violation - no RTTI data!, xrefs: 0043BBEC
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: std::bad_exception::bad_exception$ExceptionException@8RaiseThrow
                                                                  • String ID: Access violation - no RTTI data!
                                                                  • API String ID: 1432139112-2158758863
                                                                  • Opcode ID: 7401f6c9246bf44f227253701132d579bfebd7760c9006194285d0a122633539
                                                                  • Instruction ID: ebc2a7dfaa9e5dae0d283e81d6208440f3377fd53567630487c90332f65ff500
                                                                  • Opcode Fuzzy Hash: 7401f6c9246bf44f227253701132d579bfebd7760c9006194285d0a122633539
                                                                  • Instruction Fuzzy Hash: B9E08C71A002188FDB00DBA1C882BAE77B4AB08301F21005AA801B3184C768A800DF29
                                                                  APIs
                                                                  • std::exception::exception.LIBCMT ref: 00438F7A
                                                                    • Part of subcall function 00424437: std::exception::_Copy_str.LIBCMT ref: 00424450
                                                                  • __CxxThrowException@8.LIBCMT ref: 00438F8F
                                                                    • Part of subcall function 004274A2: RaiseException.KERNEL32(?,?,00438F94,?,?,?,?,?,?,?,00438F94,?,0044D650,?), ref: 004274F7
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: Copy_strExceptionException@8RaiseThrowstd::exception::_std::exception::exception
                                                                  • String ID: PWD
                                                                  • API String ID: 757275642-397851064
                                                                  • Opcode ID: 5aec8dd2a9fe6098aca4351691c2e4cd60a3b5e2806c315c46ca792c9f8e6cac
                                                                  • Instruction ID: b3266332cc8dfa1f2570e984fd04a3f7e32bd381127a28a49a27aeb32845e19b
                                                                  • Opcode Fuzzy Hash: 5aec8dd2a9fe6098aca4351691c2e4cd60a3b5e2806c315c46ca792c9f8e6cac
                                                                  • Instruction Fuzzy Hash: BAD06774D0020CBB8F00EFA5D495DCDBBBCAA54744F90C467AD54A7241E678E2488B98
                                                                  APIs
                                                                  • std::exception::exception.LIBCMT ref: 00438FA8
                                                                    • Part of subcall function 00424437: std::exception::_Copy_str.LIBCMT ref: 00424450
                                                                  • __CxxThrowException@8.LIBCMT ref: 00438FBD
                                                                    • Part of subcall function 004274A2: RaiseException.KERNEL32(?,?,00438F94,?,?,?,?,?,?,?,00438F94,?,0044D650,?), ref: 004274F7
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3001581688.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.3001568149.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001610659.000000000043F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000450000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001627761.0000000000458000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3001656209.000000000045A000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                  Similarity
                                                                  • API ID: Copy_strExceptionException@8RaiseThrowstd::exception::_std::exception::exception
                                                                  • String ID: \WD
                                                                  • API String ID: 757275642-514605276
                                                                  • Opcode ID: e99b11950b10ce80645d43e17acb69be3086742810c612692ee50847bb129bcb
                                                                  • Instruction ID: d17cde7f4ea048052eb8d27722898047f82d1395a4ab4bc8649c47708ac5ddfd
                                                                  • Opcode Fuzzy Hash: e99b11950b10ce80645d43e17acb69be3086742810c612692ee50847bb129bcb
                                                                  • Instruction Fuzzy Hash: 65D067B4D0060CBB8F00FFA5D495DCEBFBCAA44744F51C467BD5497641E678A2488B98