Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
A2028041200SD..exe

Overview

General Information

Sample name:A2028041200SD..exe
Analysis ID:1562199
MD5:c986b78a1a48072903516a2d652d0159
SHA1:182d579839cb6bfdc9201785df3c04bde927a720
SHA256:1f34277db210da7c0c6523afe19d14c436d995fe37165665f11cb2c23204b2e6
Tags:exeFormbookuser-cocaman
Infos:

Detection

FormBook
Score:80
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected FormBook
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Switches to a custom stack to bypass stack traces
Writes to foreign memory regions
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found evaded block containing many API calls
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
Sample file is different than original file name gathered from version info
Sigma detected: Uncommon Svchost Parent Process
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • A2028041200SD..exe (PID: 4944 cmdline: "C:\Users\user\Desktop\A2028041200SD..exe" MD5: C986B78A1A48072903516A2D652D0159)
    • svchost.exe (PID: 6912 cmdline: "C:\Users\user\Desktop\A2028041200SD..exe" MD5: 1ED18311E3DA35942DB37D15FA40CC5B)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000003.00000002.1372712193.0000000002F80000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
    00000003.00000002.1372556382.0000000000400000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
      SourceRuleDescriptionAuthorStrings
      3.2.svchost.exe.400000.0.raw.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
        3.2.svchost.exe.400000.0.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security

          System Summary

          barindex
          Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Users\user\Desktop\A2028041200SD..exe", CommandLine: "C:\Users\user\Desktop\A2028041200SD..exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\A2028041200SD..exe", ParentImage: C:\Users\user\Desktop\A2028041200SD..exe, ParentProcessId: 4944, ParentProcessName: A2028041200SD..exe, ProcessCommandLine: "C:\Users\user\Desktop\A2028041200SD..exe", ProcessId: 6912, ProcessName: svchost.exe
          Source: Process startedAuthor: vburov: Data: Command: "C:\Users\user\Desktop\A2028041200SD..exe", CommandLine: "C:\Users\user\Desktop\A2028041200SD..exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\A2028041200SD..exe", ParentImage: C:\Users\user\Desktop\A2028041200SD..exe, ParentProcessId: 4944, ParentProcessName: A2028041200SD..exe, ProcessCommandLine: "C:\Users\user\Desktop\A2028041200SD..exe", ProcessId: 6912, ProcessName: svchost.exe
          No Suricata rule has matched

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: A2028041200SD..exeReversingLabs: Detection: 42%
          Source: Yara matchFile source: 3.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000003.00000002.1372712193.0000000002F80000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000002.1372556382.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
          Source: A2028041200SD..exeJoe Sandbox ML: detected
          Source: A2028041200SD..exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
          Source: Binary string: wntdll.pdbUGP source: A2028041200SD..exe, 00000001.00000003.1329494085.0000000004130000.00000004.00001000.00020000.00000000.sdmp, A2028041200SD..exe, 00000001.00000003.1327635525.0000000003F90000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1372865632.0000000003B9E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1336419356.0000000003600000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1338851593.0000000003800000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1372865632.0000000003A00000.00000040.00001000.00020000.00000000.sdmp
          Source: Binary string: wntdll.pdb source: A2028041200SD..exe, 00000001.00000003.1329494085.0000000004130000.00000004.00001000.00020000.00000000.sdmp, A2028041200SD..exe, 00000001.00000003.1327635525.0000000003F90000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000003.00000002.1372865632.0000000003B9E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1336419356.0000000003600000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1338851593.0000000003800000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1372865632.0000000003A00000.00000040.00001000.00020000.00000000.sdmp
          Source: C:\Users\user\Desktop\A2028041200SD..exeCode function: 1_2_00DF6CA9 GetFileAttributesW,FindFirstFileW,FindClose,1_2_00DF6CA9
          Source: C:\Users\user\Desktop\A2028041200SD..exeCode function: 1_2_00DF60DD _wcscat,_wcscat,__wsplitpath,FindFirstFileW,DeleteFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindNextFileW,FindClose,FindClose,1_2_00DF60DD
          Source: C:\Users\user\Desktop\A2028041200SD..exeCode function: 1_2_00DF63F9 _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,1_2_00DF63F9
          Source: C:\Users\user\Desktop\A2028041200SD..exeCode function: 1_2_00DFEB60 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,1_2_00DFEB60
          Source: C:\Users\user\Desktop\A2028041200SD..exeCode function: 1_2_00DFF5FA FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,1_2_00DFF5FA
          Source: C:\Users\user\Desktop\A2028041200SD..exeCode function: 1_2_00DFF56F FindFirstFileW,FindClose,1_2_00DFF56F
          Source: C:\Users\user\Desktop\A2028041200SD..exeCode function: 1_2_00E01B2F SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,1_2_00E01B2F
          Source: C:\Users\user\Desktop\A2028041200SD..exeCode function: 1_2_00E01C8A SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,1_2_00E01C8A
          Source: C:\Users\user\Desktop\A2028041200SD..exeCode function: 1_2_00E01F94 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,1_2_00E01F94
          Source: C:\Users\user\Desktop\A2028041200SD..exeCode function: 1_2_00E04EB5 InternetReadFile,InternetQueryDataAvailable,InternetReadFile,1_2_00E04EB5
          Source: C:\Users\user\Desktop\A2028041200SD..exeCode function: 1_2_00E06B0C OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,1_2_00E06B0C
          Source: C:\Users\user\Desktop\A2028041200SD..exeCode function: 1_2_00E06D07 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,1_2_00E06D07
          Source: C:\Users\user\Desktop\A2028041200SD..exeCode function: 1_2_00E06B0C OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,1_2_00E06B0C
          Source: C:\Users\user\Desktop\A2028041200SD..exeCode function: 1_2_00DF2B37 GetKeyboardState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,1_2_00DF2B37

          E-Banking Fraud

          barindex
          Source: Yara matchFile source: 3.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000003.00000002.1372712193.0000000002F80000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000002.1372556382.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY

          System Summary

          barindex
          Source: C:\Users\user\Desktop\A2028041200SD..exeCode function: This is a third-party compiled AutoIt script.1_2_00DB3D19
          Source: A2028041200SD..exeString found in binary or memory: This is a third-party compiled AutoIt script.
          Source: A2028041200SD..exe, 00000001.00000000.1312103050.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_ce47d28f-6
          Source: A2028041200SD..exe, 00000001.00000000.1312103050.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_a6eb26cd-1
          Source: A2028041200SD..exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_2b79e95a-1
          Source: A2028041200SD..exeString found in binary or memory: CSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_eb1c7b0f-1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0042C403 NtClose,3_2_0042C403
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A72B60 NtClose,LdrInitializeThunk,3_2_03A72B60
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A72DF0 NtQuerySystemInformation,LdrInitializeThunk,3_2_03A72DF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A735C0 NtCreateMutant,LdrInitializeThunk,3_2_03A735C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A74340 NtSetContextThread,3_2_03A74340
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A74650 NtSuspendThread,3_2_03A74650
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A72BA0 NtEnumerateValueKey,3_2_03A72BA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A72B80 NtQueryInformationFile,3_2_03A72B80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A72BE0 NtQueryValueKey,3_2_03A72BE0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A72BF0 NtAllocateVirtualMemory,3_2_03A72BF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A72AB0 NtWaitForSingleObject,3_2_03A72AB0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A72AF0 NtWriteFile,3_2_03A72AF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A72AD0 NtReadFile,3_2_03A72AD0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A72FA0 NtQuerySection,3_2_03A72FA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A72FB0 NtResumeThread,3_2_03A72FB0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A72F90 NtProtectVirtualMemory,3_2_03A72F90
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A72FE0 NtCreateFile,3_2_03A72FE0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A72F30 NtCreateSection,3_2_03A72F30
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A72F60 NtCreateProcessEx,3_2_03A72F60
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A72EA0 NtAdjustPrivilegesToken,3_2_03A72EA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A72E80 NtReadVirtualMemory,3_2_03A72E80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A72EE0 NtQueueApcThread,3_2_03A72EE0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A72E30 NtWriteVirtualMemory,3_2_03A72E30
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A72DB0 NtEnumerateKey,3_2_03A72DB0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A72DD0 NtDelayExecution,3_2_03A72DD0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A72D30 NtUnmapViewOfSection,3_2_03A72D30
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A72D00 NtSetInformationFile,3_2_03A72D00
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A72D10 NtMapViewOfSection,3_2_03A72D10
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A72CA0 NtQueryInformationToken,3_2_03A72CA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A72CF0 NtOpenProcess,3_2_03A72CF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A72CC0 NtQueryVirtualMemory,3_2_03A72CC0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A72C00 NtQueryInformationProcess,3_2_03A72C00
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A72C60 NtCreateKey,3_2_03A72C60
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A72C70 NtFreeVirtualMemory,3_2_03A72C70
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A73090 NtSetValueKey,3_2_03A73090
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A73010 NtOpenDirectoryObject,3_2_03A73010
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A739B0 NtGetContextThread,3_2_03A739B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A73D10 NtOpenProcessToken,3_2_03A73D10
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A73D70 NtOpenThread,3_2_03A73D70
          Source: C:\Users\user\Desktop\A2028041200SD..exeCode function: 1_2_00DF6685: CreateFileW,DeviceIoControl,CloseHandle,1_2_00DF6685
          Source: C:\Users\user\Desktop\A2028041200SD..exeCode function: 1_2_00DEACC5 _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,1_2_00DEACC5
          Source: C:\Users\user\Desktop\A2028041200SD..exeCode function: 1_2_00DF79D3 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,1_2_00DF79D3
          Source: C:\Users\user\Desktop\A2028041200SD..exeCode function: 1_2_00DDB0431_2_00DDB043
          Source: C:\Users\user\Desktop\A2028041200SD..exeCode function: 1_2_00DC32001_2_00DC3200
          Source: C:\Users\user\Desktop\A2028041200SD..exeCode function: 1_2_00DE410F1_2_00DE410F
          Source: C:\Users\user\Desktop\A2028041200SD..exeCode function: 1_2_00DD02A41_2_00DD02A4
          Source: C:\Users\user\Desktop\A2028041200SD..exeCode function: 1_2_00DE038E1_2_00DE038E
          Source: C:\Users\user\Desktop\A2028041200SD..exeCode function: 1_2_00DBE3B01_2_00DBE3B0
          Source: C:\Users\user\Desktop\A2028041200SD..exeCode function: 1_2_00DD06D91_2_00DD06D9
          Source: C:\Users\user\Desktop\A2028041200SD..exeCode function: 1_2_00DE467F1_2_00DE467F
          Source: C:\Users\user\Desktop\A2028041200SD..exeCode function: 1_2_00E1AACE1_2_00E1AACE
          Source: C:\Users\user\Desktop\A2028041200SD..exeCode function: 1_2_00DE4BEF1_2_00DE4BEF
          Source: C:\Users\user\Desktop\A2028041200SD..exeCode function: 1_2_00DDCCC11_2_00DDCCC1
          Source: C:\Users\user\Desktop\A2028041200SD..exeCode function: 1_2_00DBAF501_2_00DBAF50
          Source: C:\Users\user\Desktop\A2028041200SD..exeCode function: 1_2_00DB6F071_2_00DB6F07
          Source: C:\Users\user\Desktop\A2028041200SD..exeCode function: 1_2_00E131BC1_2_00E131BC
          Source: C:\Users\user\Desktop\A2028041200SD..exeCode function: 1_2_00DDD1B91_2_00DDD1B9
          Source: C:\Users\user\Desktop\A2028041200SD..exeCode function: 1_2_00DCB11F1_2_00DCB11F
          Source: C:\Users\user\Desktop\A2028041200SD..exeCode function: 1_2_00DE724D1_2_00DE724D
          Source: C:\Users\user\Desktop\A2028041200SD..exeCode function: 1_2_00DD123A1_2_00DD123A
          Source: C:\Users\user\Desktop\A2028041200SD..exeCode function: 1_2_00DF13CA1_2_00DF13CA
          Source: C:\Users\user\Desktop\A2028041200SD..exeCode function: 1_2_00DB93F01_2_00DB93F0
          Source: C:\Users\user\Desktop\A2028041200SD..exeCode function: 1_2_00DCF5631_2_00DCF563
          Source: C:\Users\user\Desktop\A2028041200SD..exeCode function: 1_2_00DFB6CC1_2_00DFB6CC
          Source: C:\Users\user\Desktop\A2028041200SD..exeCode function: 1_2_00DB96C01_2_00DB96C0
          Source: C:\Users\user\Desktop\A2028041200SD..exeCode function: 1_2_00DB77B01_2_00DB77B0
          Source: C:\Users\user\Desktop\A2028041200SD..exeCode function: 1_2_00DE79C91_2_00DE79C9
          Source: C:\Users\user\Desktop\A2028041200SD..exeCode function: 1_2_00DCFA571_2_00DCFA57
          Source: C:\Users\user\Desktop\A2028041200SD..exeCode function: 1_2_00DC3B701_2_00DC3B70
          Source: C:\Users\user\Desktop\A2028041200SD..exeCode function: 1_2_00DB9B601_2_00DB9B60
          Source: C:\Users\user\Desktop\A2028041200SD..exeCode function: 1_2_00DB7D191_2_00DB7D19
          Source: C:\Users\user\Desktop\A2028041200SD..exeCode function: 1_2_00DD9ED01_2_00DD9ED0
          Source: C:\Users\user\Desktop\A2028041200SD..exeCode function: 1_2_00DCFE6F1_2_00DCFE6F
          Source: C:\Users\user\Desktop\A2028041200SD..exeCode function: 1_2_00DB7FA31_2_00DB7FA3
          Source: C:\Users\user\Desktop\A2028041200SD..exeCode function: 1_2_016783081_2_01678308
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_004012503_2_00401250
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0042EA033_2_0042EA03
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_004042CC3_2_004042CC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_004023F93_2_004023F9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_004024003_2_00402400
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0040FC2A3_2_0040FC2A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0040FC333_2_0040FC33
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_004165B03_2_004165B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_004165B33_2_004165B3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0040FE533_2_0040FE53
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0040DE333_2_0040DE33
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0040DF793_2_0040DF79
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0040DF833_2_0040DF83
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_00402FB03_2_00402FB0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A4E3F03_2_03A4E3F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03B003E63_2_03B003E6
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AFA3523_2_03AFA352
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AC02C03_2_03AC02C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AE02743_2_03AE0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AF41A23_2_03AF41A2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03B001AA3_2_03B001AA
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AF81CC3_2_03AF81CC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A301003_2_03A30100
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03ADA1183_2_03ADA118
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AC81583_2_03AC8158
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AD20003_2_03AD2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A3C7C03_2_03A3C7C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A407703_2_03A40770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A647503_2_03A64750
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A5C6E03_2_03A5C6E0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03B005913_2_03B00591
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A405353_2_03A40535
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AEE4F63_2_03AEE4F6
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AE44203_2_03AE4420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AF24463_2_03AF2446
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AF6BD73_2_03AF6BD7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AFAB403_2_03AFAB40
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A3EA803_2_03A3EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A429A03_2_03A429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03B0A9A63_2_03B0A9A6
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A569623_2_03A56962
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A268B83_2_03A268B8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A6E8F03_2_03A6E8F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A4A8403_2_03A4A840
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A428403_2_03A42840
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03ABEFA03_2_03ABEFA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A4CFE03_2_03A4CFE0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A32FC83_2_03A32FC8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A82F283_2_03A82F28
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A60F303_2_03A60F30
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AE2F303_2_03AE2F30
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AB4F403_2_03AB4F40
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A52E903_2_03A52E90
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AFCE933_2_03AFCE93
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AFEEDB3_2_03AFEEDB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AFEE263_2_03AFEE26
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A40E593_2_03A40E59
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A58DBF3_2_03A58DBF
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A3ADE03_2_03A3ADE0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A4AD003_2_03A4AD00
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03ADCD1F3_2_03ADCD1F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AE0CB53_2_03AE0CB5
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A30CF23_2_03A30CF2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A40C003_2_03A40C00
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A8739A3_2_03A8739A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AF132D3_2_03AF132D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A2D34C3_2_03A2D34C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A452A03_2_03A452A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AE12ED3_2_03AE12ED
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A5B2C03_2_03A5B2C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A4B1B03_2_03A4B1B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A7516C3_2_03A7516C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A2F1723_2_03A2F172
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03B0B16B3_2_03B0B16B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AF70E93_2_03AF70E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AFF0E03_2_03AFF0E0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AEF0CC3_2_03AEF0CC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A470C03_2_03A470C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AFF7B03_2_03AFF7B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AF16CC3_2_03AF16CC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03ADD5B03_2_03ADD5B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AF75713_2_03AF7571
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AFF43F3_2_03AFF43F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A314603_2_03A31460
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A5FB803_2_03A5FB80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AB5BF03_2_03AB5BF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A7DBF93_2_03A7DBF9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AFFB763_2_03AFFB76
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03ADDAAC3_2_03ADDAAC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A85AA03_2_03A85AA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AE1AA33_2_03AE1AA3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AEDAC63_2_03AEDAC6
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AB3A6C3_2_03AB3A6C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AFFA493_2_03AFFA49
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AF7A463_2_03AF7A46
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AD59103_2_03AD5910
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A499503_2_03A49950
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A5B9503_2_03A5B950
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A438E03_2_03A438E0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AAD8003_2_03AAD800
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AFFFB13_2_03AFFFB1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A41F923_2_03A41F92
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A03FD23_2_03A03FD2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A03FD53_2_03A03FD5
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AFFF093_2_03AFFF09
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A49EB03_2_03A49EB0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A5FDC03_2_03A5FDC0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AF7D733_2_03AF7D73
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A43D403_2_03A43D40
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AF1D5A3_2_03AF1D5A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AFFCF23_2_03AFFCF2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AB9C323_2_03AB9C32
          Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03AAEA12 appears 86 times
          Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03A2B970 appears 277 times
          Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03A87E54 appears 102 times
          Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03ABF290 appears 105 times
          Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03A75130 appears 58 times
          Source: C:\Users\user\Desktop\A2028041200SD..exeCode function: String function: 00DCEC2F appears 68 times
          Source: C:\Users\user\Desktop\A2028041200SD..exeCode function: String function: 00DDF8A0 appears 35 times
          Source: C:\Users\user\Desktop\A2028041200SD..exeCode function: String function: 00DD6AC0 appears 42 times
          Source: A2028041200SD..exe, 00000001.00000003.1328201605.000000000425D000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs A2028041200SD..exe
          Source: A2028041200SD..exe, 00000001.00000003.1333015133.00000000040B3000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs A2028041200SD..exe
          Source: A2028041200SD..exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
          Source: classification engineClassification label: mal80.troj.evad.winEXE@3/2@0/0
          Source: C:\Users\user\Desktop\A2028041200SD..exeCode function: 1_2_00DFCE7A GetLastError,FormatMessageW,1_2_00DFCE7A
          Source: C:\Users\user\Desktop\A2028041200SD..exeCode function: 1_2_00DEAB84 AdjustTokenPrivileges,CloseHandle,1_2_00DEAB84
          Source: C:\Users\user\Desktop\A2028041200SD..exeCode function: 1_2_00DEB134 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,1_2_00DEB134
          Source: C:\Users\user\Desktop\A2028041200SD..exeCode function: 1_2_00DFE1FD SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,1_2_00DFE1FD
          Source: C:\Users\user\Desktop\A2028041200SD..exeCode function: 1_2_00DF6532 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,__wsplitpath,_wcscat,CloseHandle,1_2_00DF6532
          Source: C:\Users\user\Desktop\A2028041200SD..exeCode function: 1_2_00E0C18C CoInitializeSecurity,_memset,_memset,CoCreateInstanceEx,CoTaskMemFree,CoSetProxyBlanket,1_2_00E0C18C
          Source: C:\Users\user\Desktop\A2028041200SD..exeCode function: 1_2_00DB406B CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,1_2_00DB406B
          Source: C:\Users\user\Desktop\A2028041200SD..exeFile created: C:\Users\user~1\AppData\Local\Temp\aut164B.tmpJump to behavior
          Source: A2028041200SD..exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\A2028041200SD..exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: A2028041200SD..exeReversingLabs: Detection: 42%
          Source: unknownProcess created: C:\Users\user\Desktop\A2028041200SD..exe "C:\Users\user\Desktop\A2028041200SD..exe"
          Source: C:\Users\user\Desktop\A2028041200SD..exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\A2028041200SD..exe"
          Source: C:\Users\user\Desktop\A2028041200SD..exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\A2028041200SD..exe"Jump to behavior
          Source: C:\Users\user\Desktop\A2028041200SD..exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\Desktop\A2028041200SD..exeSection loaded: wsock32.dllJump to behavior
          Source: C:\Users\user\Desktop\A2028041200SD..exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\Desktop\A2028041200SD..exeSection loaded: winmm.dllJump to behavior
          Source: C:\Users\user\Desktop\A2028041200SD..exeSection loaded: mpr.dllJump to behavior
          Source: C:\Users\user\Desktop\A2028041200SD..exeSection loaded: wininet.dllJump to behavior
          Source: C:\Users\user\Desktop\A2028041200SD..exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\A2028041200SD..exeSection loaded: userenv.dllJump to behavior
          Source: C:\Users\user\Desktop\A2028041200SD..exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\Desktop\A2028041200SD..exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\A2028041200SD..exeSection loaded: ntmarta.dllJump to behavior
          Source: A2028041200SD..exeStatic file information: File size 1207808 > 1048576
          Source: A2028041200SD..exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
          Source: A2028041200SD..exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
          Source: A2028041200SD..exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
          Source: A2028041200SD..exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
          Source: A2028041200SD..exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
          Source: A2028041200SD..exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
          Source: A2028041200SD..exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
          Source: Binary string: wntdll.pdbUGP source: A2028041200SD..exe, 00000001.00000003.1329494085.0000000004130000.00000004.00001000.00020000.00000000.sdmp, A2028041200SD..exe, 00000001.00000003.1327635525.0000000003F90000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1372865632.0000000003B9E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1336419356.0000000003600000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1338851593.0000000003800000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1372865632.0000000003A00000.00000040.00001000.00020000.00000000.sdmp
          Source: Binary string: wntdll.pdb source: A2028041200SD..exe, 00000001.00000003.1329494085.0000000004130000.00000004.00001000.00020000.00000000.sdmp, A2028041200SD..exe, 00000001.00000003.1327635525.0000000003F90000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000003.00000002.1372865632.0000000003B9E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1336419356.0000000003600000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1338851593.0000000003800000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1372865632.0000000003A00000.00000040.00001000.00020000.00000000.sdmp
          Source: A2028041200SD..exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
          Source: A2028041200SD..exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
          Source: A2028041200SD..exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
          Source: A2028041200SD..exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
          Source: A2028041200SD..exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
          Source: C:\Users\user\Desktop\A2028041200SD..exeCode function: 1_2_00DCE01E LoadLibraryA,GetProcAddress,1_2_00DCE01E
          Source: C:\Users\user\Desktop\A2028041200SD..exeCode function: 1_2_00DD6B05 push ecx; ret 1_2_00DD6B18
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0041A972 push edx; retf 3_2_0041A973
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_004051D0 push es; iretd 3_2_004051D2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0040A9DB push edx; retf 3_2_0040A9DC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_00403220 push eax; ret 3_2_00403222
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_00404A20 push esi; retf 3_2_00404A2E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_00404A23 push esi; retf 3_2_00404A2E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0040D376 push ds; ret 3_2_0040D388
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_00415BF3 push esi; retf 3_2_00415BFE
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_00423413 pushfd ; ret 3_2_00423437
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_00406415 push edx; retf 3_2_0040641C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_00414675 push ebp; retf 3_2_00414688
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0040161B push E588A11Fh; iretd 3_2_00401623
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_004087CB push es; ret 3_2_004087CD
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A0225F pushad ; ret 3_2_03A027F9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A027FA pushad ; ret 3_2_03A027F9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A309AD push ecx; mov dword ptr [esp], ecx3_2_03A309B6
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A0283D push eax; iretd 3_2_03A02858
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A01366 push eax; iretd 3_2_03A01369
          Source: C:\Users\user\Desktop\A2028041200SD..exeCode function: 1_2_00E18111 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,1_2_00E18111
          Source: C:\Users\user\Desktop\A2028041200SD..exeCode function: 1_2_00DCEB42 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,1_2_00DCEB42
          Source: C:\Users\user\Desktop\A2028041200SD..exeCode function: 1_2_00DD123A __initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,1_2_00DD123A
          Source: C:\Users\user\Desktop\A2028041200SD..exeProcess information set: NOOPENFILEERRORBOXJump to behavior

          Malware Analysis System Evasion

          barindex
          Source: C:\Users\user\Desktop\A2028041200SD..exeAPI/Special instruction interceptor: Address: 1677F2C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A7096E rdtsc 3_2_03A7096E
          Source: C:\Users\user\Desktop\A2028041200SD..exeEvaded block: after key decisiongraph_1-93963
          Source: C:\Users\user\Desktop\A2028041200SD..exeEvaded block: after key decisiongraph_1-95006
          Source: C:\Users\user\Desktop\A2028041200SD..exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_1-94504
          Source: C:\Users\user\Desktop\A2028041200SD..exeAPI coverage: 4.4 %
          Source: C:\Windows\SysWOW64\svchost.exeAPI coverage: 0.6 %
          Source: C:\Windows\SysWOW64\svchost.exe TID: 6444Thread sleep time: -30000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\A2028041200SD..exeCode function: 1_2_00DF6CA9 GetFileAttributesW,FindFirstFileW,FindClose,1_2_00DF6CA9
          Source: C:\Users\user\Desktop\A2028041200SD..exeCode function: 1_2_00DF60DD _wcscat,_wcscat,__wsplitpath,FindFirstFileW,DeleteFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindNextFileW,FindClose,FindClose,1_2_00DF60DD
          Source: C:\Users\user\Desktop\A2028041200SD..exeCode function: 1_2_00DF63F9 _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,1_2_00DF63F9
          Source: C:\Users\user\Desktop\A2028041200SD..exeCode function: 1_2_00DFEB60 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,1_2_00DFEB60
          Source: C:\Users\user\Desktop\A2028041200SD..exeCode function: 1_2_00DFF5FA FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,1_2_00DFF5FA
          Source: C:\Users\user\Desktop\A2028041200SD..exeCode function: 1_2_00DFF56F FindFirstFileW,FindClose,1_2_00DFF56F
          Source: C:\Users\user\Desktop\A2028041200SD..exeCode function: 1_2_00E01B2F SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,1_2_00E01B2F
          Source: C:\Users\user\Desktop\A2028041200SD..exeCode function: 1_2_00E01C8A SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,1_2_00E01C8A
          Source: C:\Users\user\Desktop\A2028041200SD..exeCode function: 1_2_00E01F94 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,1_2_00E01F94
          Source: C:\Users\user\Desktop\A2028041200SD..exeCode function: 1_2_00DCDDC0 GetVersionExW,GetCurrentProcess,FreeLibrary,GetNativeSystemInfo,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,1_2_00DCDDC0
          Source: C:\Users\user\Desktop\A2028041200SD..exeAPI call chain: ExitProcess graph end nodegraph_1-93727
          Source: C:\Windows\SysWOW64\svchost.exeProcess information queried: ProcessInformationJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeProcess queried: DebugPortJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A7096E rdtsc 3_2_03A7096E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_00417543 LdrLoadDll,3_2_00417543
          Source: C:\Users\user\Desktop\A2028041200SD..exeCode function: 1_2_00E06AAF BlockInput,1_2_00E06AAF
          Source: C:\Users\user\Desktop\A2028041200SD..exeCode function: 1_2_00DB3D19 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,1_2_00DB3D19
          Source: C:\Users\user\Desktop\A2028041200SD..exeCode function: 1_2_00DE3920 LoadLibraryExW,GetLastError,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,IsDebuggerPresent,OutputDebugStringW,1_2_00DE3920
          Source: C:\Users\user\Desktop\A2028041200SD..exeCode function: 1_2_00DCE01E LoadLibraryA,GetProcAddress,1_2_00DCE01E
          Source: C:\Users\user\Desktop\A2028041200SD..exeCode function: 1_2_016781F8 mov eax, dword ptr fs:[00000030h]1_2_016781F8
          Source: C:\Users\user\Desktop\A2028041200SD..exeCode function: 1_2_01678198 mov eax, dword ptr fs:[00000030h]1_2_01678198
          Source: C:\Users\user\Desktop\A2028041200SD..exeCode function: 1_2_01676B58 mov eax, dword ptr fs:[00000030h]1_2_01676B58
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A2E388 mov eax, dword ptr fs:[00000030h]3_2_03A2E388
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A2E388 mov eax, dword ptr fs:[00000030h]3_2_03A2E388
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A2E388 mov eax, dword ptr fs:[00000030h]3_2_03A2E388
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A5438F mov eax, dword ptr fs:[00000030h]3_2_03A5438F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A5438F mov eax, dword ptr fs:[00000030h]3_2_03A5438F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A28397 mov eax, dword ptr fs:[00000030h]3_2_03A28397
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A28397 mov eax, dword ptr fs:[00000030h]3_2_03A28397
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A28397 mov eax, dword ptr fs:[00000030h]3_2_03A28397
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A403E9 mov eax, dword ptr fs:[00000030h]3_2_03A403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A403E9 mov eax, dword ptr fs:[00000030h]3_2_03A403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A403E9 mov eax, dword ptr fs:[00000030h]3_2_03A403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A403E9 mov eax, dword ptr fs:[00000030h]3_2_03A403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A403E9 mov eax, dword ptr fs:[00000030h]3_2_03A403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A403E9 mov eax, dword ptr fs:[00000030h]3_2_03A403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A403E9 mov eax, dword ptr fs:[00000030h]3_2_03A403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A403E9 mov eax, dword ptr fs:[00000030h]3_2_03A403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A4E3F0 mov eax, dword ptr fs:[00000030h]3_2_03A4E3F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A4E3F0 mov eax, dword ptr fs:[00000030h]3_2_03A4E3F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A4E3F0 mov eax, dword ptr fs:[00000030h]3_2_03A4E3F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A663FF mov eax, dword ptr fs:[00000030h]3_2_03A663FF
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AEC3CD mov eax, dword ptr fs:[00000030h]3_2_03AEC3CD
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A3A3C0 mov eax, dword ptr fs:[00000030h]3_2_03A3A3C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A3A3C0 mov eax, dword ptr fs:[00000030h]3_2_03A3A3C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A3A3C0 mov eax, dword ptr fs:[00000030h]3_2_03A3A3C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A3A3C0 mov eax, dword ptr fs:[00000030h]3_2_03A3A3C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A3A3C0 mov eax, dword ptr fs:[00000030h]3_2_03A3A3C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A3A3C0 mov eax, dword ptr fs:[00000030h]3_2_03A3A3C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A383C0 mov eax, dword ptr fs:[00000030h]3_2_03A383C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A383C0 mov eax, dword ptr fs:[00000030h]3_2_03A383C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A383C0 mov eax, dword ptr fs:[00000030h]3_2_03A383C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A383C0 mov eax, dword ptr fs:[00000030h]3_2_03A383C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AB63C0 mov eax, dword ptr fs:[00000030h]3_2_03AB63C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03ADE3DB mov eax, dword ptr fs:[00000030h]3_2_03ADE3DB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03ADE3DB mov eax, dword ptr fs:[00000030h]3_2_03ADE3DB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03ADE3DB mov ecx, dword ptr fs:[00000030h]3_2_03ADE3DB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03ADE3DB mov eax, dword ptr fs:[00000030h]3_2_03ADE3DB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AD43D4 mov eax, dword ptr fs:[00000030h]3_2_03AD43D4
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AD43D4 mov eax, dword ptr fs:[00000030h]3_2_03AD43D4
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A6A30B mov eax, dword ptr fs:[00000030h]3_2_03A6A30B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A6A30B mov eax, dword ptr fs:[00000030h]3_2_03A6A30B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A6A30B mov eax, dword ptr fs:[00000030h]3_2_03A6A30B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A2C310 mov ecx, dword ptr fs:[00000030h]3_2_03A2C310
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A50310 mov ecx, dword ptr fs:[00000030h]3_2_03A50310
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AD437C mov eax, dword ptr fs:[00000030h]3_2_03AD437C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AB2349 mov eax, dword ptr fs:[00000030h]3_2_03AB2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AB2349 mov eax, dword ptr fs:[00000030h]3_2_03AB2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AB2349 mov eax, dword ptr fs:[00000030h]3_2_03AB2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AB2349 mov eax, dword ptr fs:[00000030h]3_2_03AB2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AB2349 mov eax, dword ptr fs:[00000030h]3_2_03AB2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AB2349 mov eax, dword ptr fs:[00000030h]3_2_03AB2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AB2349 mov eax, dword ptr fs:[00000030h]3_2_03AB2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AB2349 mov eax, dword ptr fs:[00000030h]3_2_03AB2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AB2349 mov eax, dword ptr fs:[00000030h]3_2_03AB2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AB2349 mov eax, dword ptr fs:[00000030h]3_2_03AB2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AB2349 mov eax, dword ptr fs:[00000030h]3_2_03AB2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AB2349 mov eax, dword ptr fs:[00000030h]3_2_03AB2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AB2349 mov eax, dword ptr fs:[00000030h]3_2_03AB2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AB2349 mov eax, dword ptr fs:[00000030h]3_2_03AB2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AB2349 mov eax, dword ptr fs:[00000030h]3_2_03AB2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AB035C mov eax, dword ptr fs:[00000030h]3_2_03AB035C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AB035C mov eax, dword ptr fs:[00000030h]3_2_03AB035C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AB035C mov eax, dword ptr fs:[00000030h]3_2_03AB035C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AB035C mov ecx, dword ptr fs:[00000030h]3_2_03AB035C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AB035C mov eax, dword ptr fs:[00000030h]3_2_03AB035C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AB035C mov eax, dword ptr fs:[00000030h]3_2_03AB035C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AFA352 mov eax, dword ptr fs:[00000030h]3_2_03AFA352
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AD8350 mov ecx, dword ptr fs:[00000030h]3_2_03AD8350
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A402A0 mov eax, dword ptr fs:[00000030h]3_2_03A402A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A402A0 mov eax, dword ptr fs:[00000030h]3_2_03A402A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AC62A0 mov eax, dword ptr fs:[00000030h]3_2_03AC62A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AC62A0 mov ecx, dword ptr fs:[00000030h]3_2_03AC62A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AC62A0 mov eax, dword ptr fs:[00000030h]3_2_03AC62A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AC62A0 mov eax, dword ptr fs:[00000030h]3_2_03AC62A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AC62A0 mov eax, dword ptr fs:[00000030h]3_2_03AC62A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AC62A0 mov eax, dword ptr fs:[00000030h]3_2_03AC62A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A6E284 mov eax, dword ptr fs:[00000030h]3_2_03A6E284
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A6E284 mov eax, dword ptr fs:[00000030h]3_2_03A6E284
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AB0283 mov eax, dword ptr fs:[00000030h]3_2_03AB0283
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AB0283 mov eax, dword ptr fs:[00000030h]3_2_03AB0283
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AB0283 mov eax, dword ptr fs:[00000030h]3_2_03AB0283
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A402E1 mov eax, dword ptr fs:[00000030h]3_2_03A402E1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A402E1 mov eax, dword ptr fs:[00000030h]3_2_03A402E1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A402E1 mov eax, dword ptr fs:[00000030h]3_2_03A402E1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A3A2C3 mov eax, dword ptr fs:[00000030h]3_2_03A3A2C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A3A2C3 mov eax, dword ptr fs:[00000030h]3_2_03A3A2C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A3A2C3 mov eax, dword ptr fs:[00000030h]3_2_03A3A2C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A3A2C3 mov eax, dword ptr fs:[00000030h]3_2_03A3A2C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A3A2C3 mov eax, dword ptr fs:[00000030h]3_2_03A3A2C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A2823B mov eax, dword ptr fs:[00000030h]3_2_03A2823B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A34260 mov eax, dword ptr fs:[00000030h]3_2_03A34260
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A34260 mov eax, dword ptr fs:[00000030h]3_2_03A34260
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A34260 mov eax, dword ptr fs:[00000030h]3_2_03A34260
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A2826B mov eax, dword ptr fs:[00000030h]3_2_03A2826B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AE0274 mov eax, dword ptr fs:[00000030h]3_2_03AE0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AE0274 mov eax, dword ptr fs:[00000030h]3_2_03AE0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AE0274 mov eax, dword ptr fs:[00000030h]3_2_03AE0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AE0274 mov eax, dword ptr fs:[00000030h]3_2_03AE0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AE0274 mov eax, dword ptr fs:[00000030h]3_2_03AE0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AE0274 mov eax, dword ptr fs:[00000030h]3_2_03AE0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AE0274 mov eax, dword ptr fs:[00000030h]3_2_03AE0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AE0274 mov eax, dword ptr fs:[00000030h]3_2_03AE0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AE0274 mov eax, dword ptr fs:[00000030h]3_2_03AE0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AE0274 mov eax, dword ptr fs:[00000030h]3_2_03AE0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AE0274 mov eax, dword ptr fs:[00000030h]3_2_03AE0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AE0274 mov eax, dword ptr fs:[00000030h]3_2_03AE0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AB8243 mov eax, dword ptr fs:[00000030h]3_2_03AB8243
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AB8243 mov ecx, dword ptr fs:[00000030h]3_2_03AB8243
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A2A250 mov eax, dword ptr fs:[00000030h]3_2_03A2A250
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A36259 mov eax, dword ptr fs:[00000030h]3_2_03A36259
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AEA250 mov eax, dword ptr fs:[00000030h]3_2_03AEA250
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AEA250 mov eax, dword ptr fs:[00000030h]3_2_03AEA250
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A70185 mov eax, dword ptr fs:[00000030h]3_2_03A70185
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AEC188 mov eax, dword ptr fs:[00000030h]3_2_03AEC188
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AEC188 mov eax, dword ptr fs:[00000030h]3_2_03AEC188
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AD4180 mov eax, dword ptr fs:[00000030h]3_2_03AD4180
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AD4180 mov eax, dword ptr fs:[00000030h]3_2_03AD4180
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AB019F mov eax, dword ptr fs:[00000030h]3_2_03AB019F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AB019F mov eax, dword ptr fs:[00000030h]3_2_03AB019F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AB019F mov eax, dword ptr fs:[00000030h]3_2_03AB019F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AB019F mov eax, dword ptr fs:[00000030h]3_2_03AB019F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A2A197 mov eax, dword ptr fs:[00000030h]3_2_03A2A197
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A2A197 mov eax, dword ptr fs:[00000030h]3_2_03A2A197
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A2A197 mov eax, dword ptr fs:[00000030h]3_2_03A2A197
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03B061E5 mov eax, dword ptr fs:[00000030h]3_2_03B061E5
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A601F8 mov eax, dword ptr fs:[00000030h]3_2_03A601F8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AF61C3 mov eax, dword ptr fs:[00000030h]3_2_03AF61C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AF61C3 mov eax, dword ptr fs:[00000030h]3_2_03AF61C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AAE1D0 mov eax, dword ptr fs:[00000030h]3_2_03AAE1D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AAE1D0 mov eax, dword ptr fs:[00000030h]3_2_03AAE1D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AAE1D0 mov ecx, dword ptr fs:[00000030h]3_2_03AAE1D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AAE1D0 mov eax, dword ptr fs:[00000030h]3_2_03AAE1D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AAE1D0 mov eax, dword ptr fs:[00000030h]3_2_03AAE1D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A60124 mov eax, dword ptr fs:[00000030h]3_2_03A60124
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03ADE10E mov eax, dword ptr fs:[00000030h]3_2_03ADE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03ADE10E mov ecx, dword ptr fs:[00000030h]3_2_03ADE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03ADE10E mov eax, dword ptr fs:[00000030h]3_2_03ADE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03ADE10E mov eax, dword ptr fs:[00000030h]3_2_03ADE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03ADE10E mov ecx, dword ptr fs:[00000030h]3_2_03ADE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03ADE10E mov eax, dword ptr fs:[00000030h]3_2_03ADE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03ADE10E mov eax, dword ptr fs:[00000030h]3_2_03ADE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03ADE10E mov ecx, dword ptr fs:[00000030h]3_2_03ADE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03ADE10E mov eax, dword ptr fs:[00000030h]3_2_03ADE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03ADE10E mov ecx, dword ptr fs:[00000030h]3_2_03ADE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03ADA118 mov ecx, dword ptr fs:[00000030h]3_2_03ADA118
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03ADA118 mov eax, dword ptr fs:[00000030h]3_2_03ADA118
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03ADA118 mov eax, dword ptr fs:[00000030h]3_2_03ADA118
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03ADA118 mov eax, dword ptr fs:[00000030h]3_2_03ADA118
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AF0115 mov eax, dword ptr fs:[00000030h]3_2_03AF0115
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AC4144 mov eax, dword ptr fs:[00000030h]3_2_03AC4144
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AC4144 mov eax, dword ptr fs:[00000030h]3_2_03AC4144
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AC4144 mov ecx, dword ptr fs:[00000030h]3_2_03AC4144
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AC4144 mov eax, dword ptr fs:[00000030h]3_2_03AC4144
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AC4144 mov eax, dword ptr fs:[00000030h]3_2_03AC4144
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A2C156 mov eax, dword ptr fs:[00000030h]3_2_03A2C156
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AC8158 mov eax, dword ptr fs:[00000030h]3_2_03AC8158
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A36154 mov eax, dword ptr fs:[00000030h]3_2_03A36154
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A36154 mov eax, dword ptr fs:[00000030h]3_2_03A36154
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AC80A8 mov eax, dword ptr fs:[00000030h]3_2_03AC80A8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AF60B8 mov eax, dword ptr fs:[00000030h]3_2_03AF60B8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AF60B8 mov ecx, dword ptr fs:[00000030h]3_2_03AF60B8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A3208A mov eax, dword ptr fs:[00000030h]3_2_03A3208A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A2A0E3 mov ecx, dword ptr fs:[00000030h]3_2_03A2A0E3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A380E9 mov eax, dword ptr fs:[00000030h]3_2_03A380E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AB60E0 mov eax, dword ptr fs:[00000030h]3_2_03AB60E0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A2C0F0 mov eax, dword ptr fs:[00000030h]3_2_03A2C0F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A720F0 mov ecx, dword ptr fs:[00000030h]3_2_03A720F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AB20DE mov eax, dword ptr fs:[00000030h]3_2_03AB20DE
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A2A020 mov eax, dword ptr fs:[00000030h]3_2_03A2A020
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A2C020 mov eax, dword ptr fs:[00000030h]3_2_03A2C020
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AC6030 mov eax, dword ptr fs:[00000030h]3_2_03AC6030
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AB4000 mov ecx, dword ptr fs:[00000030h]3_2_03AB4000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AD2000 mov eax, dword ptr fs:[00000030h]3_2_03AD2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AD2000 mov eax, dword ptr fs:[00000030h]3_2_03AD2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AD2000 mov eax, dword ptr fs:[00000030h]3_2_03AD2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AD2000 mov eax, dword ptr fs:[00000030h]3_2_03AD2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AD2000 mov eax, dword ptr fs:[00000030h]3_2_03AD2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AD2000 mov eax, dword ptr fs:[00000030h]3_2_03AD2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AD2000 mov eax, dword ptr fs:[00000030h]3_2_03AD2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AD2000 mov eax, dword ptr fs:[00000030h]3_2_03AD2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A4E016 mov eax, dword ptr fs:[00000030h]3_2_03A4E016
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A4E016 mov eax, dword ptr fs:[00000030h]3_2_03A4E016
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A4E016 mov eax, dword ptr fs:[00000030h]3_2_03A4E016
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A4E016 mov eax, dword ptr fs:[00000030h]3_2_03A4E016
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A5C073 mov eax, dword ptr fs:[00000030h]3_2_03A5C073
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A32050 mov eax, dword ptr fs:[00000030h]3_2_03A32050
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AB6050 mov eax, dword ptr fs:[00000030h]3_2_03AB6050
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A307AF mov eax, dword ptr fs:[00000030h]3_2_03A307AF
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AE47A0 mov eax, dword ptr fs:[00000030h]3_2_03AE47A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AD678E mov eax, dword ptr fs:[00000030h]3_2_03AD678E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A527ED mov eax, dword ptr fs:[00000030h]3_2_03A527ED
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A527ED mov eax, dword ptr fs:[00000030h]3_2_03A527ED
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A527ED mov eax, dword ptr fs:[00000030h]3_2_03A527ED
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03ABE7E1 mov eax, dword ptr fs:[00000030h]3_2_03ABE7E1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A347FB mov eax, dword ptr fs:[00000030h]3_2_03A347FB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A347FB mov eax, dword ptr fs:[00000030h]3_2_03A347FB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A3C7C0 mov eax, dword ptr fs:[00000030h]3_2_03A3C7C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AB07C3 mov eax, dword ptr fs:[00000030h]3_2_03AB07C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A6C720 mov eax, dword ptr fs:[00000030h]3_2_03A6C720
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A6C720 mov eax, dword ptr fs:[00000030h]3_2_03A6C720
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A6273C mov eax, dword ptr fs:[00000030h]3_2_03A6273C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A6273C mov ecx, dword ptr fs:[00000030h]3_2_03A6273C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A6273C mov eax, dword ptr fs:[00000030h]3_2_03A6273C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AAC730 mov eax, dword ptr fs:[00000030h]3_2_03AAC730
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A6C700 mov eax, dword ptr fs:[00000030h]3_2_03A6C700
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A30710 mov eax, dword ptr fs:[00000030h]3_2_03A30710
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A60710 mov eax, dword ptr fs:[00000030h]3_2_03A60710
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A38770 mov eax, dword ptr fs:[00000030h]3_2_03A38770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A40770 mov eax, dword ptr fs:[00000030h]3_2_03A40770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A40770 mov eax, dword ptr fs:[00000030h]3_2_03A40770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A40770 mov eax, dword ptr fs:[00000030h]3_2_03A40770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A40770 mov eax, dword ptr fs:[00000030h]3_2_03A40770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A40770 mov eax, dword ptr fs:[00000030h]3_2_03A40770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A40770 mov eax, dword ptr fs:[00000030h]3_2_03A40770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A40770 mov eax, dword ptr fs:[00000030h]3_2_03A40770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A40770 mov eax, dword ptr fs:[00000030h]3_2_03A40770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A40770 mov eax, dword ptr fs:[00000030h]3_2_03A40770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A40770 mov eax, dword ptr fs:[00000030h]3_2_03A40770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A40770 mov eax, dword ptr fs:[00000030h]3_2_03A40770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A40770 mov eax, dword ptr fs:[00000030h]3_2_03A40770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A6674D mov esi, dword ptr fs:[00000030h]3_2_03A6674D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A6674D mov eax, dword ptr fs:[00000030h]3_2_03A6674D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A6674D mov eax, dword ptr fs:[00000030h]3_2_03A6674D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A30750 mov eax, dword ptr fs:[00000030h]3_2_03A30750
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03ABE75D mov eax, dword ptr fs:[00000030h]3_2_03ABE75D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A72750 mov eax, dword ptr fs:[00000030h]3_2_03A72750
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A72750 mov eax, dword ptr fs:[00000030h]3_2_03A72750
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AB4755 mov eax, dword ptr fs:[00000030h]3_2_03AB4755
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A6C6A6 mov eax, dword ptr fs:[00000030h]3_2_03A6C6A6
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A666B0 mov eax, dword ptr fs:[00000030h]3_2_03A666B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A34690 mov eax, dword ptr fs:[00000030h]3_2_03A34690
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A34690 mov eax, dword ptr fs:[00000030h]3_2_03A34690
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AAE6F2 mov eax, dword ptr fs:[00000030h]3_2_03AAE6F2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AAE6F2 mov eax, dword ptr fs:[00000030h]3_2_03AAE6F2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AAE6F2 mov eax, dword ptr fs:[00000030h]3_2_03AAE6F2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AAE6F2 mov eax, dword ptr fs:[00000030h]3_2_03AAE6F2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AB06F1 mov eax, dword ptr fs:[00000030h]3_2_03AB06F1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AB06F1 mov eax, dword ptr fs:[00000030h]3_2_03AB06F1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A6A6C7 mov ebx, dword ptr fs:[00000030h]3_2_03A6A6C7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A6A6C7 mov eax, dword ptr fs:[00000030h]3_2_03A6A6C7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A4E627 mov eax, dword ptr fs:[00000030h]3_2_03A4E627
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A66620 mov eax, dword ptr fs:[00000030h]3_2_03A66620
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A68620 mov eax, dword ptr fs:[00000030h]3_2_03A68620
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A3262C mov eax, dword ptr fs:[00000030h]3_2_03A3262C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AAE609 mov eax, dword ptr fs:[00000030h]3_2_03AAE609
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A4260B mov eax, dword ptr fs:[00000030h]3_2_03A4260B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A4260B mov eax, dword ptr fs:[00000030h]3_2_03A4260B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A4260B mov eax, dword ptr fs:[00000030h]3_2_03A4260B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A4260B mov eax, dword ptr fs:[00000030h]3_2_03A4260B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A4260B mov eax, dword ptr fs:[00000030h]3_2_03A4260B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A4260B mov eax, dword ptr fs:[00000030h]3_2_03A4260B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A4260B mov eax, dword ptr fs:[00000030h]3_2_03A4260B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A72619 mov eax, dword ptr fs:[00000030h]3_2_03A72619
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AF866E mov eax, dword ptr fs:[00000030h]3_2_03AF866E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AF866E mov eax, dword ptr fs:[00000030h]3_2_03AF866E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A6A660 mov eax, dword ptr fs:[00000030h]3_2_03A6A660
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A6A660 mov eax, dword ptr fs:[00000030h]3_2_03A6A660
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A62674 mov eax, dword ptr fs:[00000030h]3_2_03A62674
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A4C640 mov eax, dword ptr fs:[00000030h]3_2_03A4C640
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AB05A7 mov eax, dword ptr fs:[00000030h]3_2_03AB05A7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AB05A7 mov eax, dword ptr fs:[00000030h]3_2_03AB05A7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AB05A7 mov eax, dword ptr fs:[00000030h]3_2_03AB05A7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A545B1 mov eax, dword ptr fs:[00000030h]3_2_03A545B1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A545B1 mov eax, dword ptr fs:[00000030h]3_2_03A545B1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A32582 mov eax, dword ptr fs:[00000030h]3_2_03A32582
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A32582 mov ecx, dword ptr fs:[00000030h]3_2_03A32582
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A64588 mov eax, dword ptr fs:[00000030h]3_2_03A64588
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A6E59C mov eax, dword ptr fs:[00000030h]3_2_03A6E59C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A5E5E7 mov eax, dword ptr fs:[00000030h]3_2_03A5E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A5E5E7 mov eax, dword ptr fs:[00000030h]3_2_03A5E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A5E5E7 mov eax, dword ptr fs:[00000030h]3_2_03A5E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A5E5E7 mov eax, dword ptr fs:[00000030h]3_2_03A5E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A5E5E7 mov eax, dword ptr fs:[00000030h]3_2_03A5E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A5E5E7 mov eax, dword ptr fs:[00000030h]3_2_03A5E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A5E5E7 mov eax, dword ptr fs:[00000030h]3_2_03A5E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A5E5E7 mov eax, dword ptr fs:[00000030h]3_2_03A5E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A325E0 mov eax, dword ptr fs:[00000030h]3_2_03A325E0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A6C5ED mov eax, dword ptr fs:[00000030h]3_2_03A6C5ED
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A6C5ED mov eax, dword ptr fs:[00000030h]3_2_03A6C5ED
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A6E5CF mov eax, dword ptr fs:[00000030h]3_2_03A6E5CF
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A6E5CF mov eax, dword ptr fs:[00000030h]3_2_03A6E5CF
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A365D0 mov eax, dword ptr fs:[00000030h]3_2_03A365D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A6A5D0 mov eax, dword ptr fs:[00000030h]3_2_03A6A5D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A6A5D0 mov eax, dword ptr fs:[00000030h]3_2_03A6A5D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A40535 mov eax, dword ptr fs:[00000030h]3_2_03A40535
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A40535 mov eax, dword ptr fs:[00000030h]3_2_03A40535
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A40535 mov eax, dword ptr fs:[00000030h]3_2_03A40535
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A40535 mov eax, dword ptr fs:[00000030h]3_2_03A40535
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A40535 mov eax, dword ptr fs:[00000030h]3_2_03A40535
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A40535 mov eax, dword ptr fs:[00000030h]3_2_03A40535
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A5E53E mov eax, dword ptr fs:[00000030h]3_2_03A5E53E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A5E53E mov eax, dword ptr fs:[00000030h]3_2_03A5E53E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A5E53E mov eax, dword ptr fs:[00000030h]3_2_03A5E53E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A5E53E mov eax, dword ptr fs:[00000030h]3_2_03A5E53E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A5E53E mov eax, dword ptr fs:[00000030h]3_2_03A5E53E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AC6500 mov eax, dword ptr fs:[00000030h]3_2_03AC6500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03B04500 mov eax, dword ptr fs:[00000030h]3_2_03B04500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03B04500 mov eax, dword ptr fs:[00000030h]3_2_03B04500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03B04500 mov eax, dword ptr fs:[00000030h]3_2_03B04500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03B04500 mov eax, dword ptr fs:[00000030h]3_2_03B04500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03B04500 mov eax, dword ptr fs:[00000030h]3_2_03B04500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03B04500 mov eax, dword ptr fs:[00000030h]3_2_03B04500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03B04500 mov eax, dword ptr fs:[00000030h]3_2_03B04500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A6656A mov eax, dword ptr fs:[00000030h]3_2_03A6656A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A6656A mov eax, dword ptr fs:[00000030h]3_2_03A6656A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A6656A mov eax, dword ptr fs:[00000030h]3_2_03A6656A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A38550 mov eax, dword ptr fs:[00000030h]3_2_03A38550
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A38550 mov eax, dword ptr fs:[00000030h]3_2_03A38550
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A364AB mov eax, dword ptr fs:[00000030h]3_2_03A364AB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A644B0 mov ecx, dword ptr fs:[00000030h]3_2_03A644B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03ABA4B0 mov eax, dword ptr fs:[00000030h]3_2_03ABA4B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AEA49A mov eax, dword ptr fs:[00000030h]3_2_03AEA49A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A304E5 mov ecx, dword ptr fs:[00000030h]3_2_03A304E5
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A2E420 mov eax, dword ptr fs:[00000030h]3_2_03A2E420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A2E420 mov eax, dword ptr fs:[00000030h]3_2_03A2E420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A2E420 mov eax, dword ptr fs:[00000030h]3_2_03A2E420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A2C427 mov eax, dword ptr fs:[00000030h]3_2_03A2C427
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AB6420 mov eax, dword ptr fs:[00000030h]3_2_03AB6420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AB6420 mov eax, dword ptr fs:[00000030h]3_2_03AB6420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AB6420 mov eax, dword ptr fs:[00000030h]3_2_03AB6420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AB6420 mov eax, dword ptr fs:[00000030h]3_2_03AB6420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AB6420 mov eax, dword ptr fs:[00000030h]3_2_03AB6420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AB6420 mov eax, dword ptr fs:[00000030h]3_2_03AB6420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AB6420 mov eax, dword ptr fs:[00000030h]3_2_03AB6420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A6A430 mov eax, dword ptr fs:[00000030h]3_2_03A6A430
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A68402 mov eax, dword ptr fs:[00000030h]3_2_03A68402
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A68402 mov eax, dword ptr fs:[00000030h]3_2_03A68402
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A68402 mov eax, dword ptr fs:[00000030h]3_2_03A68402
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03ABC460 mov ecx, dword ptr fs:[00000030h]3_2_03ABC460
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A5A470 mov eax, dword ptr fs:[00000030h]3_2_03A5A470
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A5A470 mov eax, dword ptr fs:[00000030h]3_2_03A5A470
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A5A470 mov eax, dword ptr fs:[00000030h]3_2_03A5A470
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A6E443 mov eax, dword ptr fs:[00000030h]3_2_03A6E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A6E443 mov eax, dword ptr fs:[00000030h]3_2_03A6E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A6E443 mov eax, dword ptr fs:[00000030h]3_2_03A6E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A6E443 mov eax, dword ptr fs:[00000030h]3_2_03A6E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A6E443 mov eax, dword ptr fs:[00000030h]3_2_03A6E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A6E443 mov eax, dword ptr fs:[00000030h]3_2_03A6E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A6E443 mov eax, dword ptr fs:[00000030h]3_2_03A6E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A6E443 mov eax, dword ptr fs:[00000030h]3_2_03A6E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AEA456 mov eax, dword ptr fs:[00000030h]3_2_03AEA456
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A2645D mov eax, dword ptr fs:[00000030h]3_2_03A2645D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A5245A mov eax, dword ptr fs:[00000030h]3_2_03A5245A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A40BBE mov eax, dword ptr fs:[00000030h]3_2_03A40BBE
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A40BBE mov eax, dword ptr fs:[00000030h]3_2_03A40BBE
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AE4BB0 mov eax, dword ptr fs:[00000030h]3_2_03AE4BB0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AE4BB0 mov eax, dword ptr fs:[00000030h]3_2_03AE4BB0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A38BF0 mov eax, dword ptr fs:[00000030h]3_2_03A38BF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A38BF0 mov eax, dword ptr fs:[00000030h]3_2_03A38BF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A38BF0 mov eax, dword ptr fs:[00000030h]3_2_03A38BF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A5EBFC mov eax, dword ptr fs:[00000030h]3_2_03A5EBFC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03ABCBF0 mov eax, dword ptr fs:[00000030h]3_2_03ABCBF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A50BCB mov eax, dword ptr fs:[00000030h]3_2_03A50BCB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A50BCB mov eax, dword ptr fs:[00000030h]3_2_03A50BCB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A50BCB mov eax, dword ptr fs:[00000030h]3_2_03A50BCB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A30BCD mov eax, dword ptr fs:[00000030h]3_2_03A30BCD
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A30BCD mov eax, dword ptr fs:[00000030h]3_2_03A30BCD
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A30BCD mov eax, dword ptr fs:[00000030h]3_2_03A30BCD
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03ADEBD0 mov eax, dword ptr fs:[00000030h]3_2_03ADEBD0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A5EB20 mov eax, dword ptr fs:[00000030h]3_2_03A5EB20
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A5EB20 mov eax, dword ptr fs:[00000030h]3_2_03A5EB20
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AF8B28 mov eax, dword ptr fs:[00000030h]3_2_03AF8B28
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AF8B28 mov eax, dword ptr fs:[00000030h]3_2_03AF8B28
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AAEB1D mov eax, dword ptr fs:[00000030h]3_2_03AAEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AAEB1D mov eax, dword ptr fs:[00000030h]3_2_03AAEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AAEB1D mov eax, dword ptr fs:[00000030h]3_2_03AAEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AAEB1D mov eax, dword ptr fs:[00000030h]3_2_03AAEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AAEB1D mov eax, dword ptr fs:[00000030h]3_2_03AAEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AAEB1D mov eax, dword ptr fs:[00000030h]3_2_03AAEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AAEB1D mov eax, dword ptr fs:[00000030h]3_2_03AAEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AAEB1D mov eax, dword ptr fs:[00000030h]3_2_03AAEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AAEB1D mov eax, dword ptr fs:[00000030h]3_2_03AAEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A2CB7E mov eax, dword ptr fs:[00000030h]3_2_03A2CB7E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AE4B4B mov eax, dword ptr fs:[00000030h]3_2_03AE4B4B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AE4B4B mov eax, dword ptr fs:[00000030h]3_2_03AE4B4B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AC6B40 mov eax, dword ptr fs:[00000030h]3_2_03AC6B40
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AC6B40 mov eax, dword ptr fs:[00000030h]3_2_03AC6B40
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AFAB40 mov eax, dword ptr fs:[00000030h]3_2_03AFAB40
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AD8B42 mov eax, dword ptr fs:[00000030h]3_2_03AD8B42
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03ADEB50 mov eax, dword ptr fs:[00000030h]3_2_03ADEB50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A38AA0 mov eax, dword ptr fs:[00000030h]3_2_03A38AA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A38AA0 mov eax, dword ptr fs:[00000030h]3_2_03A38AA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A86AA4 mov eax, dword ptr fs:[00000030h]3_2_03A86AA4
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A3EA80 mov eax, dword ptr fs:[00000030h]3_2_03A3EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A3EA80 mov eax, dword ptr fs:[00000030h]3_2_03A3EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A3EA80 mov eax, dword ptr fs:[00000030h]3_2_03A3EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A3EA80 mov eax, dword ptr fs:[00000030h]3_2_03A3EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A3EA80 mov eax, dword ptr fs:[00000030h]3_2_03A3EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A3EA80 mov eax, dword ptr fs:[00000030h]3_2_03A3EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A3EA80 mov eax, dword ptr fs:[00000030h]3_2_03A3EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A3EA80 mov eax, dword ptr fs:[00000030h]3_2_03A3EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A3EA80 mov eax, dword ptr fs:[00000030h]3_2_03A3EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03B04A80 mov eax, dword ptr fs:[00000030h]3_2_03B04A80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A68A90 mov edx, dword ptr fs:[00000030h]3_2_03A68A90
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A6AAEE mov eax, dword ptr fs:[00000030h]3_2_03A6AAEE
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A6AAEE mov eax, dword ptr fs:[00000030h]3_2_03A6AAEE
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A86ACC mov eax, dword ptr fs:[00000030h]3_2_03A86ACC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A86ACC mov eax, dword ptr fs:[00000030h]3_2_03A86ACC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A86ACC mov eax, dword ptr fs:[00000030h]3_2_03A86ACC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A30AD0 mov eax, dword ptr fs:[00000030h]3_2_03A30AD0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A64AD0 mov eax, dword ptr fs:[00000030h]3_2_03A64AD0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A64AD0 mov eax, dword ptr fs:[00000030h]3_2_03A64AD0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A6CA24 mov eax, dword ptr fs:[00000030h]3_2_03A6CA24
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A5EA2E mov eax, dword ptr fs:[00000030h]3_2_03A5EA2E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A54A35 mov eax, dword ptr fs:[00000030h]3_2_03A54A35
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A54A35 mov eax, dword ptr fs:[00000030h]3_2_03A54A35
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A6CA38 mov eax, dword ptr fs:[00000030h]3_2_03A6CA38
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03ABCA11 mov eax, dword ptr fs:[00000030h]3_2_03ABCA11
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A6CA6F mov eax, dword ptr fs:[00000030h]3_2_03A6CA6F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A6CA6F mov eax, dword ptr fs:[00000030h]3_2_03A6CA6F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A6CA6F mov eax, dword ptr fs:[00000030h]3_2_03A6CA6F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03ADEA60 mov eax, dword ptr fs:[00000030h]3_2_03ADEA60
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AACA72 mov eax, dword ptr fs:[00000030h]3_2_03AACA72
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AACA72 mov eax, dword ptr fs:[00000030h]3_2_03AACA72
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A36A50 mov eax, dword ptr fs:[00000030h]3_2_03A36A50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A36A50 mov eax, dword ptr fs:[00000030h]3_2_03A36A50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A36A50 mov eax, dword ptr fs:[00000030h]3_2_03A36A50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A36A50 mov eax, dword ptr fs:[00000030h]3_2_03A36A50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A36A50 mov eax, dword ptr fs:[00000030h]3_2_03A36A50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A36A50 mov eax, dword ptr fs:[00000030h]3_2_03A36A50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A36A50 mov eax, dword ptr fs:[00000030h]3_2_03A36A50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A40A5B mov eax, dword ptr fs:[00000030h]3_2_03A40A5B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A40A5B mov eax, dword ptr fs:[00000030h]3_2_03A40A5B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A429A0 mov eax, dword ptr fs:[00000030h]3_2_03A429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A429A0 mov eax, dword ptr fs:[00000030h]3_2_03A429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A429A0 mov eax, dword ptr fs:[00000030h]3_2_03A429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A429A0 mov eax, dword ptr fs:[00000030h]3_2_03A429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A429A0 mov eax, dword ptr fs:[00000030h]3_2_03A429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A429A0 mov eax, dword ptr fs:[00000030h]3_2_03A429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A429A0 mov eax, dword ptr fs:[00000030h]3_2_03A429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A429A0 mov eax, dword ptr fs:[00000030h]3_2_03A429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A429A0 mov eax, dword ptr fs:[00000030h]3_2_03A429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A429A0 mov eax, dword ptr fs:[00000030h]3_2_03A429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A429A0 mov eax, dword ptr fs:[00000030h]3_2_03A429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A429A0 mov eax, dword ptr fs:[00000030h]3_2_03A429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A429A0 mov eax, dword ptr fs:[00000030h]3_2_03A429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A309AD mov eax, dword ptr fs:[00000030h]3_2_03A309AD
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A309AD mov eax, dword ptr fs:[00000030h]3_2_03A309AD
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AB89B3 mov esi, dword ptr fs:[00000030h]3_2_03AB89B3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AB89B3 mov eax, dword ptr fs:[00000030h]3_2_03AB89B3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AB89B3 mov eax, dword ptr fs:[00000030h]3_2_03AB89B3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03ABE9E0 mov eax, dword ptr fs:[00000030h]3_2_03ABE9E0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A629F9 mov eax, dword ptr fs:[00000030h]3_2_03A629F9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A629F9 mov eax, dword ptr fs:[00000030h]3_2_03A629F9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AC69C0 mov eax, dword ptr fs:[00000030h]3_2_03AC69C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A3A9D0 mov eax, dword ptr fs:[00000030h]3_2_03A3A9D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A3A9D0 mov eax, dword ptr fs:[00000030h]3_2_03A3A9D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A3A9D0 mov eax, dword ptr fs:[00000030h]3_2_03A3A9D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A3A9D0 mov eax, dword ptr fs:[00000030h]3_2_03A3A9D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A3A9D0 mov eax, dword ptr fs:[00000030h]3_2_03A3A9D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A3A9D0 mov eax, dword ptr fs:[00000030h]3_2_03A3A9D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A649D0 mov eax, dword ptr fs:[00000030h]3_2_03A649D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AFA9D3 mov eax, dword ptr fs:[00000030h]3_2_03AFA9D3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AB892A mov eax, dword ptr fs:[00000030h]3_2_03AB892A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AC892B mov eax, dword ptr fs:[00000030h]3_2_03AC892B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AAE908 mov eax, dword ptr fs:[00000030h]3_2_03AAE908
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AAE908 mov eax, dword ptr fs:[00000030h]3_2_03AAE908
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03ABC912 mov eax, dword ptr fs:[00000030h]3_2_03ABC912
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A28918 mov eax, dword ptr fs:[00000030h]3_2_03A28918
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A28918 mov eax, dword ptr fs:[00000030h]3_2_03A28918
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A56962 mov eax, dword ptr fs:[00000030h]3_2_03A56962
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A56962 mov eax, dword ptr fs:[00000030h]3_2_03A56962
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A56962 mov eax, dword ptr fs:[00000030h]3_2_03A56962
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A7096E mov eax, dword ptr fs:[00000030h]3_2_03A7096E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A7096E mov edx, dword ptr fs:[00000030h]3_2_03A7096E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A7096E mov eax, dword ptr fs:[00000030h]3_2_03A7096E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AD4978 mov eax, dword ptr fs:[00000030h]3_2_03AD4978
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AD4978 mov eax, dword ptr fs:[00000030h]3_2_03AD4978
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03ABC97C mov eax, dword ptr fs:[00000030h]3_2_03ABC97C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AB0946 mov eax, dword ptr fs:[00000030h]3_2_03AB0946
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A30887 mov eax, dword ptr fs:[00000030h]3_2_03A30887
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03ABC89D mov eax, dword ptr fs:[00000030h]3_2_03ABC89D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AFA8E4 mov eax, dword ptr fs:[00000030h]3_2_03AFA8E4
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A6C8F9 mov eax, dword ptr fs:[00000030h]3_2_03A6C8F9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A6C8F9 mov eax, dword ptr fs:[00000030h]3_2_03A6C8F9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A5E8C0 mov eax, dword ptr fs:[00000030h]3_2_03A5E8C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A52835 mov eax, dword ptr fs:[00000030h]3_2_03A52835
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A52835 mov eax, dword ptr fs:[00000030h]3_2_03A52835
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A52835 mov eax, dword ptr fs:[00000030h]3_2_03A52835
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A52835 mov ecx, dword ptr fs:[00000030h]3_2_03A52835
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A52835 mov eax, dword ptr fs:[00000030h]3_2_03A52835
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A52835 mov eax, dword ptr fs:[00000030h]3_2_03A52835
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A6A830 mov eax, dword ptr fs:[00000030h]3_2_03A6A830
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AD483A mov eax, dword ptr fs:[00000030h]3_2_03AD483A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AD483A mov eax, dword ptr fs:[00000030h]3_2_03AD483A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03ABC810 mov eax, dword ptr fs:[00000030h]3_2_03ABC810
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03ABE872 mov eax, dword ptr fs:[00000030h]3_2_03ABE872
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03ABE872 mov eax, dword ptr fs:[00000030h]3_2_03ABE872
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AC6870 mov eax, dword ptr fs:[00000030h]3_2_03AC6870
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03AC6870 mov eax, dword ptr fs:[00000030h]3_2_03AC6870
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A42840 mov ecx, dword ptr fs:[00000030h]3_2_03A42840
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A60854 mov eax, dword ptr fs:[00000030h]3_2_03A60854
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A34859 mov eax, dword ptr fs:[00000030h]3_2_03A34859
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A34859 mov eax, dword ptr fs:[00000030h]3_2_03A34859
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A6CF80 mov eax, dword ptr fs:[00000030h]3_2_03A6CF80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A62F98 mov eax, dword ptr fs:[00000030h]3_2_03A62F98
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A62F98 mov eax, dword ptr fs:[00000030h]3_2_03A62F98
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03A4CFE0 mov eax, dword ptr fs:[00000030h]3_2_03A4CFE0
          Source: C:\Users\user\Desktop\A2028041200SD..exeCode function: 1_2_00DEA66C GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,1_2_00DEA66C
          Source: C:\Users\user\Desktop\A2028041200SD..exeCode function: 1_2_00DD8189 SetUnhandledExceptionFilter,1_2_00DD8189
          Source: C:\Users\user\Desktop\A2028041200SD..exeCode function: 1_2_00DD81AC SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_00DD81AC

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: C:\Users\user\Desktop\A2028041200SD..exeSection loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and writeJump to behavior
          Source: C:\Users\user\Desktop\A2028041200SD..exeMemory written: C:\Windows\SysWOW64\svchost.exe base: 30D8008Jump to behavior
          Source: C:\Users\user\Desktop\A2028041200SD..exeCode function: 1_2_00DEB106 LogonUserW,1_2_00DEB106
          Source: C:\Users\user\Desktop\A2028041200SD..exeCode function: 1_2_00DB3D19 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,1_2_00DB3D19
          Source: C:\Users\user\Desktop\A2028041200SD..exeCode function: 1_2_00DF411C SendInput,keybd_event,1_2_00DF411C
          Source: C:\Users\user\Desktop\A2028041200SD..exeCode function: 1_2_00DF74E7 mouse_event,1_2_00DF74E7
          Source: C:\Users\user\Desktop\A2028041200SD..exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\A2028041200SD..exe"Jump to behavior
          Source: C:\Users\user\Desktop\A2028041200SD..exeCode function: 1_2_00DEA66C GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,1_2_00DEA66C
          Source: C:\Users\user\Desktop\A2028041200SD..exeCode function: 1_2_00DF71FA AllocateAndInitializeSid,CheckTokenMembership,FreeSid,1_2_00DF71FA
          Source: A2028041200SD..exeBinary or memory string: Shell_TrayWnd
          Source: A2028041200SD..exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndTHISREMOVEblankinfoquestionstopwarning
          Source: C:\Users\user\Desktop\A2028041200SD..exeCode function: 1_2_00DD65C4 cpuid 1_2_00DD65C4
          Source: C:\Users\user\Desktop\A2028041200SD..exeCode function: 1_2_00E0091D GetLocalTime,SystemTimeToFileTime,LocalFileTimeToFileTime,__wsplitpath,_wcscat,_wcscat,GetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,_wcscpy,SetCurrentDirectoryW,1_2_00E0091D
          Source: C:\Users\user\Desktop\A2028041200SD..exeCode function: 1_2_00E2B340 GetUserNameW,1_2_00E2B340
          Source: C:\Users\user\Desktop\A2028041200SD..exeCode function: 1_2_00DE1E8E __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,1_2_00DE1E8E
          Source: C:\Users\user\Desktop\A2028041200SD..exeCode function: 1_2_00DCDDC0 GetVersionExW,GetCurrentProcess,FreeLibrary,GetNativeSystemInfo,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,1_2_00DCDDC0

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: 3.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000003.00000002.1372712193.0000000002F80000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000002.1372556382.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: A2028041200SD..exeBinary or memory string: WIN_81
          Source: A2028041200SD..exeBinary or memory string: WIN_XP
          Source: A2028041200SD..exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 12, 0USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubytep
          Source: A2028041200SD..exeBinary or memory string: WIN_XPe
          Source: A2028041200SD..exeBinary or memory string: WIN_VISTA
          Source: A2028041200SD..exeBinary or memory string: WIN_7
          Source: A2028041200SD..exeBinary or memory string: WIN_8

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: 3.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000003.00000002.1372712193.0000000002F80000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000002.1372556382.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: C:\Users\user\Desktop\A2028041200SD..exeCode function: 1_2_00E08C4F socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,1_2_00E08C4F
          Source: C:\Users\user\Desktop\A2028041200SD..exeCode function: 1_2_00E0923B socket,WSAGetLastError,bind,WSAGetLastError,closesocket,1_2_00E0923B
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire Infrastructure2
          Valid Accounts
          3
          Native API
          2
          Valid Accounts
          2
          Valid Accounts
          2
          Valid Accounts
          11
          Input Capture
          2
          System Time Discovery
          Remote Services11
          Input Capture
          1
          Encrypted Channel
          Exfiltration Over Other Network Medium1
          System Shutdown/Reboot
          CredentialsDomainsDefault AccountsScheduled Task/Job1
          DLL Side-Loading
          1
          Exploitation for Privilege Escalation
          1
          Disable or Modify Tools
          LSASS Memory15
          Security Software Discovery
          Remote Desktop Protocol1
          Archive Collected Data
          1
          Ingress Tool Transfer
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)21
          Access Token Manipulation
          2
          Virtualization/Sandbox Evasion
          Security Account Manager2
          Virtualization/Sandbox Evasion
          SMB/Windows Admin Shares3
          Clipboard Data
          SteganographyAutomated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook212
          Process Injection
          21
          Access Token Manipulation
          NTDS3
          Process Discovery
          Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script1
          DLL Side-Loading
          212
          Process Injection
          LSA Secrets1
          Application Window Discovery
          SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
          Deobfuscate/Decode Files or Information
          Cached Domain Credentials1
          Account Discovery
          VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
          DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
          Obfuscated Files or Information
          DCSync1
          System Owner/User Discovery
          Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
          Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
          DLL Side-Loading
          Proc Filesystem1
          File and Directory Discovery
          Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
          Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow115
          System Information Discovery
          Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          A2028041200SD..exe42%ReversingLabsWin32.Trojan.AutoitInject
          A2028041200SD..exe100%Joe Sandbox ML
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          No contacted domains info
          No contacted IP infos
          Joe Sandbox version:41.0.0 Charoite
          Analysis ID:1562199
          Start date and time:2024-11-25 10:37:05 +01:00
          Joe Sandbox product:CloudBasic
          Overall analysis duration:0h 6m 19s
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
          Number of analysed new started processes analysed:8
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Sample name:A2028041200SD..exe
          Detection:MAL
          Classification:mal80.troj.evad.winEXE@3/2@0/0
          EGA Information:
          • Successful, ratio: 100%
          HCA Information:
          • Successful, ratio: 99%
          • Number of executed functions: 47
          • Number of non-executed functions: 303
          Cookbook Comments:
          • Found application associated with file extension: .exe
          • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
          • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
          • Not all processes where analyzed, report is missing behavior information
          • Report size exceeded maximum capacity and may have missing disassembly code.
          • VT rate limit hit for: A2028041200SD..exe
          TimeTypeDescription
          04:38:10API Interceptor3x Sleep call for process: svchost.exe modified
          No context
          No context
          No context
          No context
          No context
          Process:C:\Users\user\Desktop\A2028041200SD..exe
          File Type:data
          Category:dropped
          Size (bytes):287744
          Entropy (8bit):7.994141690690766
          Encrypted:true
          SSDEEP:6144:6QVnFLSRUNTXBZToHQtm0dLg/9nnnPpvzNJLVF1ZjXnX7gRRcC:6QVnFvZLLO9nxzNPB3XmRx
          MD5:0EDD7A31D53248B9971D0D87928DE897
          SHA1:7493C530666889DEB49E5357F693E5FABB4B3CD5
          SHA-256:3AD0AD17737A3226DD3B6A4108D59E9385A9405BC0FA186FA031EC023A432B50
          SHA-512:27E44D51A12B96DAEDBD6940F9BC5671F57DB2FEB7F8C7C62CF209A810C0A17383F977C71528F0B822B7CCB71357AB63A03E7A5F15B4C95F5F4DE27A6E186C9E
          Malicious:false
          Reputation:low
          Preview:...7H0G43F2T..FF.1ZO0HKQ.COSSGRK7K0G47F2TO4FFJ1ZO0HKQGCOSSGR.7K0I+.H2.F.g.K}.nd ""g3=<453&.(Q)ZX2.6*.43$.3!....g. 76i_F=o0G47F2T65O.wQ=..(,.z#(.I....+W.....h/S.\.sP/... 'n3 .K7K0G47Fb.O4.GK1.}r.KQGCOSSG.K5J;F?7F`PO4FFJ1ZO0._QGC_SSG"O7K0.47V2TO6FFL1ZO0HKQACOSSGRK7;4G45F2TO4FDJq.O0XKQWCOSSWRK'K0G47F"TO4FFJ1ZO0HKQGCOSSGRK7K0G47F2TO4FFJ1ZO0HKQGCOSSGRK7K0G47F2TO4FFJ1ZO0HKQGCOSSGRK7K0G47F2TO4FFJ1ZO0HKQGCOSSGRK7K0G47F2TO4FFJ1ZO0HKQGCa'6?&K7K..07F"TO4.BJ1JO0HKQGCOSSGRK7k0GT7F2TO4FFJ1ZO0HKQGCOSSGRK7K0G47F2TO4FFJ1ZO0HKQGCOSSGRK7K0G47F2TO4FFJ1ZO0HKQGCOSSGRK7K0G47F2TO4FFJ1ZO0HKQGCOSSGRK7K0G47F2TO4FFJ1ZO0HKQGCOSSGRK7K0G47F2TO4FFJ1ZO0HKQGCOSSGRK7K0G47F2TO4FFJ1ZO0HKQGCOSSGRK7K0G47F2TO4FFJ1ZO0HKQGCOSSGRK7K0G47F2TO4FFJ1ZO0HKQGCOSSGRK7K0G47F2TO4FFJ1ZO0HKQGCOSSGRK7K0G47F2TO4FFJ1ZO0HKQGCOSSGRK7K0G47F2TO4FFJ1ZO0HKQGCOSSGRK7K0G47F2TO4FFJ1ZO0HKQGCOSSGRK7K0G47F2TO4FFJ1ZO0HKQGCOSSGRK7K0G47F2TO4FFJ1ZO0HKQGCOSSGRK7K0G47F2TO4FFJ1ZO0HKQGCOSSGRK7K0G47F2TO4FFJ1ZO0HKQGCOSSGRK7K0G47F2TO4FFJ1ZO0HKQGCOSSGRK7K0G47F2TO4
          Process:C:\Users\user\Desktop\A2028041200SD..exe
          File Type:data
          Category:modified
          Size (bytes):287744
          Entropy (8bit):7.994141690690766
          Encrypted:true
          SSDEEP:6144:6QVnFLSRUNTXBZToHQtm0dLg/9nnnPpvzNJLVF1ZjXnX7gRRcC:6QVnFvZLLO9nxzNPB3XmRx
          MD5:0EDD7A31D53248B9971D0D87928DE897
          SHA1:7493C530666889DEB49E5357F693E5FABB4B3CD5
          SHA-256:3AD0AD17737A3226DD3B6A4108D59E9385A9405BC0FA186FA031EC023A432B50
          SHA-512:27E44D51A12B96DAEDBD6940F9BC5671F57DB2FEB7F8C7C62CF209A810C0A17383F977C71528F0B822B7CCB71357AB63A03E7A5F15B4C95F5F4DE27A6E186C9E
          Malicious:false
          Reputation:low
          Preview:...7H0G43F2T..FF.1ZO0HKQ.COSSGRK7K0G47F2TO4FFJ1ZO0HKQGCOSSGR.7K0I+.H2.F.g.K}.nd ""g3=<453&.(Q)ZX2.6*.43$.3!....g. 76i_F=o0G47F2T65O.wQ=..(,.z#(.I....+W.....h/S.\.sP/... 'n3 .K7K0G47Fb.O4.GK1.}r.KQGCOSSG.K5J;F?7F`PO4FFJ1ZO0._QGC_SSG"O7K0.47V2TO6FFL1ZO0HKQACOSSGRK7;4G45F2TO4FDJq.O0XKQWCOSSWRK'K0G47F"TO4FFJ1ZO0HKQGCOSSGRK7K0G47F2TO4FFJ1ZO0HKQGCOSSGRK7K0G47F2TO4FFJ1ZO0HKQGCOSSGRK7K0G47F2TO4FFJ1ZO0HKQGCOSSGRK7K0G47F2TO4FFJ1ZO0HKQGCa'6?&K7K..07F"TO4.BJ1JO0HKQGCOSSGRK7k0GT7F2TO4FFJ1ZO0HKQGCOSSGRK7K0G47F2TO4FFJ1ZO0HKQGCOSSGRK7K0G47F2TO4FFJ1ZO0HKQGCOSSGRK7K0G47F2TO4FFJ1ZO0HKQGCOSSGRK7K0G47F2TO4FFJ1ZO0HKQGCOSSGRK7K0G47F2TO4FFJ1ZO0HKQGCOSSGRK7K0G47F2TO4FFJ1ZO0HKQGCOSSGRK7K0G47F2TO4FFJ1ZO0HKQGCOSSGRK7K0G47F2TO4FFJ1ZO0HKQGCOSSGRK7K0G47F2TO4FFJ1ZO0HKQGCOSSGRK7K0G47F2TO4FFJ1ZO0HKQGCOSSGRK7K0G47F2TO4FFJ1ZO0HKQGCOSSGRK7K0G47F2TO4FFJ1ZO0HKQGCOSSGRK7K0G47F2TO4FFJ1ZO0HKQGCOSSGRK7K0G47F2TO4FFJ1ZO0HKQGCOSSGRK7K0G47F2TO4FFJ1ZO0HKQGCOSSGRK7K0G47F2TO4FFJ1ZO0HKQGCOSSGRK7K0G47F2TO4FFJ1ZO0HKQGCOSSGRK7K0G47F2TO4
          File type:PE32 executable (GUI) Intel 80386, for MS Windows
          Entropy (8bit):7.14323484680738
          TrID:
          • Win32 Executable (generic) a (10002005/4) 99.96%
          • Generic Win/DOS Executable (2004/3) 0.02%
          • DOS Executable Generic (2002/1) 0.02%
          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
          File name:A2028041200SD..exe
          File size:1'207'808 bytes
          MD5:c986b78a1a48072903516a2d652d0159
          SHA1:182d579839cb6bfdc9201785df3c04bde927a720
          SHA256:1f34277db210da7c0c6523afe19d14c436d995fe37165665f11cb2c23204b2e6
          SHA512:361b4724f79274434842a03198bac72999b379eafb0609b684dcbab472e43e027f7c1550ca7eb8aa5f2e33f2c25fd792971ac0aa6bd5fe95b34143115d6f12ac
          SSDEEP:24576:itb20pkaCqT5TBWgNQ7aXCvoZm1pVBKDooBiytI6B6A:vVg5tQ7aXCvoZm9cooBiytIC5
          TLSH:9745CF1373DEC360C3B25273BA25B741AEBB782506A5F96B2FD40D3DE820162525E673
          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........d..............'.a.....H.k.....H.h.....H.i......}%......}5...............~.......k.......o.......1.......j.....Rich...........
          Icon Hash:aaf3e3e3938382a0
          Entrypoint:0x425f74
          Entrypoint Section:.text
          Digitally signed:false
          Imagebase:0x400000
          Subsystem:windows gui
          Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
          DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
          Time Stamp:0x674400E7 [Mon Nov 25 04:45:27 2024 UTC]
          TLS Callbacks:
          CLR (.Net) Version:
          OS Version Major:5
          OS Version Minor:1
          File Version Major:5
          File Version Minor:1
          Subsystem Version Major:5
          Subsystem Version Minor:1
          Import Hash:3d95adbf13bbe79dc24dccb401c12091
          Instruction
          call 00007F08ECC4D04Fh
          jmp 00007F08ECC40064h
          int3
          int3
          push edi
          push esi
          mov esi, dword ptr [esp+10h]
          mov ecx, dword ptr [esp+14h]
          mov edi, dword ptr [esp+0Ch]
          mov eax, ecx
          mov edx, ecx
          add eax, esi
          cmp edi, esi
          jbe 00007F08ECC401EAh
          cmp edi, eax
          jc 00007F08ECC4054Eh
          bt dword ptr [004C0158h], 01h
          jnc 00007F08ECC401E9h
          rep movsb
          jmp 00007F08ECC404FCh
          cmp ecx, 00000080h
          jc 00007F08ECC403B4h
          mov eax, edi
          xor eax, esi
          test eax, 0000000Fh
          jne 00007F08ECC401F0h
          bt dword ptr [004BA370h], 01h
          jc 00007F08ECC406C0h
          bt dword ptr [004C0158h], 00000000h
          jnc 00007F08ECC4038Dh
          test edi, 00000003h
          jne 00007F08ECC4039Eh
          test esi, 00000003h
          jne 00007F08ECC4037Dh
          bt edi, 02h
          jnc 00007F08ECC401EFh
          mov eax, dword ptr [esi]
          sub ecx, 04h
          lea esi, dword ptr [esi+04h]
          mov dword ptr [edi], eax
          lea edi, dword ptr [edi+04h]
          bt edi, 03h
          jnc 00007F08ECC401F3h
          movq xmm1, qword ptr [esi]
          sub ecx, 08h
          lea esi, dword ptr [esi+08h]
          movq qword ptr [edi], xmm1
          lea edi, dword ptr [edi+08h]
          test esi, 00000007h
          je 00007F08ECC40245h
          bt esi, 03h
          jnc 00007F08ECC40298h
          movdqa xmm1, dqword ptr [esi+00h]
          Programming Language:
          • [ C ] VS2008 SP1 build 30729
          • [IMP] VS2008 SP1 build 30729
          • [ASM] VS2012 UPD4 build 61030
          • [RES] VS2012 UPD4 build 61030
          • [LNK] VS2012 UPD4 build 61030
          NameVirtual AddressVirtual Size Is in Section
          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IMPORT0xb70040x17c.rdata
          IMAGE_DIRECTORY_ENTRY_RESOURCE0xc40000x5dc84.rsrc
          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
          IMAGE_DIRECTORY_ENTRY_BASERELOC0x1220000x6c4c.reloc
          IMAGE_DIRECTORY_ENTRY_DEBUG0x8d8d00x1c.rdata
          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xb27300x40.rdata
          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IAT0x8d0000x860.rdata
          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
          .text0x10000x8b54f0x8b600f437a6545e938612764dbb0a314376fcFalse0.5699499019058296data6.680413749210956IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          .rdata0x8d0000x2cc420x2ce00827ffd24759e8e420890ecf164be989eFalse0.330464397632312data5.770192333189168IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          .data0xba0000x9d540x6200e0a519f8e3a35fae0d9c2cfd5a4bacfcFalse0.16402264030612246data2.002691099965349IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
          .rsrc0xc40000x5dc840x5de0011c8b27ea674e70609f4cb7066b67b72False0.9316640312916112data7.904364418118836IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          .reloc0x1220000xa4740xa6000bc98f8631ef0bde830a7f83bb06ff08False0.5017884036144579data5.245426654116355IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
          NameRVASizeTypeLanguageCountryZLIB Complexity
          RT_ICON0xc44a00x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
          RT_ICON0xc45c80x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
          RT_ICON0xc48b00x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
          RT_ICON0xc49d80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
          RT_ICON0xc58800x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
          RT_ICON0xc61280x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
          RT_ICON0xc66900x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
          RT_ICON0xc8c380x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
          RT_ICON0xc9ce00x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
          RT_STRING0xca1480x594dataEnglishGreat Britain0.3333333333333333
          RT_STRING0xca6dc0x68adataEnglishGreat Britain0.2747909199522103
          RT_STRING0xcad680x490dataEnglishGreat Britain0.3715753424657534
          RT_STRING0xcb1f80x5fcdataEnglishGreat Britain0.3087467362924282
          RT_STRING0xcb7f40x65cdataEnglishGreat Britain0.34336609336609336
          RT_STRING0xcbe500x466dataEnglishGreat Britain0.3605683836589698
          RT_STRING0xcc2b80x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
          RT_RCDATA0xcc4100x5535bdata1.0003323601293912
          RT_GROUP_ICON0x12176c0x76dataEnglishGreat Britain0.6610169491525424
          RT_GROUP_ICON0x1217e40x14dataEnglishGreat Britain1.15
          RT_VERSION0x1217f80xdcdataEnglishGreat Britain0.6181818181818182
          RT_MANIFEST0x1218d40x3b0ASCII text, with CRLF line terminatorsEnglishGreat Britain0.5116525423728814
          DLLImport
          WSOCK32.dll__WSAFDIsSet, recv, send, setsockopt, ntohs, recvfrom, select, WSAStartup, htons, accept, listen, bind, closesocket, connect, WSACleanup, ioctlsocket, sendto, WSAGetLastError, inet_addr, gethostbyname, gethostname, socket
          VERSION.dllGetFileVersionInfoW, VerQueryValueW, GetFileVersionInfoSizeW
          WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
          COMCTL32.dllImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, ImageList_Create, InitCommonControlsEx, ImageList_ReplaceIcon
          MPR.dllWNetUseConnectionW, WNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W
          WININET.dllInternetReadFile, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetConnectW, InternetQueryDataAvailable
          PSAPI.DLLGetProcessMemoryInfo
          IPHLPAPI.DLLIcmpCreateFile, IcmpCloseHandle, IcmpSendEcho
          USERENV.dllUnloadUserProfile, DestroyEnvironmentBlock, CreateEnvironmentBlock, LoadUserProfileW
          UxTheme.dllIsThemeActive
          KERNEL32.dllHeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, GetLongPathNameW, GetCurrentThread, FindNextFileW, MoveFileW, CopyFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, GetLocalTime, CompareStringW, DeleteCriticalSection, WaitForSingleObject, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, GetShortPathNameW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, SetPriorityClass, LoadLibraryW, VirtualAlloc, CloseHandle, GetLastError, GetFullPathNameW, SetCurrentDirectoryW, IsDebuggerPresent, GetCurrentDirectoryW, lstrcmpiW, RaiseException, InitializeCriticalSectionAndSpinCount, InterlockedDecrement, InterlockedIncrement, CreateThread, DuplicateHandle, EnterCriticalSection, GetCurrentProcess, ExitProcess, GetModuleHandleExW, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetCommandLineW, IsProcessorFeaturePresent, HeapSize, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetStartupInfoW, GetStringTypeW, SetStdHandle, GetFileType, GetConsoleCP, GetConsoleMode, RtlUnwind, ReadConsoleW, SetFilePointer, GetTimeZoneInformation, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetEnvironmentStringsW, FreeEnvironmentStringsW, HeapReAlloc, WriteConsoleW, SetEndOfFile, DeleteFileW, SetEnvironmentVariableA
          USER32.dllSetWindowPos, GetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, DrawMenuBar, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, MonitorFromRect, LoadImageW, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, CopyImage, CheckMenuRadioItem, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, UnregisterHotKey, keybd_event, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, DispatchMessageW, TranslateMessage, DeleteMenu, PeekMessageW, MessageBoxW, DefWindowProcW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, SystemParametersInfoW, CharLowerBuffW, GetWindowTextW
          GDI32.dllSetPixel, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, StrokePath, GetDeviceCaps, CloseFigure, LineTo, AngleArc, CreateCompatibleBitmap, CreateCompatibleDC, MoveToEx, Ellipse, PolyDraw, BeginPath, SelectObject, StretchBlt, GetDIBits, DeleteDC, GetPixel, CreateDCW, GetStockObject, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, EndPath
          COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
          ADVAPI32.dllGetAclInformation, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegCreateKeyExW, GetUserNameW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, InitiateSystemShutdownExW, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, FreeSid, GetTokenInformation, GetSecurityDescriptorDacl, SetSecurityDescriptorDacl, AddAce, GetAce
          SHELL32.dllDragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
          ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket
          OLEAUT32.dllRegisterTypeLib, LoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, UnRegisterTypeLib, SafeArrayCreateVector, SysAllocString, SysStringLen, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, OleLoadPicture, QueryPathOfRegTypeLib, VariantCopy, VariantClear, CreateDispTypeInfo, CreateStdDispatch, DispCallFunc, VariantChangeType, SafeArrayAllocDescriptorEx, VariantInit
          Language of compilation systemCountry where language is spokenMap
          EnglishGreat Britain
          No network behavior found

          Click to jump to process

          Click to jump to process

          Click to dive into process behavior distribution

          Click to jump to process

          Target ID:1
          Start time:04:38:06
          Start date:25/11/2024
          Path:C:\Users\user\Desktop\A2028041200SD..exe
          Wow64 process (32bit):true
          Commandline:"C:\Users\user\Desktop\A2028041200SD..exe"
          Imagebase:0xdb0000
          File size:1'207'808 bytes
          MD5 hash:C986B78A1A48072903516A2D652D0159
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low
          Has exited:true

          Target ID:3
          Start time:04:38:08
          Start date:25/11/2024
          Path:C:\Windows\SysWOW64\svchost.exe
          Wow64 process (32bit):true
          Commandline:"C:\Users\user\Desktop\A2028041200SD..exe"
          Imagebase:0xe20000
          File size:46'504 bytes
          MD5 hash:1ED18311E3DA35942DB37D15FA40CC5B
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Yara matches:
          • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000003.00000002.1372712193.0000000002F80000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
          • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000003.00000002.1372556382.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
          Reputation:high
          Has exited:true

          Reset < >

            Execution Graph

            Execution Coverage:3.9%
            Dynamic/Decrypted Code Coverage:0.4%
            Signature Coverage:6.2%
            Total number of Nodes:2000
            Total number of Limit Nodes:162
            execution_graph 93539 dd5dfd 93540 dd5e09 _fprintf 93539->93540 93576 dd7eeb GetStartupInfoW 93540->93576 93542 dd5e0e 93578 dd9ca7 GetProcessHeap 93542->93578 93544 dd5e66 93545 dd5e71 93544->93545 93663 dd5f4d 47 API calls 3 library calls 93544->93663 93579 dd7b47 93545->93579 93548 dd5e77 93549 dd5e82 __RTC_Initialize 93548->93549 93664 dd5f4d 47 API calls 3 library calls 93548->93664 93600 ddacb3 93549->93600 93552 dd5e91 93553 dd5e9d GetCommandLineW 93552->93553 93665 dd5f4d 47 API calls 3 library calls 93552->93665 93619 de2e7d GetEnvironmentStringsW 93553->93619 93556 dd5e9c 93556->93553 93560 dd5ec2 93632 de2cb4 93560->93632 93563 dd5ec8 93564 dd5ed3 93563->93564 93667 dd115b 47 API calls 3 library calls 93563->93667 93646 dd1195 93564->93646 93567 dd5edb 93569 dd5ee6 __wwincmdln 93567->93569 93668 dd115b 47 API calls 3 library calls 93567->93668 93650 db3a0f 93569->93650 93571 dd5efa 93572 dd5f09 93571->93572 93669 dd13f1 47 API calls _doexit 93571->93669 93670 dd1186 47 API calls _doexit 93572->93670 93575 dd5f0e _fprintf 93577 dd7f01 93576->93577 93577->93542 93578->93544 93671 dd123a 30 API calls 2 library calls 93579->93671 93581 dd7b4c 93672 dd7e23 InitializeCriticalSectionAndSpinCount 93581->93672 93583 dd7b51 93584 dd7b55 93583->93584 93674 dd7e6d TlsAlloc 93583->93674 93673 dd7bbd 50 API calls 2 library calls 93584->93673 93587 dd7b67 93587->93584 93589 dd7b72 93587->93589 93588 dd7b5a 93588->93548 93675 dd6986 93589->93675 93592 dd7bb4 93683 dd7bbd 50 API calls 2 library calls 93592->93683 93595 dd7b93 93595->93592 93597 dd7b99 93595->93597 93596 dd7bb9 93596->93548 93682 dd7a94 47 API calls 4 library calls 93597->93682 93599 dd7ba1 GetCurrentThreadId 93599->93548 93601 ddacbf _fprintf 93600->93601 93692 dd7cf4 93601->93692 93603 ddacc6 93604 dd6986 __calloc_crt 47 API calls 93603->93604 93605 ddacd7 93604->93605 93606 ddad42 GetStartupInfoW 93605->93606 93607 ddace2 @_EH4_CallFilterFunc@8 _fprintf 93605->93607 93613 ddae80 93606->93613 93616 ddad57 93606->93616 93607->93552 93608 ddaf44 93699 ddaf58 LeaveCriticalSection _doexit 93608->93699 93610 ddaec9 GetStdHandle 93610->93613 93611 dd6986 __calloc_crt 47 API calls 93611->93616 93612 ddaedb GetFileType 93612->93613 93613->93608 93613->93610 93613->93612 93615 ddaf08 InitializeCriticalSectionAndSpinCount 93613->93615 93614 ddada5 93614->93613 93617 ddade5 InitializeCriticalSectionAndSpinCount 93614->93617 93618 ddadd7 GetFileType 93614->93618 93615->93613 93616->93611 93616->93613 93616->93614 93617->93614 93618->93614 93618->93617 93620 de2e8e 93619->93620 93621 dd5ead 93619->93621 93738 dd69d0 47 API calls std::exception::_Copy_str 93620->93738 93626 de2a7b GetModuleFileNameW 93621->93626 93624 de2eb4 ___crtGetEnvironmentStringsW 93625 de2eca FreeEnvironmentStringsW 93624->93625 93625->93621 93627 de2aaf _wparse_cmdline 93626->93627 93628 dd5eb7 93627->93628 93629 de2ae9 93627->93629 93628->93560 93666 dd115b 47 API calls 3 library calls 93628->93666 93739 dd69d0 47 API calls std::exception::_Copy_str 93629->93739 93631 de2aef _wparse_cmdline 93631->93628 93633 de2cc5 93632->93633 93634 de2ccd __NMSG_WRITE 93632->93634 93633->93563 93635 dd6986 __calloc_crt 47 API calls 93634->93635 93636 de2cf6 __NMSG_WRITE 93635->93636 93636->93633 93638 dd6986 __calloc_crt 47 API calls 93636->93638 93639 de2d4d 93636->93639 93640 de2d72 93636->93640 93643 de2d89 93636->93643 93740 de2567 47 API calls ___crtsetenv 93636->93740 93637 dd1c9d _free 47 API calls 93637->93633 93638->93636 93639->93637 93641 dd1c9d _free 47 API calls 93640->93641 93641->93633 93741 dd6e20 IsProcessorFeaturePresent 93643->93741 93645 de2d95 93645->93563 93647 dd11a1 __initterm_e __initp_misc_cfltcvt_tab __IsNonwritableInCurrentImage 93646->93647 93649 dd11e0 __IsNonwritableInCurrentImage 93647->93649 93764 dd0f0a 52 API calls __cinit 93647->93764 93649->93567 93651 db3a29 93650->93651 93652 e21ebf 93650->93652 93653 db3a63 IsThemeActive 93651->93653 93765 dd1405 93653->93765 93657 db3a8f 93777 db3adb SystemParametersInfoW SystemParametersInfoW 93657->93777 93659 db3a9b 93778 db3d19 93659->93778 93661 db3aa3 SystemParametersInfoW 93662 db3ac8 93661->93662 93662->93571 93663->93545 93664->93549 93665->93556 93669->93572 93670->93575 93671->93581 93672->93583 93673->93588 93674->93587 93677 dd698d 93675->93677 93678 dd69ca 93677->93678 93679 dd69ab Sleep 93677->93679 93684 de30aa 93677->93684 93678->93592 93681 dd7ec9 TlsSetValue 93678->93681 93680 dd69c2 93679->93680 93680->93677 93680->93678 93681->93595 93682->93599 93683->93596 93685 de30b5 93684->93685 93688 de30d0 __calloc_impl 93684->93688 93686 de30c1 93685->93686 93685->93688 93691 dd7c0e 47 API calls __getptd_noexit 93686->93691 93689 de30e0 HeapAlloc 93688->93689 93690 de30c6 93688->93690 93689->93688 93689->93690 93690->93677 93691->93690 93693 dd7d18 EnterCriticalSection 93692->93693 93694 dd7d05 93692->93694 93693->93603 93700 dd7d7c 93694->93700 93696 dd7d0b 93696->93693 93724 dd115b 47 API calls 3 library calls 93696->93724 93699->93607 93701 dd7d88 _fprintf 93700->93701 93702 dd7da9 93701->93702 93703 dd7d91 93701->93703 93704 dd7da7 93702->93704 93710 dd7e11 _fprintf 93702->93710 93725 dd81c2 47 API calls __NMSG_WRITE 93703->93725 93704->93702 93728 dd69d0 47 API calls std::exception::_Copy_str 93704->93728 93707 dd7d96 93726 dd821f 47 API calls 5 library calls 93707->93726 93708 dd7dbd 93711 dd7dc4 93708->93711 93712 dd7dd3 93708->93712 93710->93696 93729 dd7c0e 47 API calls __getptd_noexit 93711->93729 93715 dd7cf4 __lock 46 API calls 93712->93715 93713 dd7d9d 93727 dd1145 GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 93713->93727 93718 dd7dda 93715->93718 93717 dd7dc9 93717->93710 93719 dd7dfe 93718->93719 93720 dd7de9 InitializeCriticalSectionAndSpinCount 93718->93720 93730 dd1c9d 93719->93730 93721 dd7e04 93720->93721 93736 dd7e1a LeaveCriticalSection _doexit 93721->93736 93725->93707 93726->93713 93728->93708 93729->93717 93731 dd1ca6 RtlFreeHeap 93730->93731 93735 dd1ccf _free 93730->93735 93732 dd1cbb 93731->93732 93731->93735 93737 dd7c0e 47 API calls __getptd_noexit 93732->93737 93734 dd1cc1 GetLastError 93734->93735 93735->93721 93736->93710 93737->93734 93738->93624 93739->93631 93740->93636 93742 dd6e2b 93741->93742 93747 dd6cb5 93742->93747 93746 dd6e46 93746->93645 93748 dd6ccf _memset ___raise_securityfailure 93747->93748 93749 dd6cef IsDebuggerPresent 93748->93749 93755 dd81ac SetUnhandledExceptionFilter UnhandledExceptionFilter 93749->93755 93752 dd6db3 ___raise_securityfailure 93756 dda70c 93752->93756 93753 dd6dd6 93754 dd8197 GetCurrentProcess TerminateProcess 93753->93754 93754->93746 93755->93752 93757 dda714 93756->93757 93758 dda716 IsProcessorFeaturePresent 93756->93758 93757->93753 93760 de37b0 93758->93760 93763 de375f 5 API calls 2 library calls 93760->93763 93762 de3893 93762->93753 93763->93762 93764->93649 93766 dd7cf4 __lock 47 API calls 93765->93766 93767 dd1410 93766->93767 93830 dd7e58 LeaveCriticalSection 93767->93830 93769 db3a88 93770 dd146d 93769->93770 93771 dd1477 93770->93771 93772 dd1491 93770->93772 93771->93772 93831 dd7c0e 47 API calls __getptd_noexit 93771->93831 93772->93657 93774 dd1481 93832 dd6e10 8 API calls ___crtsetenv 93774->93832 93776 dd148c 93776->93657 93777->93659 93779 db3d26 __ftell_nolock 93778->93779 93833 dbd7f7 93779->93833 93783 db3d57 IsDebuggerPresent 93784 e21cc1 MessageBoxA 93783->93784 93785 db3d65 93783->93785 93787 e21cd9 93784->93787 93786 db3e3a 93785->93786 93785->93787 93788 db3d82 93785->93788 93789 db3e41 SetCurrentDirectoryW 93786->93789 94026 dcc682 48 API calls 93787->94026 93912 db40e5 93788->93912 93792 db3e4e Mailbox 93789->93792 93792->93661 93793 e21ce9 93798 e21cff SetCurrentDirectoryW 93793->93798 93795 db3da0 GetFullPathNameW 93928 db6a63 93795->93928 93797 db3ddb 93939 db6430 93797->93939 93798->93792 93801 db3df6 93802 db3e00 93801->93802 94027 df71fa AllocateAndInitializeSid CheckTokenMembership FreeSid 93801->94027 93955 db3e6e GetSysColorBrush LoadCursorW LoadIconW LoadIconW LoadIconW 93802->93955 93805 e21d1c 93805->93802 93808 e21d2d 93805->93808 94028 db5374 93808->94028 93809 db3e0a 93810 db3e1f 93809->93810 94024 db4ffc 67 API calls _memset 93809->94024 93963 dbe8d0 93810->93963 93814 e21d35 94035 dbce19 93814->94035 93817 e21d42 93818 e21d49 93817->93818 93819 e21d6e 93817->93819 94041 db518c 93818->94041 93822 db518c 48 API calls 93819->93822 93824 e21d6a GetForegroundWindow ShellExecuteW 93822->93824 93828 e21d9e Mailbox 93824->93828 93828->93786 93829 db518c 48 API calls 93829->93824 93830->93769 93831->93774 93832->93776 94060 dcf4ea 93833->94060 93835 dbd818 93836 dcf4ea 48 API calls 93835->93836 93837 db3d31 GetCurrentDirectoryW 93836->93837 93838 db61ca 93837->93838 94091 dce99b 93838->94091 93842 db61eb 93843 db5374 50 API calls 93842->93843 93844 db61ff 93843->93844 93845 dbce19 48 API calls 93844->93845 93846 db620c 93845->93846 94108 db39db 93846->94108 93848 db6216 Mailbox 94120 db6eed 93848->94120 93853 dbce19 48 API calls 93854 db6244 93853->93854 94127 dbd6e9 93854->94127 93856 db6254 Mailbox 93857 dbce19 48 API calls 93856->93857 93858 db627c 93857->93858 93859 dbd6e9 55 API calls 93858->93859 93860 db628f Mailbox 93859->93860 93861 dbce19 48 API calls 93860->93861 93862 db62a0 93861->93862 94131 dbd645 93862->94131 93864 db62b2 Mailbox 93865 dbd7f7 48 API calls 93864->93865 93866 db62c5 93865->93866 94141 db63fc 93866->94141 93870 db62df 93871 db62e9 93870->93871 93872 e21c08 93870->93872 93874 dd0fa7 _W_store_winword 59 API calls 93871->93874 93873 db63fc 48 API calls 93872->93873 93875 e21c1c 93873->93875 93876 db62f4 93874->93876 93878 db63fc 48 API calls 93875->93878 93876->93875 93877 db62fe 93876->93877 93879 dd0fa7 _W_store_winword 59 API calls 93877->93879 93880 e21c38 93878->93880 93881 db6309 93879->93881 93884 db5374 50 API calls 93880->93884 93881->93880 93882 db6313 93881->93882 93883 dd0fa7 _W_store_winword 59 API calls 93882->93883 93887 db631e 93883->93887 93885 e21c5d 93884->93885 93888 db63fc 48 API calls 93885->93888 93886 db635f 93889 e21c86 93886->93889 93890 db636c 93886->93890 93887->93886 93887->93889 93892 db63fc 48 API calls 93887->93892 93891 e21c69 93888->93891 93893 db6eed 48 API calls 93889->93893 94157 dcc050 93890->94157 93894 db6eed 48 API calls 93891->93894 93895 db6342 93892->93895 93896 e21ca8 93893->93896 93898 e21c77 93894->93898 93900 db6eed 48 API calls 93895->93900 93901 db63fc 48 API calls 93896->93901 93899 db63fc 48 API calls 93898->93899 93899->93889 93903 db6350 93900->93903 93904 e21cb5 93901->93904 93902 db6384 94168 dc1b90 93902->94168 93906 db63fc 48 API calls 93903->93906 93904->93904 93906->93886 93907 dc1b90 48 API calls 93909 db6394 93907->93909 93909->93907 93910 db63fc 48 API calls 93909->93910 93911 db63d6 Mailbox 93909->93911 94184 db6b68 48 API calls 93909->94184 93910->93909 93911->93783 93913 db40f2 __ftell_nolock 93912->93913 93914 db410b 93913->93914 93915 e2370e _memset 93913->93915 94693 db660f 93914->94693 93917 e2372a GetOpenFileNameW 93915->93917 93919 e23779 93917->93919 93921 db6a63 48 API calls 93919->93921 93924 e2378e 93921->93924 93924->93924 93925 db4129 94718 db4139 93925->94718 93929 db6adf 93928->93929 93931 db6a6f __NMSG_WRITE 93928->93931 93930 dbb18b 48 API calls 93929->93930 93932 db6ab6 ___crtGetEnvironmentStringsW 93930->93932 93933 db6a8b 93931->93933 93934 db6ad7 93931->93934 93932->93797 94937 db6b4a 93933->94937 94940 dbc369 48 API calls 93934->94940 93937 db6a95 93938 dcee75 48 API calls 93937->93938 93938->93932 93940 db643d __ftell_nolock 93939->93940 94941 db4c75 93940->94941 93942 db6442 93954 db3dee 93942->93954 94952 db5928 86 API calls 93942->94952 93944 db644f 93944->93954 94953 db5798 88 API calls Mailbox 93944->94953 93946 db6458 93947 db645c GetFullPathNameW 93946->93947 93946->93954 93948 db6a63 48 API calls 93947->93948 93949 db6488 93948->93949 93950 db6a63 48 API calls 93949->93950 93951 db6495 93950->93951 93952 e25dcf _wcscat 93951->93952 93953 db6a63 48 API calls 93951->93953 93953->93954 93954->93793 93954->93801 93956 db3ed8 93955->93956 93957 e21cba 93955->93957 95000 db4024 93956->95000 93961 db3e05 93962 db36b8 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 93961->93962 93962->93809 93964 dbe8f6 93963->93964 93984 dbe906 Mailbox 93963->93984 93966 dbed52 93964->93966 93964->93984 93965 dfcc5c 86 API calls 93965->93984 95171 dce3cd 335 API calls 93966->95171 93968 dbebc7 93969 db3e2a 93968->93969 95172 db2ff6 16 API calls 93968->95172 93969->93786 94025 db3847 Shell_NotifyIconW _memset 93969->94025 93971 dbed63 93971->93969 93973 dbed70 93971->93973 93972 dbe94c PeekMessageW 93972->93984 95173 dce312 335 API calls Mailbox 93973->95173 93975 e2526e Sleep 93975->93984 93976 dbed77 LockWindowUpdate DestroyWindow GetMessageW 93976->93969 93978 dbeda9 93976->93978 93980 e259ef TranslateMessage DispatchMessageW GetMessageW 93978->93980 93980->93980 93983 e25a1f 93980->93983 93981 db1caa 49 API calls 93981->93984 93982 dbed21 PeekMessageW 93982->93984 93983->93969 93984->93965 93984->93968 93984->93972 93984->93975 93984->93981 93984->93982 93985 dcf4ea 48 API calls 93984->93985 93986 dbebf7 timeGetTime 93984->93986 93988 db6eed 48 API calls 93984->93988 93989 dbed3a TranslateMessage DispatchMessageW 93984->93989 93990 e25557 WaitForSingleObject 93984->93990 93992 db2aae 311 API calls 93984->93992 93993 e2588f Sleep 93984->93993 93995 dbedae timeGetTime 93984->93995 93997 e25733 Sleep 93984->93997 94003 e25445 Sleep 93984->94003 94020 e25429 Mailbox 93984->94020 94022 dbce19 48 API calls 93984->94022 94023 dbd6e9 55 API calls 93984->94023 95005 dbf110 93984->95005 95070 dc45e0 93984->95070 95087 dc3200 93984->95087 95159 dce244 93984->95159 95164 dcdc5f 93984->95164 95169 dbeed0 335 API calls Mailbox 93984->95169 95170 dbef00 335 API calls 93984->95170 95175 e18d23 48 API calls 93984->95175 95179 dbfe30 93984->95179 93985->93984 93986->93984 93988->93984 93989->93982 93990->93984 93994 e25574 GetExitCodeProcess CloseHandle 93990->93994 93991 dbd7f7 48 API calls 93991->94020 93992->93984 93993->94020 93994->93984 95174 db1caa 49 API calls 93995->95174 93997->94020 94001 dcdc38 timeGetTime 94001->94020 94002 e25926 GetExitCodeProcess 94004 e25952 CloseHandle 94002->94004 94005 e2593c WaitForSingleObject 94002->94005 94003->93984 94004->94020 94005->93984 94005->94004 94006 e25432 Sleep 94006->94003 94007 e18c4b 108 API calls 94007->94020 94008 db2c79 107 API calls 94008->94020 94010 e259ae Sleep 94010->93984 94013 dbce19 48 API calls 94013->94020 94015 dbd6e9 55 API calls 94015->94020 94020->93984 94020->93991 94020->94001 94020->94002 94020->94003 94020->94006 94020->94007 94020->94008 94020->94010 94020->94013 94020->94015 95176 df4cbe 49 API calls Mailbox 94020->95176 95177 db1caa 49 API calls 94020->95177 95178 db2aae 335 API calls 94020->95178 95208 e0ccb2 50 API calls 94020->95208 95209 df7a58 QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 94020->95209 95210 df6532 63 API calls 3 library calls 94020->95210 94022->93984 94023->93984 94024->93810 94025->93786 94026->93793 94027->93805 94029 ddf8a0 __ftell_nolock 94028->94029 94030 db5381 GetModuleFileNameW 94029->94030 94031 dbce19 48 API calls 94030->94031 94032 db53a7 94031->94032 94033 db660f 49 API calls 94032->94033 94034 db53b1 Mailbox 94033->94034 94034->93814 94036 dbce28 __NMSG_WRITE 94035->94036 94037 dcee75 48 API calls 94036->94037 94038 dbce50 ___crtGetEnvironmentStringsW 94037->94038 94039 dcf4ea 48 API calls 94038->94039 94040 dbce66 94039->94040 94040->93817 94042 db5197 94041->94042 94043 db519f 94042->94043 94044 e21ace 94042->94044 95505 db5130 94043->95505 94046 db6b4a 48 API calls 94044->94046 94048 e21adb __NMSG_WRITE 94046->94048 94047 db51aa 94051 db510d 94047->94051 94049 dcee75 48 API calls 94048->94049 94050 e21b07 ___crtGetEnvironmentStringsW 94049->94050 94052 db511f 94051->94052 94053 e21be7 94051->94053 95515 dbb384 94052->95515 95524 dea58f 48 API calls ___crtGetEnvironmentStringsW 94053->95524 94056 db512b 94056->93829 94057 e21bf1 94058 db6eed 48 API calls 94057->94058 94059 e21bf9 Mailbox 94058->94059 94063 dcf4f2 __calloc_impl 94060->94063 94062 dcf50c 94062->93835 94063->94062 94064 dcf50e std::exception::exception 94063->94064 94069 dd395c 94063->94069 94083 dd6805 RaiseException 94064->94083 94066 dcf538 94084 dd673b 47 API calls _free 94066->94084 94068 dcf54a 94068->93835 94070 dd39d7 __calloc_impl 94069->94070 94072 dd3968 __calloc_impl 94069->94072 94090 dd7c0e 47 API calls __getptd_noexit 94070->94090 94071 dd3973 94071->94072 94085 dd81c2 47 API calls __NMSG_WRITE 94071->94085 94086 dd821f 47 API calls 5 library calls 94071->94086 94087 dd1145 GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 94071->94087 94072->94071 94075 dd399b RtlAllocateHeap 94072->94075 94078 dd39c3 94072->94078 94081 dd39c1 94072->94081 94075->94072 94076 dd39cf 94075->94076 94076->94063 94088 dd7c0e 47 API calls __getptd_noexit 94078->94088 94089 dd7c0e 47 API calls __getptd_noexit 94081->94089 94083->94066 94084->94068 94085->94071 94086->94071 94088->94081 94089->94076 94090->94076 94092 dbd7f7 48 API calls 94091->94092 94093 db61db 94092->94093 94094 db6009 94093->94094 94095 db6016 __ftell_nolock 94094->94095 94096 db6a63 48 API calls 94095->94096 94099 db617c Mailbox 94095->94099 94098 db6048 94096->94098 94107 db607e Mailbox 94098->94107 94185 db61a6 94098->94185 94099->93842 94100 db61a6 48 API calls 94100->94107 94101 dbce19 48 API calls 94104 db6170 94101->94104 94102 db614f 94102->94099 94102->94101 94103 dbce19 48 API calls 94103->94107 94105 db64cf 48 API calls 94104->94105 94105->94099 94107->94099 94107->94100 94107->94102 94107->94103 94188 db64cf 94107->94188 94211 db41a9 94108->94211 94111 db3a06 94111->93848 94115 dd1c9d _free 47 API calls 94117 e22ffd 94115->94117 94116 e22ff0 94116->94115 94118 db4252 84 API calls 94117->94118 94119 e23006 94118->94119 94119->94119 94121 db6ef8 94120->94121 94122 db622b 94120->94122 94681 dbdd47 48 API calls ___crtGetEnvironmentStringsW 94121->94681 94124 db9048 94122->94124 94125 dcf4ea 48 API calls 94124->94125 94126 db6237 94125->94126 94126->93853 94128 dbd6f4 94127->94128 94129 dbd71b 94128->94129 94682 dbd764 55 API calls 94128->94682 94129->93856 94132 dbd654 94131->94132 94139 dbd67e 94131->94139 94133 dbd65b 94132->94133 94136 dbd6c2 94132->94136 94134 dbd666 94133->94134 94140 dbd6ab 94133->94140 94683 dbd9a0 53 API calls __cinit 94134->94683 94136->94140 94685 dcdce0 53 API calls 94136->94685 94139->93864 94140->94139 94684 dcdce0 53 API calls 94140->94684 94142 db641f 94141->94142 94143 db6406 94141->94143 94144 db6a63 48 API calls 94142->94144 94145 db6eed 48 API calls 94143->94145 94146 db62d1 94144->94146 94145->94146 94147 dd0fa7 94146->94147 94148 dd1028 94147->94148 94149 dd0fb3 94147->94149 94688 dd103a 59 API calls 3 library calls 94148->94688 94156 dd0fd8 94149->94156 94686 dd7c0e 47 API calls __getptd_noexit 94149->94686 94152 dd1035 94152->93870 94153 dd0fbf 94687 dd6e10 8 API calls ___crtsetenv 94153->94687 94155 dd0fca 94155->93870 94156->93870 94158 dcc064 94157->94158 94160 dcc069 Mailbox 94157->94160 94689 dcc1af 48 API calls 94158->94689 94162 dcc077 94160->94162 94690 dcc15c 48 API calls 94160->94690 94163 dcf4ea 48 API calls 94162->94163 94164 dcc152 94162->94164 94165 dcc108 94163->94165 94164->93902 94166 dcf4ea 48 API calls 94165->94166 94167 dcc113 94166->94167 94167->93902 94169 dc1cf6 94168->94169 94171 dc1ba2 94168->94171 94169->93909 94170 dc1bae 94175 dc1bb9 94170->94175 94692 dcc15c 48 API calls 94170->94692 94171->94170 94173 dcf4ea 48 API calls 94171->94173 94174 e249c4 94173->94174 94176 dcf4ea 48 API calls 94174->94176 94177 dc1c5d 94175->94177 94178 dcf4ea 48 API calls 94175->94178 94183 e249cf 94176->94183 94177->93909 94179 dc1c9f 94178->94179 94180 dc1cb2 94179->94180 94691 db2925 48 API calls 94179->94691 94180->93909 94182 dcf4ea 48 API calls 94182->94183 94183->94170 94183->94182 94184->93909 94194 dbbdfa 94185->94194 94187 db61b1 94187->94098 94189 db651b 94188->94189 94193 db64dd ___crtGetEnvironmentStringsW 94188->94193 94192 dcf4ea 48 API calls 94189->94192 94190 dcf4ea 48 API calls 94191 db64e4 94190->94191 94191->94107 94192->94193 94193->94190 94195 dbbe0a ___crtGetEnvironmentStringsW 94194->94195 94196 dbbe0d 94194->94196 94195->94187 94197 dcf4ea 48 API calls 94196->94197 94198 dbbe17 94197->94198 94200 dcee75 94198->94200 94202 dcf4ea __calloc_impl 94200->94202 94201 dd395c std::exception::_Copy_str 47 API calls 94201->94202 94202->94201 94203 dcf50c 94202->94203 94204 dcf50e std::exception::exception 94202->94204 94203->94195 94209 dd6805 RaiseException 94204->94209 94206 dcf538 94210 dd673b 47 API calls _free 94206->94210 94208 dcf54a 94208->94195 94209->94206 94210->94208 94276 db4214 94211->94276 94216 e24f73 94219 db4252 84 API calls 94216->94219 94217 db41d4 LoadLibraryExW 94286 db4291 94217->94286 94221 e24f7a 94219->94221 94223 db4291 3 API calls 94221->94223 94225 e24f82 94223->94225 94224 db41fb 94224->94225 94226 db4207 94224->94226 94312 db44ed 94225->94312 94228 db4252 84 API calls 94226->94228 94230 db39fe 94228->94230 94230->94111 94235 dfc396 94230->94235 94232 e24fa9 94320 db4950 94232->94320 94234 e24fb6 94236 db4517 83 API calls 94235->94236 94237 dfc405 94236->94237 94501 dfc56d 94237->94501 94240 db44ed 64 API calls 94241 dfc432 94240->94241 94242 db44ed 64 API calls 94241->94242 94243 dfc442 94242->94243 94244 db44ed 64 API calls 94243->94244 94245 dfc45d 94244->94245 94246 db44ed 64 API calls 94245->94246 94247 dfc478 94246->94247 94248 db4517 83 API calls 94247->94248 94249 dfc48f 94248->94249 94250 dd395c std::exception::_Copy_str 47 API calls 94249->94250 94251 dfc496 94250->94251 94252 dd395c std::exception::_Copy_str 47 API calls 94251->94252 94253 dfc4a0 94252->94253 94254 db44ed 64 API calls 94253->94254 94255 dfc4b4 94254->94255 94256 dfbf5a GetSystemTimeAsFileTime 94255->94256 94257 dfc4c7 94256->94257 94258 dfc4dc 94257->94258 94259 dfc4f1 94257->94259 94262 dd1c9d _free 47 API calls 94258->94262 94260 dfc4f7 94259->94260 94261 dfc556 94259->94261 94507 dfb965 94260->94507 94265 dd1c9d _free 47 API calls 94261->94265 94263 dfc4e2 94262->94263 94266 dd1c9d _free 47 API calls 94263->94266 94268 dfc41b 94265->94268 94266->94268 94268->94116 94270 db4252 94268->94270 94269 dd1c9d _free 47 API calls 94269->94268 94271 db425c 94270->94271 94272 db4263 94270->94272 94273 dd35e4 __fcloseall 83 API calls 94271->94273 94274 db4283 FreeLibrary 94272->94274 94275 db4272 94272->94275 94273->94272 94274->94275 94275->94116 94325 db4339 94276->94325 94279 db423c 94281 db41bb 94279->94281 94282 db4244 FreeLibrary 94279->94282 94283 dd3499 94281->94283 94282->94281 94333 dd34ae 94283->94333 94285 db41c8 94285->94216 94285->94217 94412 db42e4 94286->94412 94290 db41ec 94293 db4380 94290->94293 94291 db42c1 FreeLibrary 94291->94290 94292 db42b8 94292->94290 94292->94291 94294 dcf4ea 48 API calls 94293->94294 94295 db4395 94294->94295 94420 db47b7 94295->94420 94297 db43a1 ___crtGetEnvironmentStringsW 94298 db4499 94297->94298 94299 db44d1 94297->94299 94303 db43dc 94297->94303 94423 db406b CreateStreamOnHGlobal 94298->94423 94434 dfc750 93 API calls 94299->94434 94300 db4950 57 API calls 94309 db43e5 94300->94309 94303->94300 94304 db44ed 64 API calls 94304->94309 94305 db4479 94305->94224 94307 e24ed7 94308 db4517 83 API calls 94307->94308 94310 e24eeb 94308->94310 94309->94304 94309->94305 94309->94307 94429 db4517 94309->94429 94311 db44ed 64 API calls 94310->94311 94311->94305 94313 e24fc0 94312->94313 94314 db44ff 94312->94314 94458 dd381e 94314->94458 94317 dfbf5a 94478 dfbdb4 94317->94478 94319 dfbf70 94319->94232 94321 e25002 94320->94321 94322 db495f 94320->94322 94483 dd3e65 94322->94483 94324 db4967 94324->94234 94329 db434b 94325->94329 94328 db4321 LoadLibraryA GetProcAddress 94328->94279 94330 db422f 94329->94330 94331 db4354 LoadLibraryA 94329->94331 94330->94279 94330->94328 94331->94330 94332 db4365 GetProcAddress 94331->94332 94332->94330 94336 dd34ba _fprintf 94333->94336 94334 dd34cd 94381 dd7c0e 47 API calls __getptd_noexit 94334->94381 94336->94334 94338 dd34fe 94336->94338 94337 dd34d2 94382 dd6e10 8 API calls ___crtsetenv 94337->94382 94352 dde4c8 94338->94352 94341 dd3503 94342 dd350c 94341->94342 94343 dd3519 94341->94343 94383 dd7c0e 47 API calls __getptd_noexit 94342->94383 94345 dd3543 94343->94345 94346 dd3523 94343->94346 94366 dde5e0 94345->94366 94384 dd7c0e 47 API calls __getptd_noexit 94346->94384 94349 dd34dd @_EH4_CallFilterFunc@8 _fprintf 94349->94285 94353 dde4d4 _fprintf 94352->94353 94354 dd7cf4 __lock 47 API calls 94353->94354 94363 dde4e2 94354->94363 94355 dde559 94391 dd69d0 47 API calls std::exception::_Copy_str 94355->94391 94358 dde560 94360 dde56f InitializeCriticalSectionAndSpinCount EnterCriticalSection 94358->94360 94364 dde552 94358->94364 94359 dde5cc _fprintf 94359->94341 94360->94364 94361 dd7d7c __mtinitlocknum 47 API calls 94361->94363 94363->94355 94363->94361 94363->94364 94389 dd4e5b 48 API calls __lock 94363->94389 94390 dd4ec5 LeaveCriticalSection LeaveCriticalSection _doexit 94363->94390 94386 dde5d7 94364->94386 94375 dde600 __wopenfile 94366->94375 94367 dde61a 94396 dd7c0e 47 API calls __getptd_noexit 94367->94396 94369 dde7d5 94369->94367 94373 dde838 94369->94373 94370 dde61f 94397 dd6e10 8 API calls ___crtsetenv 94370->94397 94372 dd354e 94385 dd3570 LeaveCriticalSection LeaveCriticalSection _fprintf 94372->94385 94393 de63c9 94373->94393 94375->94367 94375->94369 94398 dd185b 59 API calls 2 library calls 94375->94398 94377 dde7ce 94377->94369 94399 dd185b 59 API calls 2 library calls 94377->94399 94379 dde7ed 94379->94369 94400 dd185b 59 API calls 2 library calls 94379->94400 94381->94337 94382->94349 94383->94349 94384->94349 94385->94349 94392 dd7e58 LeaveCriticalSection 94386->94392 94388 dde5de 94388->94359 94389->94363 94390->94363 94391->94358 94392->94388 94401 de5bb1 94393->94401 94395 de63e2 94395->94372 94396->94370 94397->94372 94398->94377 94399->94379 94400->94369 94402 de5bbd _fprintf 94401->94402 94403 de5bcf 94402->94403 94405 de5c06 94402->94405 94404 dd7c0e ___crtsetenv 47 API calls 94403->94404 94406 de5bd4 94404->94406 94407 de5c78 __wsopen_helper 110 API calls 94405->94407 94408 dd6e10 ___crtsetenv 8 API calls 94406->94408 94409 de5c23 94407->94409 94411 de5bde _fprintf 94408->94411 94410 de5c4c __wsopen_helper LeaveCriticalSection 94409->94410 94410->94411 94411->94395 94416 db42f6 94412->94416 94415 db42cc LoadLibraryA GetProcAddress 94415->94292 94417 db42aa 94416->94417 94418 db42ff LoadLibraryA 94416->94418 94417->94292 94417->94415 94418->94417 94419 db4310 GetProcAddress 94418->94419 94419->94417 94421 dcf4ea 48 API calls 94420->94421 94422 db47c9 94421->94422 94422->94297 94424 db4085 FindResourceExW 94423->94424 94428 db40a2 94423->94428 94425 e24f16 LoadResource 94424->94425 94424->94428 94426 e24f2b SizeofResource 94425->94426 94425->94428 94427 e24f3f LockResource 94426->94427 94426->94428 94427->94428 94428->94303 94430 db4526 94429->94430 94432 e24fe0 94429->94432 94435 dd3a8d 94430->94435 94433 db4534 94433->94309 94434->94303 94436 dd3a99 _fprintf 94435->94436 94437 dd3aa7 94436->94437 94439 dd3acd 94436->94439 94448 dd7c0e 47 API calls __getptd_noexit 94437->94448 94450 dd4e1c 94439->94450 94440 dd3aac 94449 dd6e10 8 API calls ___crtsetenv 94440->94449 94443 dd3ad3 94456 dd39fe 81 API calls 4 library calls 94443->94456 94445 dd3ae2 94457 dd3b04 LeaveCriticalSection LeaveCriticalSection _fprintf 94445->94457 94447 dd3ab7 _fprintf 94447->94433 94448->94440 94449->94447 94451 dd4e2c 94450->94451 94452 dd4e4e EnterCriticalSection 94450->94452 94451->94452 94454 dd4e34 94451->94454 94453 dd4e44 94452->94453 94453->94443 94455 dd7cf4 __lock 47 API calls 94454->94455 94455->94453 94456->94445 94457->94447 94461 dd3839 94458->94461 94460 db4510 94460->94317 94462 dd3845 _fprintf 94461->94462 94463 dd3888 94462->94463 94464 dd385b _memset 94462->94464 94466 dd3880 _fprintf 94462->94466 94465 dd4e1c __lock_file 48 API calls 94463->94465 94474 dd7c0e 47 API calls __getptd_noexit 94464->94474 94467 dd388e 94465->94467 94466->94460 94476 dd365b 62 API calls 5 library calls 94467->94476 94470 dd3875 94475 dd6e10 8 API calls ___crtsetenv 94470->94475 94471 dd38a4 94477 dd38c2 LeaveCriticalSection LeaveCriticalSection _fprintf 94471->94477 94474->94470 94475->94466 94476->94471 94477->94466 94481 dd344a GetSystemTimeAsFileTime 94478->94481 94480 dfbdc3 94480->94319 94482 dd3478 __aulldiv 94481->94482 94482->94480 94484 dd3e71 _fprintf 94483->94484 94485 dd3e7f 94484->94485 94486 dd3e94 94484->94486 94497 dd7c0e 47 API calls __getptd_noexit 94485->94497 94487 dd4e1c __lock_file 48 API calls 94486->94487 94490 dd3e9a 94487->94490 94489 dd3e84 94498 dd6e10 8 API calls ___crtsetenv 94489->94498 94499 dd3b0c 55 API calls 5 library calls 94490->94499 94493 dd3ea5 94500 dd3ec5 LeaveCriticalSection LeaveCriticalSection _fprintf 94493->94500 94495 dd3eb7 94496 dd3e8f _fprintf 94495->94496 94496->94324 94497->94489 94498->94496 94499->94493 94500->94495 94506 dfc581 __tzset_nolock _wcscmp 94501->94506 94502 db44ed 64 API calls 94502->94506 94503 dfc417 94503->94240 94503->94268 94504 dfbf5a GetSystemTimeAsFileTime 94504->94506 94505 db4517 83 API calls 94505->94506 94506->94502 94506->94503 94506->94504 94506->94505 94508 dfb970 94507->94508 94510 dfb97e 94507->94510 94509 dd3499 117 API calls 94508->94509 94509->94510 94511 dfb9c3 94510->94511 94512 dd3499 117 API calls 94510->94512 94537 dfb987 94510->94537 94538 dfbbe8 64 API calls 3 library calls 94511->94538 94514 dfb9a8 94512->94514 94514->94511 94516 dfb9b1 94514->94516 94515 dfba07 94517 dfba2c 94515->94517 94518 dfba0b 94515->94518 94516->94537 94549 dd35e4 94516->94549 94539 dfb7e5 47 API calls std::exception::_Copy_str 94517->94539 94519 dfba18 94518->94519 94523 dd35e4 __fcloseall 83 API calls 94518->94523 94526 dd35e4 __fcloseall 83 API calls 94519->94526 94519->94537 94522 dfba34 94524 dfba5a 94522->94524 94525 dfba3a 94522->94525 94523->94519 94540 dfba8a 90 API calls 94524->94540 94527 dfba47 94525->94527 94529 dd35e4 __fcloseall 83 API calls 94525->94529 94526->94537 94531 dd35e4 __fcloseall 83 API calls 94527->94531 94527->94537 94529->94527 94530 dfba61 94541 dfbb64 94530->94541 94531->94537 94534 dfba75 94536 dd35e4 __fcloseall 83 API calls 94534->94536 94534->94537 94535 dd35e4 __fcloseall 83 API calls 94535->94534 94536->94537 94537->94269 94538->94515 94539->94522 94540->94530 94542 dfbb77 94541->94542 94543 dfbb71 94541->94543 94545 dfbb88 94542->94545 94546 dd1c9d _free 47 API calls 94542->94546 94544 dd1c9d _free 47 API calls 94543->94544 94544->94542 94547 dfba68 94545->94547 94548 dd1c9d _free 47 API calls 94545->94548 94546->94545 94547->94534 94547->94535 94548->94547 94550 dd35f0 _fprintf 94549->94550 94551 dd361c 94550->94551 94552 dd3604 94550->94552 94554 dd4e1c __lock_file 48 API calls 94551->94554 94558 dd3614 _fprintf 94551->94558 94578 dd7c0e 47 API calls __getptd_noexit 94552->94578 94556 dd362e 94554->94556 94555 dd3609 94579 dd6e10 8 API calls ___crtsetenv 94555->94579 94562 dd3578 94556->94562 94558->94537 94563 dd359b 94562->94563 94564 dd3587 94562->94564 94571 dd3597 94563->94571 94581 dd2c84 94563->94581 94621 dd7c0e 47 API calls __getptd_noexit 94564->94621 94567 dd358c 94622 dd6e10 8 API calls ___crtsetenv 94567->94622 94580 dd3653 LeaveCriticalSection LeaveCriticalSection _fprintf 94571->94580 94574 dd35b5 94598 dde9d2 94574->94598 94576 dd35bb 94576->94571 94577 dd1c9d _free 47 API calls 94576->94577 94577->94571 94578->94555 94579->94558 94580->94558 94582 dd2c97 94581->94582 94586 dd2cbb 94581->94586 94583 dd2933 __fclose_nolock 47 API calls 94582->94583 94582->94586 94584 dd2cb4 94583->94584 94623 ddaf61 94584->94623 94587 ddeb36 94586->94587 94588 dd35af 94587->94588 94589 ddeb43 94587->94589 94591 dd2933 94588->94591 94589->94588 94590 dd1c9d _free 47 API calls 94589->94590 94590->94588 94592 dd293d 94591->94592 94593 dd2952 94591->94593 94648 dd7c0e 47 API calls __getptd_noexit 94592->94648 94593->94574 94595 dd2942 94649 dd6e10 8 API calls ___crtsetenv 94595->94649 94597 dd294d 94597->94574 94599 dde9de _fprintf 94598->94599 94600 dde9fe 94599->94600 94601 dde9e6 94599->94601 94603 ddea7b 94600->94603 94608 ddea28 94600->94608 94674 dd7bda 47 API calls __getptd_noexit 94601->94674 94678 dd7bda 47 API calls __getptd_noexit 94603->94678 94604 dde9eb 94675 dd7c0e 47 API calls __getptd_noexit 94604->94675 94607 ddea80 94679 dd7c0e 47 API calls __getptd_noexit 94607->94679 94650 dda8ed 94608->94650 94611 ddea88 94680 dd6e10 8 API calls ___crtsetenv 94611->94680 94612 ddea2e 94615 ddea4c 94612->94615 94616 ddea41 94612->94616 94614 dde9f3 _fprintf 94614->94576 94676 dd7c0e 47 API calls __getptd_noexit 94615->94676 94659 ddea9c 94616->94659 94619 ddea47 94677 ddea73 LeaveCriticalSection __unlock_fhandle 94619->94677 94621->94567 94622->94571 94624 ddaf6d _fprintf 94623->94624 94625 ddaf8d 94624->94625 94626 ddaf75 94624->94626 94628 ddb022 94625->94628 94631 ddafbf 94625->94631 94627 dd7bda __dosmaperr 47 API calls 94626->94627 94630 ddaf7a 94627->94630 94629 dd7bda __dosmaperr 47 API calls 94628->94629 94632 ddb027 94629->94632 94633 dd7c0e ___crtsetenv 47 API calls 94630->94633 94634 dda8ed ___lock_fhandle 49 API calls 94631->94634 94635 dd7c0e ___crtsetenv 47 API calls 94632->94635 94644 ddaf82 _fprintf 94633->94644 94636 ddafc5 94634->94636 94637 ddb02f 94635->94637 94638 ddafd8 94636->94638 94639 ddafeb 94636->94639 94640 dd6e10 ___crtsetenv 8 API calls 94637->94640 94641 ddb043 __chsize_nolock 75 API calls 94638->94641 94642 dd7c0e ___crtsetenv 47 API calls 94639->94642 94640->94644 94643 ddafe4 94641->94643 94645 ddaff0 94642->94645 94647 ddb01a __flush LeaveCriticalSection 94643->94647 94644->94586 94646 dd7bda __dosmaperr 47 API calls 94645->94646 94646->94643 94647->94644 94648->94595 94649->94597 94651 dda8f9 _fprintf 94650->94651 94652 dda946 EnterCriticalSection 94651->94652 94654 dd7cf4 __lock 47 API calls 94651->94654 94653 dda96c _fprintf 94652->94653 94653->94612 94655 dda91d 94654->94655 94656 dda928 InitializeCriticalSectionAndSpinCount 94655->94656 94657 dda93a 94655->94657 94656->94657 94658 dda970 ___lock_fhandle LeaveCriticalSection 94657->94658 94658->94652 94660 ddaba4 __chsize_nolock 47 API calls 94659->94660 94662 ddeaaa 94660->94662 94661 ddeb00 94663 ddab1e __free_osfhnd 48 API calls 94661->94663 94662->94661 94664 ddaba4 __chsize_nolock 47 API calls 94662->94664 94673 ddeade 94662->94673 94666 ddeb08 94663->94666 94667 ddead5 94664->94667 94665 ddaba4 __chsize_nolock 47 API calls 94668 ddeaea CloseHandle 94665->94668 94669 dd7bed __dosmaperr 47 API calls 94666->94669 94670 ddeb2a 94666->94670 94671 ddaba4 __chsize_nolock 47 API calls 94667->94671 94668->94661 94672 ddeaf6 GetLastError 94668->94672 94669->94670 94670->94619 94671->94673 94672->94661 94673->94661 94673->94665 94674->94604 94675->94614 94676->94619 94677->94614 94678->94607 94679->94611 94680->94614 94681->94122 94682->94129 94683->94139 94684->94139 94685->94140 94686->94153 94687->94155 94688->94152 94689->94160 94690->94162 94691->94180 94692->94175 94752 ddf8a0 94693->94752 94696 db6a63 48 API calls 94697 db6643 94696->94697 94754 db6571 94697->94754 94700 db40a7 94701 ddf8a0 __ftell_nolock 94700->94701 94702 db40b4 GetLongPathNameW 94701->94702 94703 db6a63 48 API calls 94702->94703 94704 db40dc 94703->94704 94705 db49a0 94704->94705 94706 dbd7f7 48 API calls 94705->94706 94707 db49b2 94706->94707 94708 db660f 49 API calls 94707->94708 94709 db49bd 94708->94709 94710 db49c8 94709->94710 94711 e22e35 94709->94711 94712 db64cf 48 API calls 94710->94712 94716 e22e4f 94711->94716 94768 dcd35e 60 API calls 94711->94768 94714 db49d4 94712->94714 94762 db28a6 94714->94762 94717 db49e7 Mailbox 94717->93925 94719 db41a9 136 API calls 94718->94719 94720 db415e 94719->94720 94721 e23489 94720->94721 94723 db41a9 136 API calls 94720->94723 94722 dfc396 122 API calls 94721->94722 94724 e2349e 94722->94724 94725 db4172 94723->94725 94726 e234a2 94724->94726 94727 e234bf 94724->94727 94725->94721 94728 db417a 94725->94728 94729 db4252 84 API calls 94726->94729 94730 dcf4ea 48 API calls 94727->94730 94731 e234aa 94728->94731 94732 db4186 94728->94732 94729->94731 94751 e23504 Mailbox 94730->94751 94870 df6b49 87 API calls _wprintf 94731->94870 94769 dbc833 94732->94769 94735 e234b8 94735->94727 94737 e236b4 94738 dd1c9d _free 47 API calls 94737->94738 94739 e236bc 94738->94739 94740 db4252 84 API calls 94739->94740 94745 e236c5 94740->94745 94744 dd1c9d _free 47 API calls 94744->94745 94745->94744 94747 db4252 84 API calls 94745->94747 94874 df25b5 86 API calls 4 library calls 94745->94874 94747->94745 94748 dbce19 48 API calls 94748->94751 94751->94737 94751->94745 94751->94748 94856 dbba85 94751->94856 94864 db4dd9 94751->94864 94871 df2551 48 API calls ___crtGetEnvironmentStringsW 94751->94871 94872 df2472 60 API calls 2 library calls 94751->94872 94873 df9c12 48 API calls 94751->94873 94753 db661c GetFullPathNameW 94752->94753 94753->94696 94755 db657f 94754->94755 94758 dbb18b 94755->94758 94757 db4114 94757->94700 94759 dbb199 94758->94759 94760 dbb1a2 ___crtGetEnvironmentStringsW 94758->94760 94759->94760 94761 dbbdfa 48 API calls 94759->94761 94760->94757 94761->94760 94763 db28b8 94762->94763 94767 db28d7 ___crtGetEnvironmentStringsW 94762->94767 94766 dcf4ea 48 API calls 94763->94766 94764 dcf4ea 48 API calls 94765 db28ee 94764->94765 94765->94717 94766->94767 94767->94764 94768->94711 94770 dbc843 __ftell_nolock 94769->94770 94771 e23095 94770->94771 94772 dbc860 94770->94772 94899 df25b5 86 API calls 4 library calls 94771->94899 94880 db48ba 49 API calls 94772->94880 94775 e230a8 94900 df25b5 86 API calls 4 library calls 94775->94900 94776 dbc882 94881 db4550 56 API calls 94776->94881 94778 dbc897 94778->94775 94779 dbc89f 94778->94779 94781 dbd7f7 48 API calls 94779->94781 94783 dbc8ab 94781->94783 94782 e230c4 94784 dbc90c 94782->94784 94882 dce968 49 API calls __ftell_nolock 94783->94882 94786 dbc91a 94784->94786 94787 e230d7 94784->94787 94885 dd1dfc 94786->94885 94790 db4907 CloseHandle 94787->94790 94788 dbc8b7 94791 dbd7f7 48 API calls 94788->94791 94792 e230e3 94790->94792 94793 dbc8c3 94791->94793 94794 db41a9 136 API calls 94792->94794 94795 db660f 49 API calls 94793->94795 94796 e2310d 94794->94796 94797 dbc8d1 94795->94797 94799 e23136 94796->94799 94802 dfc396 122 API calls 94796->94802 94883 dceb66 SetFilePointerEx ReadFile 94797->94883 94798 dbc943 _wcscat _wcscpy 94801 dbc96d SetCurrentDirectoryW 94798->94801 94901 df25b5 86 API calls 4 library calls 94799->94901 94805 dcf4ea 48 API calls 94801->94805 94806 e23129 94802->94806 94803 dbc8fd 94884 db46ce SetFilePointerEx SetFilePointerEx 94803->94884 94808 dbc988 94805->94808 94809 e23152 94806->94809 94810 e23131 94806->94810 94812 db47b7 48 API calls 94808->94812 94811 db4252 84 API calls 94809->94811 94813 db4252 84 API calls 94810->94813 94814 e23157 94811->94814 94843 dbc993 Mailbox __NMSG_WRITE 94812->94843 94813->94799 94816 dcf4ea 48 API calls 94814->94816 94815 dbcad1 Mailbox 94875 db48dd 94815->94875 94823 e23194 94816->94823 94817 dbca9d 94895 db4907 94817->94895 94821 db3d98 94821->93786 94821->93795 94822 dbcaa9 SetCurrentDirectoryW 94822->94815 94825 dbba85 48 API calls 94823->94825 94853 e231dd Mailbox 94825->94853 94827 e233ce 94906 df9b72 48 API calls 94827->94906 94828 e23467 94910 df25b5 86 API calls 4 library calls 94828->94910 94831 e23480 94831->94817 94833 e233f0 94907 e129e8 48 API calls ___crtGetEnvironmentStringsW 94833->94907 94835 e233fd 94836 dd1c9d _free 47 API calls 94835->94836 94836->94815 94838 e2345f 94909 df240b 48 API calls 3 library calls 94838->94909 94840 dbce19 48 API calls 94840->94843 94841 dbba85 48 API calls 94841->94853 94843->94817 94843->94828 94843->94838 94843->94840 94888 dbb337 56 API calls _wcscpy 94843->94888 94889 dcc258 GetStringTypeW 94843->94889 94890 dbcb93 59 API calls __wcsnicmp 94843->94890 94891 dbcb5a GetStringTypeW __NMSG_WRITE 94843->94891 94892 dd16d0 GetStringTypeW __towlower_l 94843->94892 94893 dbcc24 162 API calls 3 library calls 94843->94893 94894 dcc682 48 API calls 94843->94894 94847 dbce19 48 API calls 94847->94853 94850 e23420 94908 df25b5 86 API calls 4 library calls 94850->94908 94852 e23439 94854 dd1c9d _free 47 API calls 94852->94854 94853->94827 94853->94841 94853->94847 94853->94850 94902 df2551 48 API calls ___crtGetEnvironmentStringsW 94853->94902 94903 df2472 60 API calls 2 library calls 94853->94903 94904 df9c12 48 API calls 94853->94904 94905 dcc682 48 API calls 94853->94905 94855 e2314d 94854->94855 94855->94815 94857 dbbb25 94856->94857 94860 dbba98 ___crtGetEnvironmentStringsW 94856->94860 94859 dcf4ea 48 API calls 94857->94859 94858 dcf4ea 48 API calls 94861 dbba9f 94858->94861 94859->94860 94860->94858 94862 dcf4ea 48 API calls 94861->94862 94863 dbbac8 94861->94863 94862->94863 94863->94751 94865 db4dec 94864->94865 94867 db4e9a 94864->94867 94866 dcf4ea 48 API calls 94865->94866 94869 db4e1e 94865->94869 94866->94869 94867->94751 94868 dcf4ea 48 API calls 94868->94869 94869->94867 94869->94868 94870->94735 94871->94751 94872->94751 94873->94751 94874->94745 94876 db4907 CloseHandle 94875->94876 94877 db48e5 Mailbox 94876->94877 94878 db4907 CloseHandle 94877->94878 94879 db48fc 94878->94879 94879->94821 94880->94776 94881->94778 94882->94788 94883->94803 94884->94784 94911 dd1e46 94885->94911 94888->94843 94889->94843 94890->94843 94891->94843 94892->94843 94893->94843 94894->94843 94896 db4911 94895->94896 94897 db4920 94895->94897 94896->94822 94897->94896 94898 db4925 CloseHandle 94897->94898 94898->94896 94899->94775 94900->94782 94901->94855 94902->94853 94903->94853 94904->94853 94905->94853 94906->94833 94907->94835 94908->94852 94909->94828 94910->94831 94912 dd1e61 94911->94912 94915 dd1e55 94911->94915 94935 dd7c0e 47 API calls __getptd_noexit 94912->94935 94914 dd2019 94917 dd1e41 94914->94917 94936 dd6e10 8 API calls ___crtsetenv 94914->94936 94915->94912 94926 dd1ed4 94915->94926 94930 dd9d6b 47 API calls ___crtsetenv 94915->94930 94917->94798 94918 dd1f41 94920 dd1fa0 94918->94920 94921 dd1f5f 94918->94921 94920->94912 94920->94917 94922 dd1fb0 94920->94922 94921->94912 94927 dd1f7b 94921->94927 94932 dd9d6b 47 API calls ___crtsetenv 94921->94932 94934 dd9d6b 47 API calls ___crtsetenv 94922->94934 94925 dd1f91 94933 dd9d6b 47 API calls ___crtsetenv 94925->94933 94926->94912 94926->94918 94931 dd9d6b 47 API calls ___crtsetenv 94926->94931 94927->94912 94927->94917 94927->94925 94930->94926 94931->94918 94932->94927 94933->94917 94934->94917 94935->94914 94936->94917 94938 dcf4ea 48 API calls 94937->94938 94939 db6b54 94938->94939 94939->93937 94940->93932 94942 db4c8b 94941->94942 94943 db4d94 94941->94943 94942->94943 94944 dcf4ea 48 API calls 94942->94944 94943->93942 94945 db4cb2 94944->94945 94946 dcf4ea 48 API calls 94945->94946 94947 db4d22 94946->94947 94947->94943 94950 db4dd9 48 API calls 94947->94950 94951 dbba85 48 API calls 94947->94951 94954 dbb470 94947->94954 94982 df9af1 48 API calls 94947->94982 94950->94947 94951->94947 94952->93944 94953->93946 94983 db6b0f 94954->94983 94956 dbb69b 94957 dbba85 48 API calls 94956->94957 94958 dbb6b5 Mailbox 94957->94958 94958->94947 94961 e2397b 94998 df26bc 88 API calls 4 library calls 94961->94998 94962 e23939 ___crtGetEnvironmentStringsW 94997 df26bc 88 API calls 4 library calls 94962->94997 94963 dbb9e4 94999 df26bc 88 API calls 4 library calls 94963->94999 94966 e23973 94966->94958 94968 dbba85 48 API calls 94975 dbb495 94968->94975 94970 e23989 94972 dbba85 48 API calls 94970->94972 94971 dbbcce 48 API calls 94971->94975 94972->94966 94973 e23909 94974 db6b4a 48 API calls 94973->94974 94977 e23914 94974->94977 94975->94956 94975->94961 94975->94962 94975->94963 94975->94968 94975->94971 94975->94973 94979 dbbdfa 48 API calls 94975->94979 94988 dbc413 59 API calls 94975->94988 94989 dbbb85 94975->94989 94994 dbbc74 48 API calls 94975->94994 94995 dbc6a5 49 API calls 94975->94995 94996 dbc799 48 API calls ___crtGetEnvironmentStringsW 94975->94996 94981 dcf4ea 48 API calls 94977->94981 94980 dbb66c CharUpperBuffW 94979->94980 94980->94975 94981->94962 94982->94947 94984 dcf4ea 48 API calls 94983->94984 94985 db6b34 94984->94985 94986 db6b4a 48 API calls 94985->94986 94987 db6b43 94986->94987 94987->94975 94988->94975 94990 dbbb9b 94989->94990 94993 dbbb96 ___crtGetEnvironmentStringsW 94989->94993 94991 dcee75 48 API calls 94990->94991 94992 e21b77 94990->94992 94991->94993 94993->94975 94994->94975 94995->94975 94996->94975 94997->94966 94998->94970 94999->94966 95001 db403c LoadImageW 95000->95001 95002 e2418d EnumResourceNamesW 95000->95002 95003 db3ee1 RegisterClassExW 95001->95003 95002->95003 95004 db3f53 7 API calls 95003->95004 95004->93961 95006 dbf130 95005->95006 95009 dbfe30 335 API calls 95006->95009 95012 dbf199 95006->95012 95007 dbf3dd 95011 e287c8 95007->95011 95023 dbf3f2 95007->95023 95054 dbf431 Mailbox 95007->95054 95008 dbf595 95016 dbd7f7 48 API calls 95008->95016 95008->95054 95010 e28728 95009->95010 95010->95012 95212 dfcc5c 86 API calls 4 library calls 95010->95212 95215 dfcc5c 86 API calls 4 library calls 95011->95215 95012->95007 95012->95008 95018 dbd7f7 48 API calls 95012->95018 95051 dbf229 95012->95051 95013 dbfe30 335 API calls 95013->95054 95017 e287a3 95016->95017 95214 dd0f0a 52 API calls __cinit 95017->95214 95020 e28772 95018->95020 95019 e28b1b 95034 e28bcf 95019->95034 95035 e28b2c 95019->95035 95213 dd0f0a 52 API calls __cinit 95020->95213 95021 dfcc5c 86 API calls 95021->95054 95046 dbf418 95023->95046 95216 df9af1 48 API calls 95023->95216 95024 dbf770 95029 e28a45 95024->95029 95047 dbf77a 95024->95047 95026 dbd6e9 55 API calls 95026->95054 95028 dbfe30 335 API calls 95049 dbf6aa 95028->95049 95222 dcc1af 48 API calls 95029->95222 95030 e28b7e 95225 e0e40a 335 API calls Mailbox 95030->95225 95031 e28c53 95230 dfcc5c 86 API calls 4 library calls 95031->95230 95032 e28810 95217 e0eef8 335 API calls 95032->95217 95227 dfcc5c 86 API calls 4 library calls 95034->95227 95224 e0f5ee 335 API calls 95035->95224 95036 e28beb 95228 e0bdbd 335 API calls Mailbox 95036->95228 95042 dc1b90 48 API calls 95042->95054 95043 dc1b90 48 API calls 95043->95054 95046->95019 95046->95049 95046->95054 95047->95042 95048 e28c00 95069 dbf537 Mailbox 95048->95069 95229 dfcc5c 86 API calls 4 library calls 95048->95229 95049->95024 95049->95028 95050 dbfce0 95049->95050 95049->95054 95049->95069 95050->95069 95226 dfcc5c 86 API calls 4 library calls 95050->95226 95051->95007 95051->95008 95051->95046 95051->95054 95052 e28823 95052->95046 95055 e2884b 95052->95055 95054->95013 95054->95021 95054->95026 95054->95030 95054->95031 95054->95036 95054->95043 95054->95050 95054->95069 95211 dbdd47 48 API calls ___crtGetEnvironmentStringsW 95054->95211 95223 de97ed InterlockedDecrement 95054->95223 95231 dcc1af 48 API calls 95054->95231 95218 e0ccdc 48 API calls 95055->95218 95059 e28857 95061 e28865 95059->95061 95062 e288aa 95059->95062 95219 df9b72 48 API calls 95061->95219 95065 e288a0 Mailbox 95062->95065 95220 dfa69d 48 API calls 95062->95220 95063 dbfe30 335 API calls 95063->95069 95065->95063 95067 e288e7 95221 dbbc74 48 API calls 95067->95221 95069->93984 95071 dc479f 95070->95071 95072 dc4637 95070->95072 95075 dbce19 48 API calls 95071->95075 95073 e26e05 95072->95073 95074 dc4643 95072->95074 95286 e0e822 95073->95286 95285 dc4300 335 API calls ___crtGetEnvironmentStringsW 95074->95285 95082 dc46e4 Mailbox 95075->95082 95078 e26e11 95079 dc4739 Mailbox 95078->95079 95326 dfcc5c 86 API calls 4 library calls 95078->95326 95079->93984 95081 dc4659 95081->95078 95081->95079 95081->95082 95085 db4252 84 API calls 95082->95085 95232 e06ff0 95082->95232 95241 df6524 95082->95241 95244 dffa0c 95082->95244 95085->95079 95461 dbbd30 95087->95461 95089 dc3267 95090 dc32f8 95089->95090 95091 e2907a 95089->95091 95151 dc3628 95089->95151 95473 dcc36b 86 API calls 95090->95473 95479 dfcc5c 86 API calls 4 library calls 95091->95479 95096 e291fa 95484 dfcc5c 86 API calls 4 library calls 95096->95484 95097 dcc3c3 48 API calls 95147 dc34eb Mailbox ___crtGetEnvironmentStringsW 95097->95147 95098 dc3313 95098->95147 95098->95151 95153 e294df 95098->95153 95466 db2b7a 95098->95466 95102 e2926d 95488 dfcc5c 86 API calls 4 library calls 95102->95488 95103 e293c5 95106 dbfe30 335 API calls 95103->95106 95104 e2909a 95104->95096 95107 dbd645 53 API calls 95104->95107 95108 e29407 95106->95108 95109 e2910c 95107->95109 95118 dbd6e9 55 API calls 95108->95118 95108->95151 95113 e29220 95109->95113 95114 e29114 95109->95114 95111 dc33ce 95115 dc3465 95111->95115 95116 e2945e 95111->95116 95111->95147 95485 db1caa 49 API calls 95113->95485 95126 e29128 95114->95126 95131 e29152 95114->95131 95122 dcf4ea 48 API calls 95115->95122 95494 dfc942 50 API calls 95116->95494 95123 e29438 95118->95123 95137 dc346c 95122->95137 95493 dfcc5c 86 API calls 4 library calls 95123->95493 95124 e2923d 95127 e29252 95124->95127 95128 e2925e 95124->95128 95125 dbfe30 335 API calls 95125->95147 95480 dfcc5c 86 API calls 4 library calls 95126->95480 95486 dfcc5c 86 API calls 4 library calls 95127->95486 95487 dfcc5c 86 API calls 4 library calls 95128->95487 95134 e29177 95131->95134 95138 e29195 95131->95138 95481 e0f320 335 API calls 95134->95481 95141 dbe8d0 335 API calls 95137->95141 95143 dc351f 95137->95143 95139 e2918b 95138->95139 95482 e0f5ee 335 API calls 95138->95482 95139->95151 95483 dcc2d6 48 API calls ___crtGetEnvironmentStringsW 95139->95483 95141->95147 95142 dcf4ea 48 API calls 95142->95147 95145 db6eed 48 API calls 95143->95145 95146 dc3540 95143->95146 95145->95146 95146->95151 95152 e294b0 95146->95152 95156 dc3585 95146->95156 95147->95097 95147->95102 95147->95103 95147->95104 95147->95123 95147->95125 95147->95142 95147->95143 95148 e29394 95147->95148 95147->95151 95475 dbd9a0 53 API calls __cinit 95147->95475 95476 dbd8c0 53 API calls 95147->95476 95477 dcc2d6 48 API calls ___crtGetEnvironmentStringsW 95147->95477 95489 e0cda2 82 API calls Mailbox 95147->95489 95490 df80e3 53 API calls 95147->95490 95491 dbd764 55 API calls 95147->95491 95492 dbdcae 50 API calls Mailbox 95147->95492 95150 dcf4ea 48 API calls 95148->95150 95150->95103 95158 dc3635 Mailbox 95151->95158 95478 dfcc5c 86 API calls 4 library calls 95151->95478 95495 dbdcae 50 API calls Mailbox 95152->95495 95153->95151 95496 dfcc5c 86 API calls 4 library calls 95153->95496 95155 dc3615 95474 dbdcae 50 API calls Mailbox 95155->95474 95156->95151 95156->95153 95156->95155 95158->93984 95161 e2df42 95159->95161 95162 dce253 95159->95162 95160 e2df77 95161->95160 95163 e2df59 TranslateAcceleratorW 95161->95163 95162->93984 95163->95162 95165 dcdca3 95164->95165 95166 dcdc71 95164->95166 95165->93984 95166->95165 95167 dcdc96 IsDialogMessageW 95166->95167 95168 e2dd1d GetClassLongW 95166->95168 95167->95165 95167->95166 95168->95166 95168->95167 95169->93984 95170->93984 95171->93968 95172->93971 95173->93976 95174->93984 95175->93984 95176->94020 95177->94020 95178->94020 95180 dbfe50 95179->95180 95204 dbfe7e 95179->95204 95181 dcf4ea 48 API calls 95180->95181 95181->95204 95182 dc1473 95502 dfcc5c 86 API calls 4 library calls 95182->95502 95183 dc146e 95184 db6eed 48 API calls 95183->95184 95205 dbffe1 95184->95205 95185 dcf4ea 48 API calls 95185->95204 95186 dc0509 95503 dfcc5c 86 API calls 4 library calls 95186->95503 95190 e2a922 95190->93984 95191 e2a246 95193 db6eed 48 API calls 95191->95193 95193->95205 95195 db6eed 48 API calls 95195->95204 95196 dbd7f7 48 API calls 95196->95204 95197 e2a873 95197->93984 95198 e2a30e 95198->95205 95500 de97ed InterlockedDecrement 95198->95500 95199 dd0f0a 52 API calls __cinit 95199->95204 95200 de97ed InterlockedDecrement 95200->95204 95202 e2a973 95504 dfcc5c 86 API calls 4 library calls 95202->95504 95204->95182 95204->95183 95204->95185 95204->95186 95204->95191 95204->95195 95204->95196 95204->95198 95204->95199 95204->95200 95204->95202 95204->95205 95207 dc15b5 95204->95207 95498 dc1820 335 API calls 2 library calls 95204->95498 95499 dc1d10 59 API calls Mailbox 95204->95499 95205->93984 95206 e2a982 95501 dfcc5c 86 API calls 4 library calls 95207->95501 95208->94020 95209->94020 95210->94020 95211->95054 95212->95012 95213->95051 95214->95054 95215->95069 95216->95032 95217->95052 95218->95059 95219->95065 95220->95067 95221->95065 95222->95054 95223->95054 95224->95054 95225->95050 95226->95069 95227->95069 95228->95048 95229->95069 95230->95069 95231->95054 95327 db936c 95232->95327 95234 e0702a 95235 dbb470 91 API calls 95234->95235 95236 e0703a 95235->95236 95237 dbfe30 335 API calls 95236->95237 95238 e0705f 95236->95238 95237->95238 95240 e07063 95238->95240 95347 dbcdb9 48 API calls 95238->95347 95240->95079 95350 df6ca9 GetFileAttributesW 95241->95350 95245 dffa1c __ftell_nolock 95244->95245 95246 dffa44 95245->95246 95415 dbd286 48 API calls 95245->95415 95248 db936c 81 API calls 95246->95248 95249 dffa5e 95248->95249 95250 dffb68 95249->95250 95251 dffa80 95249->95251 95260 dffb92 95249->95260 95252 db41a9 136 API calls 95250->95252 95253 db936c 81 API calls 95251->95253 95254 dffb79 95252->95254 95258 dffa8c _wcscpy _wcschr 95253->95258 95255 dffb8e 95254->95255 95256 db41a9 136 API calls 95254->95256 95257 db936c 81 API calls 95255->95257 95255->95260 95256->95255 95259 dffbc7 95257->95259 95264 dffab0 _wcscat _wcscpy 95258->95264 95269 dffade _wcscat 95258->95269 95261 dd1dfc __wsplitpath 47 API calls 95259->95261 95260->95079 95265 dffbeb _wcscat _wcscpy 95261->95265 95262 db936c 81 API calls 95263 dffafc _wcscpy 95262->95263 95416 df72cb GetFileAttributesW 95263->95416 95267 db936c 81 API calls 95264->95267 95273 db936c 81 API calls 95265->95273 95267->95269 95268 db936c 81 API calls 95271 dffb48 95268->95271 95269->95262 95270 dffb1c __NMSG_WRITE 95270->95260 95270->95268 95417 df60dd 77 API calls 4 library calls 95271->95417 95275 dffc82 95273->95275 95274 dffb5c 95274->95260 95354 df690b 95275->95354 95277 dffca2 95278 df6524 3 API calls 95277->95278 95279 dffcb1 95278->95279 95280 db936c 81 API calls 95279->95280 95282 dffce2 95279->95282 95281 dffccb 95280->95281 95360 dfbfa4 95281->95360 95284 db4252 84 API calls 95282->95284 95284->95260 95285->95081 95287 e0e868 95286->95287 95288 e0e84e 95286->95288 95454 e0ccdc 48 API calls 95287->95454 95453 dfcc5c 86 API calls 4 library calls 95288->95453 95291 e0e871 95292 dbfe30 334 API calls 95291->95292 95293 e0e8cf 95292->95293 95294 e0e96a 95293->95294 95296 e0e916 95293->95296 95309 e0e860 Mailbox 95293->95309 95295 e0e978 95294->95295 95298 e0e9c7 95294->95298 95456 dfa69d 48 API calls 95295->95456 95455 df9b72 48 API calls 95296->95455 95301 db936c 81 API calls 95298->95301 95298->95309 95300 e0e949 95303 dc45e0 334 API calls 95300->95303 95304 e0e9e1 95301->95304 95302 e0e99b 95457 dbbc74 48 API calls 95302->95457 95303->95309 95306 dbbdfa 48 API calls 95304->95306 95308 e0ea05 CharUpperBuffW 95306->95308 95307 e0e9a3 Mailbox 95311 dc3200 334 API calls 95307->95311 95310 e0ea1f 95308->95310 95309->95078 95312 e0ea72 95310->95312 95313 e0ea26 95310->95313 95311->95309 95314 db936c 81 API calls 95312->95314 95458 df9b72 48 API calls 95313->95458 95315 e0ea7a 95314->95315 95459 db1caa 49 API calls 95315->95459 95318 e0ea54 95320 dc45e0 334 API calls 95318->95320 95319 e0ea84 95319->95309 95321 db936c 81 API calls 95319->95321 95320->95309 95322 e0ea9f 95321->95322 95460 dbbc74 48 API calls 95322->95460 95324 e0eaaf 95325 dc3200 334 API calls 95324->95325 95325->95309 95326->95079 95328 db9380 95327->95328 95329 db9384 95327->95329 95328->95234 95330 e24cbd __i64tow 95329->95330 95331 db9398 95329->95331 95332 e24bbf 95329->95332 95340 db93b0 __itow Mailbox _wcscpy 95329->95340 95348 dd172b 80 API calls 3 library calls 95331->95348 95333 e24ca5 95332->95333 95334 e24bc8 95332->95334 95349 dd172b 80 API calls 3 library calls 95333->95349 95339 e24be7 95334->95339 95334->95340 95337 dcf4ea 48 API calls 95338 db93ba 95337->95338 95338->95328 95342 dbce19 48 API calls 95338->95342 95341 dcf4ea 48 API calls 95339->95341 95340->95337 95343 e24c04 95341->95343 95342->95328 95344 dcf4ea 48 API calls 95343->95344 95345 e24c2a 95344->95345 95345->95328 95346 dbce19 48 API calls 95345->95346 95346->95328 95347->95240 95348->95340 95349->95340 95351 df6529 95350->95351 95352 df6cc4 FindFirstFileW 95350->95352 95351->95079 95352->95351 95353 df6cd9 FindClose 95352->95353 95353->95351 95355 df6918 _wcschr __ftell_nolock 95354->95355 95356 dd1dfc __wsplitpath 47 API calls 95355->95356 95359 df692e _wcscat _wcscpy 95355->95359 95357 df695d 95356->95357 95358 dd1dfc __wsplitpath 47 API calls 95357->95358 95358->95359 95359->95277 95361 dfbfb1 __ftell_nolock 95360->95361 95362 dcf4ea 48 API calls 95361->95362 95363 dfc00e 95362->95363 95364 db47b7 48 API calls 95363->95364 95365 dfc018 95364->95365 95366 dfbdb4 GetSystemTimeAsFileTime 95365->95366 95367 dfc023 95366->95367 95368 db4517 83 API calls 95367->95368 95369 dfc036 _wcscmp 95368->95369 95370 dfc05a 95369->95370 95371 dfc107 95369->95371 95372 dfc56d 94 API calls 95370->95372 95373 dfc56d 94 API calls 95371->95373 95374 dfc05f 95372->95374 95375 dfc0d3 _wcscat 95373->95375 95376 dd1dfc __wsplitpath 47 API calls 95374->95376 95380 dfc110 95374->95380 95378 db44ed 64 API calls 95375->95378 95375->95380 95377 dfc088 _wcscat _wcscpy 95376->95377 95384 dd1dfc __wsplitpath 47 API calls 95377->95384 95379 dfc12c 95378->95379 95381 db44ed 64 API calls 95379->95381 95380->95282 95382 dfc13c 95381->95382 95383 db44ed 64 API calls 95382->95383 95385 dfc157 95383->95385 95384->95375 95386 db44ed 64 API calls 95385->95386 95387 dfc167 95386->95387 95388 db44ed 64 API calls 95387->95388 95389 dfc182 95388->95389 95390 db44ed 64 API calls 95389->95390 95391 dfc192 95390->95391 95392 db44ed 64 API calls 95391->95392 95393 dfc1a2 95392->95393 95394 db44ed 64 API calls 95393->95394 95395 dfc1b2 95394->95395 95418 dfc71a GetTempPathW GetTempFileNameW 95395->95418 95397 dfc1be 95398 dd3499 117 API calls 95397->95398 95409 dfc1cf 95398->95409 95409->95380 95415->95246 95416->95270 95417->95274 95418->95397 95453->95309 95454->95291 95455->95300 95456->95302 95457->95307 95458->95318 95459->95319 95460->95324 95462 dbbd3f 95461->95462 95465 dbbd5a 95461->95465 95463 dbbdfa 48 API calls 95462->95463 95464 dbbd47 CharUpperBuffW 95463->95464 95464->95465 95465->95089 95467 db2b8b 95466->95467 95468 e2436a 95466->95468 95469 dcf4ea 48 API calls 95467->95469 95470 db2b92 95469->95470 95471 db2bb3 95470->95471 95497 db2bce 48 API calls 95470->95497 95471->95111 95473->95098 95474->95151 95475->95147 95476->95147 95477->95147 95478->95158 95479->95098 95480->95151 95481->95139 95482->95139 95483->95096 95484->95151 95485->95124 95486->95151 95487->95151 95488->95151 95489->95147 95490->95147 95491->95147 95492->95147 95493->95151 95494->95143 95495->95153 95496->95151 95497->95471 95498->95204 95499->95204 95500->95205 95501->95205 95502->95197 95503->95190 95504->95206 95506 db513f __NMSG_WRITE 95505->95506 95507 e21b27 95506->95507 95508 db5151 95506->95508 95510 db6b4a 48 API calls 95507->95510 95509 dbbb85 48 API calls 95508->95509 95511 db515e ___crtGetEnvironmentStringsW 95509->95511 95512 e21b34 95510->95512 95511->94047 95513 dcee75 48 API calls 95512->95513 95514 e21b57 ___crtGetEnvironmentStringsW 95513->95514 95516 dbb392 95515->95516 95523 dbb3c5 ___crtGetEnvironmentStringsW 95515->95523 95517 dbb3b8 95516->95517 95518 dbb3fd 95516->95518 95516->95523 95520 dbbb85 48 API calls 95517->95520 95519 dcf4ea 48 API calls 95518->95519 95521 dbb407 95519->95521 95520->95523 95522 dcf4ea 48 API calls 95521->95522 95522->95523 95523->94056 95524->94057 95525 e29c06 95536 dcd3be 95525->95536 95527 e29c1c 95529 e29c91 Mailbox 95527->95529 95545 db1caa 49 API calls 95527->95545 95530 dc3200 335 API calls 95529->95530 95531 e29cc5 95530->95531 95533 e2a7ab Mailbox 95531->95533 95547 dfcc5c 86 API calls 4 library calls 95531->95547 95534 e29c71 95534->95531 95546 dfb171 48 API calls 95534->95546 95537 dcd3dc 95536->95537 95538 dcd3ca 95536->95538 95540 dcd40b 95537->95540 95541 dcd3e2 95537->95541 95548 dbdcae 50 API calls Mailbox 95538->95548 95549 dbdcae 50 API calls Mailbox 95540->95549 95542 dcf4ea 48 API calls 95541->95542 95544 dcd3d4 95542->95544 95544->95527 95545->95534 95546->95529 95547->95533 95548->95544 95549->95544 95550 e219ba 95555 dcc75a 95550->95555 95554 e219c9 95556 dbd7f7 48 API calls 95555->95556 95557 dcc7c8 95556->95557 95563 dcd26c 95557->95563 95559 dcc865 95561 dcc881 95559->95561 95566 dcd1fa 48 API calls ___crtGetEnvironmentStringsW 95559->95566 95562 dd0f0a 52 API calls __cinit 95561->95562 95562->95554 95567 dcd298 95563->95567 95566->95559 95568 dcd28b 95567->95568 95569 dcd2a5 95567->95569 95568->95559 95569->95568 95570 dcd2ac RegOpenKeyExW 95569->95570 95570->95568 95571 dcd2c6 RegQueryValueExW 95570->95571 95572 dcd2fc RegCloseKey 95571->95572 95573 dcd2e7 95571->95573 95572->95568 95573->95572 95574 e219cb 95579 db2322 95574->95579 95576 e219d1 95612 dd0f0a 52 API calls __cinit 95576->95612 95578 e219db 95580 db2344 95579->95580 95613 db26df 95580->95613 95585 dbd7f7 48 API calls 95586 db2384 95585->95586 95587 dbd7f7 48 API calls 95586->95587 95588 db238e 95587->95588 95589 dbd7f7 48 API calls 95588->95589 95590 db2398 95589->95590 95591 dbd7f7 48 API calls 95590->95591 95592 db23de 95591->95592 95593 dbd7f7 48 API calls 95592->95593 95594 db24c1 95593->95594 95621 db263f 95594->95621 95598 db24f1 95599 dbd7f7 48 API calls 95598->95599 95600 db24fb 95599->95600 95650 db2745 95600->95650 95602 db2546 95603 db2556 GetStdHandle 95602->95603 95604 db25b1 95603->95604 95605 e2501d 95603->95605 95606 db25b7 CoInitialize 95604->95606 95605->95604 95607 e25026 95605->95607 95606->95576 95657 df92d4 53 API calls 95607->95657 95609 e2502d 95658 df99f9 CreateThread 95609->95658 95611 e25039 CloseHandle 95611->95606 95612->95578 95659 db2854 95613->95659 95616 db6a63 48 API calls 95617 db234a 95616->95617 95618 db272e 95617->95618 95673 db27ec 6 API calls 95618->95673 95620 db237a 95620->95585 95622 dbd7f7 48 API calls 95621->95622 95623 db264f 95622->95623 95624 dbd7f7 48 API calls 95623->95624 95625 db2657 95624->95625 95674 db26a7 95625->95674 95628 db26a7 48 API calls 95629 db2667 95628->95629 95630 dbd7f7 48 API calls 95629->95630 95631 db2672 95630->95631 95632 dcf4ea 48 API calls 95631->95632 95633 db24cb 95632->95633 95634 db22a4 95633->95634 95635 db22b2 95634->95635 95636 dbd7f7 48 API calls 95635->95636 95637 db22bd 95636->95637 95638 dbd7f7 48 API calls 95637->95638 95639 db22c8 95638->95639 95640 dbd7f7 48 API calls 95639->95640 95641 db22d3 95640->95641 95642 dbd7f7 48 API calls 95641->95642 95643 db22de 95642->95643 95644 db26a7 48 API calls 95643->95644 95645 db22e9 95644->95645 95646 dcf4ea 48 API calls 95645->95646 95647 db22f0 95646->95647 95648 db22f9 RegisterWindowMessageW 95647->95648 95649 e21fe7 95647->95649 95648->95598 95651 db2755 95650->95651 95652 e25f4d 95650->95652 95654 dcf4ea 48 API calls 95651->95654 95679 dfc942 50 API calls 95652->95679 95656 db275d 95654->95656 95655 e25f58 95656->95602 95657->95609 95658->95611 95680 df99df 54 API calls 95658->95680 95666 db2870 95659->95666 95662 db2870 48 API calls 95663 db2864 95662->95663 95664 dbd7f7 48 API calls 95663->95664 95665 db2716 95664->95665 95665->95616 95667 dbd7f7 48 API calls 95666->95667 95668 db287b 95667->95668 95669 dbd7f7 48 API calls 95668->95669 95670 db2883 95669->95670 95671 dbd7f7 48 API calls 95670->95671 95672 db285c 95671->95672 95672->95662 95673->95620 95675 dbd7f7 48 API calls 95674->95675 95676 db26b0 95675->95676 95677 dbd7f7 48 API calls 95676->95677 95678 db265f 95677->95678 95678->95628 95679->95655 95681 db3742 95682 db374b 95681->95682 95683 db3769 95682->95683 95684 db37c8 95682->95684 95722 db37c6 95682->95722 95685 db382c PostQuitMessage 95683->95685 95686 db3776 95683->95686 95688 e21e00 95684->95688 95689 db37ce 95684->95689 95713 db37b9 95685->95713 95693 e21e88 95686->95693 95694 db3781 95686->95694 95687 db37ab DefWindowProcW 95687->95713 95736 db2ff6 16 API calls 95688->95736 95690 db37d3 95689->95690 95691 db37f6 SetTimer RegisterWindowMessageW 95689->95691 95695 e21da3 95690->95695 95696 db37da KillTimer 95690->95696 95698 db381f CreatePopupMenu 95691->95698 95691->95713 95742 df4ddd 60 API calls _memset 95693->95742 95699 db3789 95694->95699 95700 db3836 95694->95700 95708 e21da8 95695->95708 95709 e21ddc MoveWindow 95695->95709 95733 db3847 Shell_NotifyIconW _memset 95696->95733 95697 e21e27 95737 dce312 335 API calls Mailbox 95697->95737 95698->95713 95704 e21e6d 95699->95704 95705 db3794 95699->95705 95726 dceb83 95700->95726 95704->95687 95741 dea5f3 48 API calls 95704->95741 95711 db379f 95705->95711 95712 e21e58 95705->95712 95706 e21e9a 95706->95687 95706->95713 95714 e21dcb SetFocus 95708->95714 95715 e21dac 95708->95715 95709->95713 95710 db37ed 95734 db390f DeleteObject DestroyWindow Mailbox 95710->95734 95711->95687 95738 db3847 Shell_NotifyIconW _memset 95711->95738 95740 df55bd 70 API calls _memset 95712->95740 95714->95713 95715->95711 95719 e21db5 95715->95719 95735 db2ff6 16 API calls 95719->95735 95721 e21e68 95721->95713 95722->95687 95724 e21e4c 95739 db4ffc 67 API calls _memset 95724->95739 95727 dcec1c 95726->95727 95728 dceb9a _memset 95726->95728 95727->95713 95743 db51af 95728->95743 95730 dcec05 KillTimer SetTimer 95730->95727 95731 dcebc1 95731->95730 95732 e23c7a Shell_NotifyIconW 95731->95732 95732->95730 95733->95710 95734->95713 95735->95713 95736->95697 95737->95711 95738->95724 95739->95722 95740->95721 95741->95722 95742->95706 95744 db51cb 95743->95744 95764 db52a2 Mailbox 95743->95764 95745 db6b0f 48 API calls 95744->95745 95746 db51d9 95745->95746 95747 e23ca1 LoadStringW 95746->95747 95748 db51e6 95746->95748 95751 e23cbb 95747->95751 95749 db6a63 48 API calls 95748->95749 95750 db51fb 95749->95750 95750->95751 95752 db520c 95750->95752 95753 db510d 48 API calls 95751->95753 95754 db52a7 95752->95754 95755 db5216 95752->95755 95758 e23cc5 95753->95758 95756 db6eed 48 API calls 95754->95756 95757 db510d 48 API calls 95755->95757 95761 db5220 _memset _wcscpy 95756->95761 95757->95761 95759 db518c 48 API calls 95758->95759 95758->95761 95760 e23ce7 95759->95760 95763 db518c 48 API calls 95760->95763 95762 db5288 Shell_NotifyIconW 95761->95762 95762->95764 95763->95761 95764->95731 95765 e2197b 95770 dcdd94 95765->95770 95769 e2198a 95771 dcf4ea 48 API calls 95770->95771 95772 dcdd9c 95771->95772 95773 dcddb0 95772->95773 95778 dcdf3d 95772->95778 95777 dd0f0a 52 API calls __cinit 95773->95777 95777->95769 95779 dcdda8 95778->95779 95780 dcdf46 95778->95780 95782 dcddc0 95779->95782 95810 dd0f0a 52 API calls __cinit 95780->95810 95783 dbd7f7 48 API calls 95782->95783 95784 dcddd7 GetVersionExW 95783->95784 95785 db6a63 48 API calls 95784->95785 95786 dcde1a 95785->95786 95811 dcdfb4 95786->95811 95789 db6571 48 API calls 95793 dcde2e 95789->95793 95792 e224c8 95793->95792 95815 dcdf77 95793->95815 95794 dcdea4 GetCurrentProcess 95824 dcdf5f LoadLibraryA GetProcAddress 95794->95824 95796 dcdf31 GetSystemInfo 95798 dcdf0e 95796->95798 95797 dcdee3 95818 dce00c 95797->95818 95800 dcdf1c FreeLibrary 95798->95800 95801 dcdf21 95798->95801 95800->95801 95801->95773 95803 dcdf29 GetSystemInfo 95806 dcdf03 95803->95806 95804 dcdef9 95821 dcdff4 95804->95821 95806->95798 95809 dcdf09 FreeLibrary 95806->95809 95807 dcdebb 95807->95796 95807->95797 95809->95798 95810->95779 95812 dcdfbd 95811->95812 95813 dbb18b 48 API calls 95812->95813 95814 dcde22 95813->95814 95814->95789 95825 dcdf89 95815->95825 95829 dce01e 95818->95829 95822 dce00c 2 API calls 95821->95822 95823 dcdf01 GetNativeSystemInfo 95822->95823 95823->95806 95824->95807 95826 dcdea0 95825->95826 95827 dcdf92 LoadLibraryA 95825->95827 95826->95794 95826->95807 95827->95826 95828 dcdfa3 GetProcAddress 95827->95828 95828->95826 95830 dcdef1 95829->95830 95831 dce027 LoadLibraryA 95829->95831 95830->95803 95830->95804 95831->95830 95832 dce038 GetProcAddress 95831->95832 95832->95830 95833 e28eb8 95837 dfa635 95833->95837 95835 e28ec3 95836 dfa635 84 API calls 95835->95836 95836->95835 95841 dfa642 95837->95841 95847 dfa66f 95837->95847 95838 dfa671 95849 dcec4e 81 API calls 95838->95849 95839 dfa676 95842 db936c 81 API calls 95839->95842 95841->95838 95841->95839 95845 dfa669 95841->95845 95841->95847 95843 dfa67d 95842->95843 95844 db510d 48 API calls 95843->95844 95844->95847 95848 dc4525 61 API calls ___crtGetEnvironmentStringsW 95845->95848 95847->95835 95848->95847 95849->95839 95850 e29bec 95872 dc0ae0 Mailbox ___crtGetEnvironmentStringsW 95850->95872 95852 dc1526 Mailbox 95946 dfcc5c 86 API calls 4 library calls 95852->95946 95855 dc15b5 95947 dfcc5c 86 API calls 4 library calls 95855->95947 95856 dc0509 95949 dfcc5c 86 API calls 4 library calls 95856->95949 95857 dc146e 95866 db6eed 48 API calls 95857->95866 95860 db6eed 48 API calls 95877 dbfec8 95860->95877 95862 dc1473 95948 dfcc5c 86 API calls 4 library calls 95862->95948 95863 dcf4ea 48 API calls 95863->95877 95864 e2a922 95865 e2a246 95868 db6eed 48 API calls 95865->95868 95878 dbffe1 Mailbox 95866->95878 95868->95878 95871 e2a873 95872->95852 95876 dbce19 48 API calls 95872->95876 95872->95877 95872->95878 95884 e0e822 335 API calls 95872->95884 95885 dbfe30 335 API calls 95872->95885 95886 e2a706 95872->95886 95888 dcf4ea 48 API calls 95872->95888 95889 de97ed InterlockedDecrement 95872->95889 95893 e10d09 95872->95893 95896 dfb55b 95872->95896 95900 e10d1d 95872->95900 95903 e0f0ac 95872->95903 95935 dfa6ef 95872->95935 95943 e0ef61 82 API calls 2 library calls 95872->95943 95873 e2a30e 95873->95878 95944 de97ed InterlockedDecrement 95873->95944 95874 de97ed InterlockedDecrement 95874->95877 95875 dbd7f7 48 API calls 95875->95877 95876->95872 95877->95855 95877->95856 95877->95857 95877->95860 95877->95862 95877->95863 95877->95865 95877->95873 95877->95874 95877->95875 95877->95878 95880 e2a973 95877->95880 95881 dd0f0a 52 API calls __cinit 95877->95881 95941 dc1820 335 API calls 2 library calls 95877->95941 95942 dc1d10 59 API calls Mailbox 95877->95942 95950 dfcc5c 86 API calls 4 library calls 95880->95950 95881->95877 95883 e2a982 95884->95872 95885->95872 95945 dfcc5c 86 API calls 4 library calls 95886->95945 95888->95872 95889->95872 95951 e0f8ae 95893->95951 95895 e10d19 95895->95872 95897 dfb569 95896->95897 95898 dfb564 95896->95898 95897->95872 96037 dfa4d5 95898->96037 95901 e0f8ae 129 API calls 95900->95901 95902 e10d2d 95901->95902 95902->95872 95904 dbd7f7 48 API calls 95903->95904 95905 e0f0c0 95904->95905 95906 dbd7f7 48 API calls 95905->95906 95907 e0f0c8 95906->95907 95908 dbd7f7 48 API calls 95907->95908 95909 e0f0d0 95908->95909 95910 db936c 81 API calls 95909->95910 95934 e0f0de 95910->95934 95911 db6a63 48 API calls 95911->95934 95912 e0f2cc 95913 e0f2f9 Mailbox 95912->95913 96060 db6b68 48 API calls 95912->96060 95913->95872 95915 e0f2b3 95919 db518c 48 API calls 95915->95919 95916 dbc799 48 API calls 95916->95934 95917 e0f2ce 95921 db518c 48 API calls 95917->95921 95918 db6eed 48 API calls 95918->95934 95920 e0f2c0 95919->95920 95924 db510d 48 API calls 95920->95924 95922 e0f2dd 95921->95922 95925 db510d 48 API calls 95922->95925 95923 dbbdfa 48 API calls 95927 e0f175 CharUpperBuffW 95923->95927 95924->95912 95925->95912 95926 dbbdfa 48 API calls 95928 e0f23a CharUpperBuffW 95926->95928 95929 dbd645 53 API calls 95927->95929 96059 dcd922 55 API calls 2 library calls 95928->96059 95929->95934 95931 db518c 48 API calls 95931->95934 95932 db936c 81 API calls 95932->95934 95933 db510d 48 API calls 95933->95934 95934->95911 95934->95912 95934->95913 95934->95915 95934->95916 95934->95917 95934->95918 95934->95923 95934->95926 95934->95931 95934->95932 95934->95933 95936 dfa6fb 95935->95936 95937 dcf4ea 48 API calls 95936->95937 95938 dfa709 95937->95938 95939 dbd7f7 48 API calls 95938->95939 95940 dfa717 95938->95940 95939->95940 95940->95872 95941->95877 95942->95877 95943->95872 95944->95878 95945->95852 95946->95878 95947->95878 95948->95871 95949->95864 95950->95883 95952 db936c 81 API calls 95951->95952 95953 e0f8ea 95952->95953 95977 e0f92c Mailbox 95953->95977 95987 e10567 95953->95987 95955 e0fb8b 95956 e0fcfa 95955->95956 95960 e0fb95 95955->95960 96023 e10688 89 API calls Mailbox 95956->96023 95959 e0fd07 95959->95960 95962 e0fd13 95959->95962 96000 e0f70a 95960->96000 95961 db936c 81 API calls 95982 e0f984 Mailbox 95961->95982 95962->95977 95967 e0fbc9 96014 dced18 95967->96014 95970 e0fbe3 96020 dfcc5c 86 API calls 4 library calls 95970->96020 95971 e0fbfd 95973 dcc050 48 API calls 95971->95973 95975 e0fc14 95973->95975 95974 e0fbee GetCurrentProcess TerminateProcess 95974->95971 95978 dc1b90 48 API calls 95975->95978 95986 e0fc3e 95975->95986 95976 e0fd65 95976->95977 95983 e0fd7e FreeLibrary 95976->95983 95977->95895 95979 e0fc2d 95978->95979 96021 e1040f 105 API calls _free 95979->96021 95981 dc1b90 48 API calls 95981->95986 95982->95955 95982->95961 95982->95977 95982->95982 96018 e129e8 48 API calls ___crtGetEnvironmentStringsW 95982->96018 96019 e0fda5 60 API calls 2 library calls 95982->96019 95983->95977 95986->95976 95986->95981 96022 dbdcae 50 API calls Mailbox 95986->96022 96024 e1040f 105 API calls _free 95986->96024 95988 dbbdfa 48 API calls 95987->95988 95989 e10582 CharLowerBuffW 95988->95989 96025 df1f11 95989->96025 95993 dbd7f7 48 API calls 95994 e105bb 95993->95994 96032 db69e9 48 API calls ___crtGetEnvironmentStringsW 95994->96032 95996 e105d2 95997 dbb18b 48 API calls 95996->95997 95998 e105de Mailbox 95997->95998 95999 e1061a Mailbox 95998->95999 96033 e0fda5 60 API calls 2 library calls 95998->96033 95999->95982 96001 e0f725 96000->96001 96005 e0f77a 96000->96005 96002 dcf4ea 48 API calls 96001->96002 96003 e0f747 96002->96003 96004 dcf4ea 48 API calls 96003->96004 96003->96005 96004->96003 96006 e10828 96005->96006 96007 e10a53 Mailbox 96006->96007 96013 e1084b _strcat _wcscpy __NMSG_WRITE 96006->96013 96007->95967 96008 dbd286 48 API calls 96008->96013 96009 dbcf93 58 API calls 96009->96013 96010 db936c 81 API calls 96010->96013 96011 dd395c 47 API calls std::exception::_Copy_str 96011->96013 96013->96007 96013->96008 96013->96009 96013->96010 96013->96011 96036 df8035 50 API calls __NMSG_WRITE 96013->96036 96015 dced2d 96014->96015 96016 dcedc5 VirtualProtect 96015->96016 96017 dced93 96015->96017 96016->96017 96017->95970 96017->95971 96018->95982 96019->95982 96020->95974 96021->95986 96022->95986 96023->95959 96024->95986 96027 df1f3b __NMSG_WRITE 96025->96027 96026 df1f79 96026->95993 96026->95998 96027->96026 96028 df1ffa 96027->96028 96030 df1f6f 96027->96030 96028->96026 96035 dcd37a 60 API calls 96028->96035 96030->96026 96034 dcd37a 60 API calls 96030->96034 96032->95996 96033->95999 96034->96030 96035->96028 96036->96013 96038 dfa4ec 96037->96038 96039 dfa5ee 96037->96039 96040 dfa5d4 Mailbox 96038->96040 96042 dfa58b 96038->96042 96045 dfa4fd 96038->96045 96039->95897 96041 dcf4ea 48 API calls 96040->96041 96056 dfa54c Mailbox ___crtGetEnvironmentStringsW 96041->96056 96043 dcf4ea 48 API calls 96042->96043 96043->96056 96044 dfa51a 96047 dfa555 96044->96047 96048 dfa545 96044->96048 96044->96056 96045->96044 96046 dcf4ea 48 API calls 96045->96046 96046->96044 96051 dcf4ea 48 API calls 96047->96051 96050 dcf4ea 48 API calls 96048->96050 96049 dcf4ea 48 API calls 96049->96039 96050->96056 96052 dfa55b 96051->96052 96057 df9d2d 48 API calls 96052->96057 96054 dfa567 96058 dce65e 50 API calls 96054->96058 96056->96049 96057->96054 96058->96056 96059->95934 96060->95913 96061 e219dd 96066 db4a30 96061->96066 96063 e219f1 96086 dd0f0a 52 API calls __cinit 96063->96086 96065 e219fb 96067 db4a40 __ftell_nolock 96066->96067 96068 dbd7f7 48 API calls 96067->96068 96069 db4af6 96068->96069 96070 db5374 50 API calls 96069->96070 96071 db4aff 96070->96071 96087 db363c 96071->96087 96074 db518c 48 API calls 96075 db4b18 96074->96075 96076 db64cf 48 API calls 96075->96076 96077 db4b29 96076->96077 96078 dbd7f7 48 API calls 96077->96078 96079 db4b32 96078->96079 96093 db49fb 96079->96093 96081 db4b43 Mailbox 96081->96063 96082 db61a6 48 API calls 96085 db4b3d _wcscat Mailbox __NMSG_WRITE 96082->96085 96083 dbce19 48 API calls 96083->96085 96084 db64cf 48 API calls 96084->96085 96085->96081 96085->96082 96085->96083 96085->96084 96086->96065 96088 db3649 __ftell_nolock 96087->96088 96107 db366c GetFullPathNameW 96088->96107 96090 db365a 96091 db6a63 48 API calls 96090->96091 96092 db3669 96091->96092 96092->96074 96109 dbbcce 96093->96109 96096 db4a2b 96096->96085 96097 e241cc RegQueryValueExW 96098 e24246 RegCloseKey 96097->96098 96099 e241e5 96097->96099 96100 dcf4ea 48 API calls 96099->96100 96101 e241fe 96100->96101 96102 db47b7 48 API calls 96101->96102 96103 e24208 RegQueryValueExW 96102->96103 96104 e24224 96103->96104 96106 e2423b 96103->96106 96105 db6a63 48 API calls 96104->96105 96105->96106 96106->96098 96108 db368a 96107->96108 96108->96090 96110 db4a0a RegOpenKeyExW 96109->96110 96111 dbbce8 96109->96111 96110->96096 96110->96097 96112 dcf4ea 48 API calls 96111->96112 96113 dbbcf2 96112->96113 96114 dcee75 48 API calls 96113->96114 96114->96110 96115 1677098 96129 1674ce8 96115->96129 96117 1677166 96132 1676f88 96117->96132 96135 1678198 GetPEB 96129->96135 96131 1675373 96131->96117 96133 1676f91 Sleep 96132->96133 96134 1676f9f 96133->96134 96136 16781c2 96135->96136 96136->96131

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 644 ddb043-ddb080 call ddf8a0 647 ddb089-ddb08b 644->647 648 ddb082-ddb084 644->648 650 ddb08d-ddb0a7 call dd7bda call dd7c0e call dd6e10 647->650 651 ddb0ac-ddb0d9 647->651 649 ddb860-ddb86c call dda70c 648->649 650->649 652 ddb0db-ddb0de 651->652 653 ddb0e0-ddb0e7 651->653 652->653 656 ddb10b-ddb110 652->656 657 ddb0e9-ddb100 call dd7bda call dd7c0e call dd6e10 653->657 658 ddb105 653->658 661 ddb11f-ddb12d call de3bf2 656->661 662 ddb112-ddb11c call ddf82f 656->662 693 ddb851-ddb854 657->693 658->656 674 ddb44b-ddb45d 661->674 675 ddb133-ddb145 661->675 662->661 678 ddb7b8-ddb7d5 WriteFile 674->678 679 ddb463-ddb473 674->679 675->674 677 ddb14b-ddb183 call dd7a0d GetConsoleMode 675->677 677->674 700 ddb189-ddb18f 677->700 681 ddb7d7-ddb7df 678->681 682 ddb7e1-ddb7e7 GetLastError 678->682 684 ddb479-ddb484 679->684 685 ddb55a-ddb55f 679->685 687 ddb7e9 681->687 682->687 691 ddb81b-ddb833 684->691 692 ddb48a-ddb49a 684->692 688 ddb565-ddb56e 685->688 689 ddb663-ddb66e 685->689 697 ddb7ef-ddb7f1 687->697 688->691 698 ddb574 688->698 689->691 696 ddb674 689->696 694 ddb83e-ddb84e call dd7c0e call dd7bda 691->694 695 ddb835-ddb838 691->695 701 ddb4a0-ddb4a3 692->701 699 ddb85e-ddb85f 693->699 694->693 695->694 702 ddb83a-ddb83c 695->702 703 ddb67e-ddb693 696->703 705 ddb856-ddb85c 697->705 706 ddb7f3-ddb7f5 697->706 707 ddb57e-ddb595 698->707 699->649 708 ddb199-ddb1bc GetConsoleCP 700->708 709 ddb191-ddb193 700->709 710 ddb4e9-ddb520 WriteFile 701->710 711 ddb4a5-ddb4be 701->711 702->699 713 ddb699-ddb69b 703->713 705->699 706->691 715 ddb7f7-ddb7fc 706->715 716 ddb59b-ddb59e 707->716 717 ddb440-ddb446 708->717 718 ddb1c2-ddb1ca 708->718 709->674 709->708 710->682 712 ddb526-ddb538 710->712 719 ddb4cb-ddb4e7 711->719 720 ddb4c0-ddb4ca 711->720 712->697 721 ddb53e-ddb54f 712->721 722 ddb69d-ddb6b3 713->722 723 ddb6d8-ddb719 WideCharToMultiByte 713->723 725 ddb7fe-ddb810 call dd7c0e call dd7bda 715->725 726 ddb812-ddb819 call dd7bed 715->726 727 ddb5de-ddb627 WriteFile 716->727 728 ddb5a0-ddb5b6 716->728 717->706 729 ddb1d4-ddb1d6 718->729 719->701 719->710 720->719 721->692 730 ddb555 721->730 731 ddb6b5-ddb6c4 722->731 732 ddb6c7-ddb6d6 722->732 723->682 734 ddb71f-ddb721 723->734 725->693 726->693 727->682 739 ddb62d-ddb645 727->739 736 ddb5cd-ddb5dc 728->736 737 ddb5b8-ddb5ca 728->737 740 ddb1dc-ddb1fe 729->740 741 ddb36b-ddb36e 729->741 730->697 731->732 732->713 732->723 746 ddb727-ddb75a WriteFile 734->746 736->716 736->727 737->736 739->697 749 ddb64b-ddb658 739->749 742 ddb217-ddb223 call dd1688 740->742 743 ddb200-ddb215 740->743 744 ddb375-ddb3a2 741->744 745 ddb370-ddb373 741->745 764 ddb269-ddb26b 742->764 765 ddb225-ddb239 742->765 750 ddb271-ddb283 call de40f7 743->750 752 ddb3a8-ddb3ab 744->752 745->744 745->752 753 ddb75c-ddb776 746->753 754 ddb77a-ddb78e GetLastError 746->754 749->707 756 ddb65e 749->756 774 ddb289 750->774 775 ddb435-ddb43b 750->775 758 ddb3ad-ddb3b0 752->758 759 ddb3b2-ddb3c5 call de5884 752->759 753->746 761 ddb778 753->761 763 ddb794-ddb796 754->763 756->697 758->759 766 ddb407-ddb40a 758->766 759->682 778 ddb3cb-ddb3d5 759->778 761->763 763->687 769 ddb798-ddb7b0 763->769 764->750 771 ddb23f-ddb254 call de40f7 765->771 772 ddb412-ddb42d 765->772 766->729 770 ddb410 766->770 769->703 776 ddb7b6 769->776 770->775 771->775 785 ddb25a-ddb267 771->785 772->775 779 ddb28f-ddb2c4 WideCharToMultiByte 774->779 775->687 776->697 781 ddb3fb-ddb401 778->781 782 ddb3d7-ddb3ee call de5884 778->782 779->775 783 ddb2ca-ddb2f0 WriteFile 779->783 781->766 782->682 789 ddb3f4-ddb3f5 782->789 783->682 784 ddb2f6-ddb30e 783->784 784->775 788 ddb314-ddb31b 784->788 785->779 788->781 790 ddb321-ddb34c WriteFile 788->790 789->781 790->682 791 ddb352-ddb359 790->791 791->775 792 ddb35f-ddb366 791->792 792->781
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 3a14d074085bc4c462fa3b3e1fd0d365fc10ff3b8f1c069e0d8c16ab04273356
            • Instruction ID: 0f5729ae43fa537415a2e2d54d088c932287668401a5ae6fc51ad69c6558ecaa
            • Opcode Fuzzy Hash: 3a14d074085bc4c462fa3b3e1fd0d365fc10ff3b8f1c069e0d8c16ab04273356
            • Instruction Fuzzy Hash: EC324C75A02269CFCB24CF55DC816E9B7B5FB46324F5940DAE40AA7B81D7309E80CF62

            Control-flow Graph

            APIs
            • GetCurrentDirectoryW.KERNEL32(00007FFF,?,00000000,00000001,?,?,00DB3AA3,?), ref: 00DB3D45
            • IsDebuggerPresent.KERNEL32(?,?,?,?,00DB3AA3,?), ref: 00DB3D57
            • GetFullPathNameW.KERNEL32(00007FFF,?,?,00E71148,00E71130,?,?,?,?,00DB3AA3,?), ref: 00DB3DC8
              • Part of subcall function 00DB6430: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,00DB3DEE,00E71148,?,?,?,?,?,00DB3AA3,?), ref: 00DB6471
            • SetCurrentDirectoryW.KERNEL32(?,?,?,00DB3AA3,?), ref: 00DB3E48
            • MessageBoxA.USER32(00000000,This is a third-party compiled AutoIt script.,00E628F4,00000010), ref: 00E21CCE
            • SetCurrentDirectoryW.KERNEL32(?,00E71148,?,?,?,?,?,00DB3AA3,?), ref: 00E21D06
            • GetForegroundWindow.USER32(runas,?,?,?,00000001,?,00E4DAB4,00E71148,?,?,?,?,?,00DB3AA3,?), ref: 00E21D89
            • ShellExecuteW.SHELL32(00000000,?,?,?,?,00DB3AA3), ref: 00E21D90
              • Part of subcall function 00DB3E6E: GetSysColorBrush.USER32(0000000F), ref: 00DB3E79
              • Part of subcall function 00DB3E6E: LoadCursorW.USER32(00000000,00007F00), ref: 00DB3E88
              • Part of subcall function 00DB3E6E: LoadIconW.USER32(00000063), ref: 00DB3E9E
              • Part of subcall function 00DB3E6E: LoadIconW.USER32(000000A4), ref: 00DB3EB0
              • Part of subcall function 00DB3E6E: LoadIconW.USER32(000000A2), ref: 00DB3EC2
              • Part of subcall function 00DB3E6E: RegisterClassExW.USER32(?), ref: 00DB3F30
              • Part of subcall function 00DB36B8: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00DB36E6
              • Part of subcall function 00DB36B8: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00DB3707
              • Part of subcall function 00DB36B8: ShowWindow.USER32(00000000,?,?,?,?,00DB3AA3,?), ref: 00DB371B
              • Part of subcall function 00DB36B8: ShowWindow.USER32(00000000,?,?,?,?,00DB3AA3,?), ref: 00DB3724
              • Part of subcall function 00DB4FFC: _memset.LIBCMT ref: 00DB5022
              • Part of subcall function 00DB4FFC: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00DB50CB
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: Window$IconLoad$CurrentDirectory$CreateFullNamePathShow$BrushClassColorCursorDebuggerExecuteForegroundMessageNotifyPresentRegisterShellShell__memset
            • String ID: ()$This is a third-party compiled AutoIt script.$runas
            • API String ID: 438480954-3074634049
            • Opcode ID: a699fe6e1249895c0352ddc50399421993ff83b10412319854d27da7ceebd3b3
            • Instruction ID: 16e076784c160b330fff8eb2cceb9683cde1ca46d19fd81999b17dc94670115f
            • Opcode Fuzzy Hash: a699fe6e1249895c0352ddc50399421993ff83b10412319854d27da7ceebd3b3
            • Instruction Fuzzy Hash: 0C512530A05348EECF11EBB9EC06EED7B75EB55740F0051A9F60776192DA708A49DB31

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 1076 dcddc0-dcde4f call dbd7f7 GetVersionExW call db6a63 call dcdfb4 call db6571 1085 dcde55-dcde56 1076->1085 1086 e224c8-e224cb 1076->1086 1089 dcde58-dcde63 1085->1089 1090 dcde92-dcdea2 call dcdf77 1085->1090 1087 e224e4-e224e8 1086->1087 1088 e224cd 1086->1088 1093 e224d3-e224dc 1087->1093 1094 e224ea-e224f3 1087->1094 1092 e224d0 1088->1092 1095 dcde69-dcde6b 1089->1095 1096 e2244e-e22454 1089->1096 1105 dcdea4-dcdec1 GetCurrentProcess call dcdf5f 1090->1105 1106 dcdec7-dcdee1 1090->1106 1092->1093 1093->1087 1094->1092 1100 e224f5-e224f8 1094->1100 1101 e22469-e22475 1095->1101 1102 dcde71-dcde74 1095->1102 1098 e22456-e22459 1096->1098 1099 e2245e-e22464 1096->1099 1098->1090 1099->1090 1100->1093 1107 e22477-e2247a 1101->1107 1108 e2247f-e22485 1101->1108 1103 dcde7a-dcde89 1102->1103 1104 e22495-e22498 1102->1104 1109 dcde8f 1103->1109 1110 e2248a-e22490 1103->1110 1104->1090 1111 e2249e-e224b3 1104->1111 1105->1106 1128 dcdec3 1105->1128 1113 dcdf31-dcdf3b GetSystemInfo 1106->1113 1114 dcdee3-dcdef7 call dce00c 1106->1114 1107->1090 1108->1090 1109->1090 1110->1090 1115 e224b5-e224b8 1111->1115 1116 e224bd-e224c3 1111->1116 1118 dcdf0e-dcdf1a 1113->1118 1124 dcdf29-dcdf2f GetSystemInfo 1114->1124 1125 dcdef9-dcdf01 call dcdff4 GetNativeSystemInfo 1114->1125 1115->1090 1116->1090 1120 dcdf1c-dcdf1f FreeLibrary 1118->1120 1121 dcdf21-dcdf26 1118->1121 1120->1121 1127 dcdf03-dcdf07 1124->1127 1125->1127 1127->1118 1130 dcdf09-dcdf0c FreeLibrary 1127->1130 1128->1106 1130->1118
            APIs
            • GetVersionExW.KERNEL32(?), ref: 00DCDDEC
            • GetCurrentProcess.KERNEL32(00000000,00E4DC38,?,?), ref: 00DCDEAC
            • GetNativeSystemInfo.KERNELBASE(?,00E4DC38,?,?), ref: 00DCDF01
            • FreeLibrary.KERNEL32(00000000,?,?), ref: 00DCDF0C
            • FreeLibrary.KERNEL32(00000000,?,?), ref: 00DCDF1F
            • GetSystemInfo.KERNEL32(?,00E4DC38,?,?), ref: 00DCDF29
            • GetSystemInfo.KERNEL32(?,00E4DC38,?,?), ref: 00DCDF35
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: InfoSystem$FreeLibrary$CurrentNativeProcessVersion
            • String ID:
            • API String ID: 3851250370-0
            • Opcode ID: 5f650f6dfcfe9e4ba2234b399e3c1e941cc365542b1842636c3a95b12d42c689
            • Instruction ID: e0edc0f740eceb37b8c900eabf6a5af438f1611c5da3787c1b0a5bcc4a76a108
            • Opcode Fuzzy Hash: 5f650f6dfcfe9e4ba2234b399e3c1e941cc365542b1842636c3a95b12d42c689
            • Instruction Fuzzy Hash: C861D0B180A2D5DFCF11DF6898C06EA7FB5AF29300B1949ECD885AF207C624C909CB75

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 1148 db406b-db4083 CreateStreamOnHGlobal 1149 db40a3-db40a6 1148->1149 1150 db4085-db409c FindResourceExW 1148->1150 1151 e24f16-e24f25 LoadResource 1150->1151 1152 db40a2 1150->1152 1151->1152 1153 e24f2b-e24f39 SizeofResource 1151->1153 1152->1149 1153->1152 1154 e24f3f-e24f4a LockResource 1153->1154 1154->1152 1155 e24f50-e24f6e 1154->1155 1155->1152
            APIs
            • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?,?,?,?,?,00DB449E,?,?,00000000,00000001), ref: 00DB407B
            • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,00DB449E,?,?,00000000,00000001), ref: 00DB4092
            • LoadResource.KERNEL32(?,00000000,?,?,00DB449E,?,?,00000000,00000001,?,?,?,?,?,?,00DB41FB), ref: 00E24F1A
            • SizeofResource.KERNEL32(?,00000000,?,?,00DB449E,?,?,00000000,00000001,?,?,?,?,?,?,00DB41FB), ref: 00E24F2F
            • LockResource.KERNEL32(00DB449E,?,?,00DB449E,?,?,00000000,00000001,?,?,?,?,?,?,00DB41FB,00000000), ref: 00E24F42
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
            • String ID: SCRIPT
            • API String ID: 3051347437-3967369404
            • Opcode ID: 11b196628376be69355d3e6fe95969db67dcd46537cdac11c6e26b9bf14e6da7
            • Instruction ID: 0dd4661320b8cde54bee2d3d5c7168d287c24e7b39513da859733d0739d59410
            • Opcode Fuzzy Hash: 11b196628376be69355d3e6fe95969db67dcd46537cdac11c6e26b9bf14e6da7
            • Instruction Fuzzy Hash: 7C117970204705BFE7259B26EC48F677BB9EBC5B51F24852CF602A62A0DB71DC048A31
            APIs
            • GetFileAttributesW.KERNELBASE(?,I/), ref: 00DF6CB9
            • FindFirstFileW.KERNELBASE(?,?), ref: 00DF6CCA
            • FindClose.KERNEL32(00000000), ref: 00DF6CDA
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: FileFind$AttributesCloseFirst
            • String ID: I/
            • API String ID: 48322524-530815126
            • Opcode ID: ce8f70be8149979538f59ad4b33973f62467884c4202a9d30170ef0103bb5269
            • Instruction ID: 28592a5354548be61ceeaed7c75c16459be5a288e0ce4c28964777213933b3a4
            • Opcode Fuzzy Hash: ce8f70be8149979538f59ad4b33973f62467884c4202a9d30170ef0103bb5269
            • Instruction Fuzzy Hash: D4E0D8318194195B82106738FC0D4F93F6CDF05339F104705F5B1D11D0E770D94446E5
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: BuffCharUpper
            • String ID:
            • API String ID: 3964851224-3209568608
            • Opcode ID: fd36882584297e7cbec94b97474be35622870002bc0ff1e36bf045c2d40cdf4e
            • Instruction ID: 9900fb29a954f5874014edf916c30cd9f49cde3d192447d84659850da0843bf4
            • Opcode Fuzzy Hash: fd36882584297e7cbec94b97474be35622870002bc0ff1e36bf045c2d40cdf4e
            • Instruction Fuzzy Hash: 989236706083429FD724DF18C484F6ABBE1FF88308F14985DE99A9B262D771ED45CB62
            APIs
            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00DBE959
            • timeGetTime.WINMM ref: 00DBEBFA
            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00DBED2E
            • TranslateMessage.USER32(?), ref: 00DBED3F
            • DispatchMessageW.USER32(?), ref: 00DBED4A
            • LockWindowUpdate.USER32(00000000), ref: 00DBED79
            • DestroyWindow.USER32 ref: 00DBED85
            • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00DBED9F
            • Sleep.KERNEL32(0000000A), ref: 00E25270
            • TranslateMessage.USER32(?), ref: 00E259F7
            • DispatchMessageW.USER32(?), ref: 00E25A05
            • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00E25A19
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: Message$DispatchPeekTranslateWindow$DestroyLockSleepTimeUpdatetime
            • String ID: @GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE$@TRAY_ID
            • API String ID: 2641332412-570651680
            • Opcode ID: a69bee04af9822f23a13523220d0622d4d39dd6c0fc8516fa2637abb0d9df4b6
            • Instruction ID: b8064908ba3edbc9e8c479ab1da90253200c9620ad715261de8c3238e762d2e9
            • Opcode Fuzzy Hash: a69bee04af9822f23a13523220d0622d4d39dd6c0fc8516fa2637abb0d9df4b6
            • Instruction Fuzzy Hash: 38629D71508340DFDB24DF24D985BEA77E4FB44304F08596DE98AAB292DB71D888CB72
            APIs
            • ___createFile.LIBCMT ref: 00DE5EC3
            • ___createFile.LIBCMT ref: 00DE5F04
            • GetLastError.KERNEL32(?,?,?,?,?,00000000,00000109), ref: 00DE5F2D
            • __dosmaperr.LIBCMT ref: 00DE5F34
            • GetFileType.KERNELBASE(00000000,?,?,?,?,?,00000000,00000109), ref: 00DE5F47
            • GetLastError.KERNEL32(?,?,?,?,?,00000000,00000109), ref: 00DE5F6A
            • __dosmaperr.LIBCMT ref: 00DE5F73
            • CloseHandle.KERNEL32(00000000,?,?,?,?,?,00000000,00000109), ref: 00DE5F7C
            • __set_osfhnd.LIBCMT ref: 00DE5FAC
            • __lseeki64_nolock.LIBCMT ref: 00DE6016
            • __close_nolock.LIBCMT ref: 00DE603C
            • __chsize_nolock.LIBCMT ref: 00DE606C
            • __lseeki64_nolock.LIBCMT ref: 00DE607E
            • __lseeki64_nolock.LIBCMT ref: 00DE6176
            • __lseeki64_nolock.LIBCMT ref: 00DE618B
            • __close_nolock.LIBCMT ref: 00DE61EB
              • Part of subcall function 00DDEA9C: CloseHandle.KERNELBASE(00000000,00E5EEF4,00000000,?,00DE6041,00E5EEF4,?,?,?,?,?,?,?,?,00000000,00000109), ref: 00DDEAEC
              • Part of subcall function 00DDEA9C: GetLastError.KERNEL32(?,00DE6041,00E5EEF4,?,?,?,?,?,?,?,?,00000000,00000109), ref: 00DDEAF6
              • Part of subcall function 00DDEA9C: __free_osfhnd.LIBCMT ref: 00DDEB03
              • Part of subcall function 00DDEA9C: __dosmaperr.LIBCMT ref: 00DDEB25
              • Part of subcall function 00DD7C0E: __getptd_noexit.LIBCMT ref: 00DD7C0E
            • __lseeki64_nolock.LIBCMT ref: 00DE620D
            • CloseHandle.KERNEL32(00000000,?,?,?,?,?,00000000,00000109), ref: 00DE6342
            • ___createFile.LIBCMT ref: 00DE6361
            • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000109), ref: 00DE636E
            • __dosmaperr.LIBCMT ref: 00DE6375
            • __free_osfhnd.LIBCMT ref: 00DE6395
            • __invoke_watson.LIBCMT ref: 00DE63C3
            • __wsopen_helper.LIBCMT ref: 00DE63DD
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: __lseeki64_nolock$ErrorFileLast__dosmaperr$CloseHandle___create$__close_nolock__free_osfhnd$Type__chsize_nolock__getptd_noexit__invoke_watson__set_osfhnd__wsopen_helper
            • String ID: @
            • API String ID: 3896587723-2766056989
            • Opcode ID: e48af3835e2851c4838cb6d0d757b62c021d77358ad056962815fce1def644f8
            • Instruction ID: 807b6da9c623f8a3f67b1d5a9a738d6e87ef33ddee07f034327b2a3a6322ff19
            • Opcode Fuzzy Hash: e48af3835e2851c4838cb6d0d757b62c021d77358ad056962815fce1def644f8
            • Instruction Fuzzy Hash: 562246719006899FEF25AF6AEC45BAD7B31EF203A8F284229E5219B2D5D235CD40C771

            Control-flow Graph

            APIs
            • _wcscpy.LIBCMT ref: 00DFFA96
            • _wcschr.LIBCMT ref: 00DFFAA4
            • _wcscpy.LIBCMT ref: 00DFFABB
            • _wcscat.LIBCMT ref: 00DFFACA
            • _wcscat.LIBCMT ref: 00DFFAE8
            • _wcscpy.LIBCMT ref: 00DFFB09
            • __wsplitpath.LIBCMT ref: 00DFFBE6
            • _wcscpy.LIBCMT ref: 00DFFC0B
            • _wcscpy.LIBCMT ref: 00DFFC1D
            • _wcscpy.LIBCMT ref: 00DFFC32
            • _wcscat.LIBCMT ref: 00DFFC47
            • _wcscat.LIBCMT ref: 00DFFC59
            • _wcscat.LIBCMT ref: 00DFFC6E
              • Part of subcall function 00DFBFA4: _wcscmp.LIBCMT ref: 00DFC03E
              • Part of subcall function 00DFBFA4: __wsplitpath.LIBCMT ref: 00DFC083
              • Part of subcall function 00DFBFA4: _wcscpy.LIBCMT ref: 00DFC096
              • Part of subcall function 00DFBFA4: _wcscat.LIBCMT ref: 00DFC0A9
              • Part of subcall function 00DFBFA4: __wsplitpath.LIBCMT ref: 00DFC0CE
              • Part of subcall function 00DFBFA4: _wcscat.LIBCMT ref: 00DFC0E4
              • Part of subcall function 00DFBFA4: _wcscat.LIBCMT ref: 00DFC0F7
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: _wcscat$_wcscpy$__wsplitpath$_wcschr_wcscmp
            • String ID: >>>AUTOIT SCRIPT<<<$t2
            • API String ID: 2955681530-945735720
            • Opcode ID: 7da29b7f6b5b9e3aed5fc0bb22daba23ce369ce5df78c098d9da6d01e4ebbc36
            • Instruction ID: c8ea21b2a9893ffdb9b21ef3f9c824046838297da6694dd9ad5cab5be4578740
            • Opcode Fuzzy Hash: 7da29b7f6b5b9e3aed5fc0bb22daba23ce369ce5df78c098d9da6d01e4ebbc36
            • Instruction Fuzzy Hash: B8918371504345AFDB10EB54C851FAEB3E9FF94310F048869FA5997291DB31E944CBB1

            Control-flow Graph

            APIs
            • GetSysColorBrush.USER32(0000000F), ref: 00DB3F86
            • RegisterClassExW.USER32(00000030), ref: 00DB3FB0
            • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00DB3FC1
            • InitCommonControlsEx.COMCTL32(?), ref: 00DB3FDE
            • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00DB3FEE
            • LoadIconW.USER32(000000A9), ref: 00DB4004
            • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00DB4013
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
            • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
            • API String ID: 2914291525-1005189915
            • Opcode ID: 17df0f1e361cce0a0aea3a0e42b6c6bbd68de1d21eb188ced36dc18178e90b66
            • Instruction ID: 555293aad96ff62b91e023fe7655c396e257be5ecad4a7dcfa85234681da7b6f
            • Opcode Fuzzy Hash: 17df0f1e361cce0a0aea3a0e42b6c6bbd68de1d21eb188ced36dc18178e90b66
            • Instruction Fuzzy Hash: 992193B5914319AFDB00DFAAEC89BCDBFB5FB08710F00425AF615B62A0D7B545888F91

            Control-flow Graph

            APIs
              • Part of subcall function 00DFBDB4: __time64.LIBCMT ref: 00DFBDBE
              • Part of subcall function 00DB4517: _fseek.LIBCMT ref: 00DB452F
            • __wsplitpath.LIBCMT ref: 00DFC083
              • Part of subcall function 00DD1DFC: __wsplitpath_helper.LIBCMT ref: 00DD1E3C
            • _wcscpy.LIBCMT ref: 00DFC096
            • _wcscat.LIBCMT ref: 00DFC0A9
            • __wsplitpath.LIBCMT ref: 00DFC0CE
            • _wcscat.LIBCMT ref: 00DFC0E4
            • _wcscat.LIBCMT ref: 00DFC0F7
            • _wcscmp.LIBCMT ref: 00DFC03E
              • Part of subcall function 00DFC56D: _wcscmp.LIBCMT ref: 00DFC65D
              • Part of subcall function 00DFC56D: _wcscmp.LIBCMT ref: 00DFC670
            • DeleteFileW.KERNEL32(?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 00DFC2A1
            • DeleteFileW.KERNEL32(?,?,?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00DFC338
            • CopyFileW.KERNELBASE(?,?,00000000,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00DFC34E
            • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00DFC35F
            • DeleteFileW.KERNELBASE(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00DFC371
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: File$Delete$_wcscat_wcscmp$__wsplitpath$Copy__time64__wsplitpath_helper_fseek_wcscpy
            • String ID:
            • API String ID: 2378138488-0
            • Opcode ID: 61f41cab156980bf97754e10a56364bbe86c0953a355acad4bfe185f8f658e10
            • Instruction ID: 04ebd476fc5d472a3093582cb8f9b15076547fc772ee4b84181c19d774e3b4bd
            • Opcode Fuzzy Hash: 61f41cab156980bf97754e10a56364bbe86c0953a355acad4bfe185f8f658e10
            • Instruction Fuzzy Hash: E0C129B191021DAADF25DF95CD81EEEBBBDEF48310F0080AAF609E6151DB709A548F71

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 958 db3742-db3762 960 db37c2-db37c4 958->960 961 db3764-db3767 958->961 960->961 964 db37c6 960->964 962 db3769-db3770 961->962 963 db37c8 961->963 965 db382c-db3834 PostQuitMessage 962->965 966 db3776-db377b 962->966 968 e21e00-e21e2e call db2ff6 call dce312 963->968 969 db37ce-db37d1 963->969 967 db37ab-db37b3 DefWindowProcW 964->967 975 db37f2-db37f4 965->975 973 e21e88-e21e9c call df4ddd 966->973 974 db3781-db3783 966->974 976 db37b9-db37bf 967->976 1004 e21e33-e21e3a 968->1004 970 db37d3-db37d4 969->970 971 db37f6-db381d SetTimer RegisterWindowMessageW 969->971 977 e21da3-e21da6 970->977 978 db37da-db37ed KillTimer call db3847 call db390f 970->978 971->975 980 db381f-db382a CreatePopupMenu 971->980 973->975 997 e21ea2 973->997 981 db3789-db378e 974->981 982 db3836-db3840 call dceb83 974->982 975->976 990 e21da8-e21daa 977->990 991 e21ddc-e21dfb MoveWindow 977->991 978->975 980->975 986 e21e6d-e21e74 981->986 987 db3794-db3799 981->987 998 db3845 982->998 986->967 993 e21e7a-e21e83 call dea5f3 986->993 995 db379f-db37a5 987->995 996 e21e58-e21e68 call df55bd 987->996 999 e21dcb-e21dd7 SetFocus 990->999 1000 e21dac-e21daf 990->1000 991->975 993->967 995->967 995->1004 996->975 997->967 998->975 999->975 1000->995 1005 e21db5-e21dc6 call db2ff6 1000->1005 1004->967 1009 e21e40-e21e53 call db3847 call db4ffc 1004->1009 1005->975 1009->967
            APIs
            • DefWindowProcW.USER32(?,?,?,?), ref: 00DB37B3
            • KillTimer.USER32(?,00000001), ref: 00DB37DD
            • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00DB3800
            • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00DB380B
            • CreatePopupMenu.USER32 ref: 00DB381F
            • PostQuitMessage.USER32(00000000), ref: 00DB382E
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
            • String ID: TaskbarCreated
            • API String ID: 129472671-2362178303
            • Opcode ID: 02e8c1e04ef3d157652a081fb85fbf1314b9067e5344f341426a08764ea05b40
            • Instruction ID: d01abc576db29af6bbd291b5ee7e190ebb230c3d87dbda4d62e4e3636f7e9ee6
            • Opcode Fuzzy Hash: 02e8c1e04ef3d157652a081fb85fbf1314b9067e5344f341426a08764ea05b40
            • Instruction Fuzzy Hash: 9F4124F550428AEBDB149F2DAC4BBFA3A59FB44300F040159F507B2191CE60DE94A771

            Control-flow Graph

            APIs
            • GetSysColorBrush.USER32(0000000F), ref: 00DB3E79
            • LoadCursorW.USER32(00000000,00007F00), ref: 00DB3E88
            • LoadIconW.USER32(00000063), ref: 00DB3E9E
            • LoadIconW.USER32(000000A4), ref: 00DB3EB0
            • LoadIconW.USER32(000000A2), ref: 00DB3EC2
              • Part of subcall function 00DB4024: LoadImageW.USER32(00DB0000,00000063,00000001,00000010,00000010,00000000), ref: 00DB4048
            • RegisterClassExW.USER32(?), ref: 00DB3F30
              • Part of subcall function 00DB3F53: GetSysColorBrush.USER32(0000000F), ref: 00DB3F86
              • Part of subcall function 00DB3F53: RegisterClassExW.USER32(00000030), ref: 00DB3FB0
              • Part of subcall function 00DB3F53: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00DB3FC1
              • Part of subcall function 00DB3F53: InitCommonControlsEx.COMCTL32(?), ref: 00DB3FDE
              • Part of subcall function 00DB3F53: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00DB3FEE
              • Part of subcall function 00DB3F53: LoadIconW.USER32(000000A9), ref: 00DB4004
              • Part of subcall function 00DB3F53: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00DB4013
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
            • String ID: #$0$AutoIt v3
            • API String ID: 423443420-4155596026
            • Opcode ID: b70ff02848cfd60967fd9770ebb76aedb0287c82e8da13fbd7c688f025073d50
            • Instruction ID: c525c5d0cfa71161d252ced1ef8c39d115718e074392b60101de2609b0cd5531
            • Opcode Fuzzy Hash: b70ff02848cfd60967fd9770ebb76aedb0287c82e8da13fbd7c688f025073d50
            • Instruction Fuzzy Hash: D02136B0D05304AFCB10DFAEEC46A99BFF5FB48310F50415AE219B62A0D7754688DF91

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 1022 16772e8-1677396 call 1674ce8 1025 167739d-16773c3 call 16781f8 CreateFileW 1022->1025 1028 16773c5 1025->1028 1029 16773ca-16773da 1025->1029 1030 1677515-1677519 1028->1030 1036 16773e1-16773fb VirtualAlloc 1029->1036 1037 16773dc 1029->1037 1031 167755b-167755e 1030->1031 1032 167751b-167751f 1030->1032 1038 1677561-1677568 1031->1038 1034 1677521-1677524 1032->1034 1035 167752b-167752f 1032->1035 1034->1035 1041 1677531-167753b 1035->1041 1042 167753f-1677543 1035->1042 1043 1677402-1677419 ReadFile 1036->1043 1044 16773fd 1036->1044 1037->1030 1039 16775bd-16775d2 1038->1039 1040 167756a-1677575 1038->1040 1047 16775d4-16775df VirtualFree 1039->1047 1048 16775e2-16775ea 1039->1048 1045 1677577 1040->1045 1046 1677579-1677585 1040->1046 1041->1042 1049 1677545-167754f 1042->1049 1050 1677553 1042->1050 1051 1677420-1677460 VirtualAlloc 1043->1051 1052 167741b 1043->1052 1044->1030 1045->1039 1055 1677587-1677597 1046->1055 1056 1677599-16775a5 1046->1056 1047->1048 1049->1050 1050->1031 1053 1677467-1677482 call 1678448 1051->1053 1054 1677462 1051->1054 1052->1030 1062 167748d-1677497 1053->1062 1054->1030 1058 16775bb 1055->1058 1059 16775a7-16775b0 1056->1059 1060 16775b2-16775b8 1056->1060 1058->1038 1059->1058 1060->1058 1063 16774ca-16774de call 1678258 1062->1063 1064 1677499-16774c8 call 1678448 1062->1064 1070 16774e2-16774e6 1063->1070 1071 16774e0 1063->1071 1064->1062 1072 16774f2-16774f6 1070->1072 1073 16774e8-16774ec CloseHandle 1070->1073 1071->1030 1074 1677506-167750f 1072->1074 1075 16774f8-1677503 VirtualFree 1072->1075 1073->1072 1074->1025 1074->1030 1075->1074
            APIs
            • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 016773B9
            • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 016775DF
            Memory Dump Source
            • Source File: 00000001.00000002.1337125232.0000000001674000.00000040.00000020.00020000.00000000.sdmp, Offset: 01674000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_1674000_A2028041200SD.jbxd
            Similarity
            • API ID: CreateFileFreeVirtual
            • String ID:
            • API String ID: 204039940-0
            • Opcode ID: c604c45430315f2d7ac9edfc96fa3ed3524b16f7139e20e6f85f26396c7b052c
            • Instruction ID: 830b6cde89874fd6da5917ba6a96939ed3f8338b494cf34b252e21ac19353409
            • Opcode Fuzzy Hash: c604c45430315f2d7ac9edfc96fa3ed3524b16f7139e20e6f85f26396c7b052c
            • Instruction Fuzzy Hash: 4FA1FB74E00209EBEB14CFA8C898BEEBBB5BF48305F108559E515BB381DB759A41CF54

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 1131 db49fb-db4a25 call dbbcce RegOpenKeyExW 1134 db4a2b-db4a2f 1131->1134 1135 e241cc-e241e3 RegQueryValueExW 1131->1135 1136 e24246-e2424f RegCloseKey 1135->1136 1137 e241e5-e24222 call dcf4ea call db47b7 RegQueryValueExW 1135->1137 1142 e24224-e2423b call db6a63 1137->1142 1143 e2423d-e24245 call db47e2 1137->1143 1142->1143 1143->1136
            APIs
            • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?), ref: 00DB4A1D
            • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 00E241DB
            • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 00E2421A
            • RegCloseKey.ADVAPI32(?), ref: 00E24249
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: QueryValue$CloseOpen
            • String ID: Include$Software\AutoIt v3\AutoIt
            • API String ID: 1586453840-614718249
            • Opcode ID: d576f70a35605449864dbc1fbfb258c97838935d3b40715db86a2797a56325e7
            • Instruction ID: 7b7feed470156e741ee06e04f99a2f73d7a5cd1a88e9d14a77096d1881d2c04b
            • Opcode Fuzzy Hash: d576f70a35605449864dbc1fbfb258c97838935d3b40715db86a2797a56325e7
            • Instruction Fuzzy Hash: 9E113D71605219FEEB04EBA4DD86DFF7BACEF04754F001059B506E61A1EA709E05DB60

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 1158 db36b8-db3728 CreateWindowExW * 2 ShowWindow * 2
            APIs
            • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00DB36E6
            • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00DB3707
            • ShowWindow.USER32(00000000,?,?,?,?,00DB3AA3,?), ref: 00DB371B
            • ShowWindow.USER32(00000000,?,?,?,?,00DB3AA3,?), ref: 00DB3724
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: Window$CreateShow
            • String ID: AutoIt v3$edit
            • API String ID: 1584632944-3779509399
            • Opcode ID: f1eadb15f063d67e9ac7c30070afb95752c0982835e5dbe2f73b8f26f104f342
            • Instruction ID: ac5f613b62d12d5280c00f815630ec52a2afa8772aa4ec75adc7eed9b938b2ba
            • Opcode Fuzzy Hash: f1eadb15f063d67e9ac7c30070afb95752c0982835e5dbe2f73b8f26f104f342
            • Instruction Fuzzy Hash: 5BF0B7715483D57EE731A76BAC0AE672E7DD7C6F60F00009FBA08B21A0C56108D9DAB1

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 1263 1677098-16771dc call 1674ce8 call 1676f88 CreateFileW 1270 16771e3-16771f3 1263->1270 1271 16771de 1263->1271 1274 16771f5 1270->1274 1275 16771fa-1677214 VirtualAlloc 1270->1275 1272 1677293-1677298 1271->1272 1274->1272 1276 1677216 1275->1276 1277 1677218-167722f ReadFile 1275->1277 1276->1272 1278 1677233-167726d call 1676fc8 call 1675f88 1277->1278 1279 1677231 1277->1279 1284 167726f-1677284 call 1677018 1278->1284 1285 1677289-1677291 ExitProcess 1278->1285 1279->1272 1284->1285 1285->1272
            APIs
              • Part of subcall function 01676F88: Sleep.KERNELBASE(000001F4), ref: 01676F99
            • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 016771D2
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1337125232.0000000001674000.00000040.00000020.00020000.00000000.sdmp, Offset: 01674000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_1674000_A2028041200SD.jbxd
            Similarity
            • API ID: CreateFileSleep
            • String ID: GRK7K0G47F2TO4FFJ1ZO0HKQGCOSS
            • API String ID: 2694422964-531618622
            • Opcode ID: a42a86591bd7a4c8a49664e1e0217de8d12a21b401e33ff133928d4479083a5d
            • Instruction ID: 7ce60a26f9a4e268d4c90d6a5544501c62cbb2532ccf9557cc87731fb8ab5a3c
            • Opcode Fuzzy Hash: a42a86591bd7a4c8a49664e1e0217de8d12a21b401e33ff133928d4479083a5d
            • Instruction Fuzzy Hash: 4261A270D08288DAEF11D7B8C858BDEBBB5AF15304F044199E2597B2C1D7B90B49CBA6

            Control-flow Graph

            APIs
              • Part of subcall function 00DB5374: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00E71148,?,00DB61FF,?,00000000,00000001,00000000), ref: 00DB5392
              • Part of subcall function 00DB49FB: RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?), ref: 00DB4A1D
            • _wcscat.LIBCMT ref: 00E22D80
            • _wcscat.LIBCMT ref: 00E22DB5
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: _wcscat$FileModuleNameOpen
            • String ID: 8!$\$\Include\
            • API String ID: 3592542968-2226600046
            • Opcode ID: ede1eba95ffabcf694704bcd844f3f5b00b642f9247e29c77bf64f591c62a3e8
            • Instruction ID: 5e9fe4891dd36e0c3e2f71ab2fe2c21244d3758ca318c67f41a6e6c9ed3e1c07
            • Opcode Fuzzy Hash: ede1eba95ffabcf694704bcd844f3f5b00b642f9247e29c77bf64f591c62a3e8
            • Instruction Fuzzy Hash: 69516171415340DFC714EF6AE88189AB7F4FF99300B80552EF74AA3261EB309988CB76
            APIs
              • Part of subcall function 00DB41A9: LoadLibraryExW.KERNEL32(00000001,00000000,00000002,?,?,?,?,00DB39FE,?,00000001), ref: 00DB41DB
            • _free.LIBCMT ref: 00E236B7
            • _free.LIBCMT ref: 00E236FE
              • Part of subcall function 00DBC833: __wsplitpath.LIBCMT ref: 00DBC93E
              • Part of subcall function 00DBC833: _wcscpy.LIBCMT ref: 00DBC953
              • Part of subcall function 00DBC833: _wcscat.LIBCMT ref: 00DBC968
              • Part of subcall function 00DBC833: SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,00000001,?,?,00000000), ref: 00DBC978
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: _free$CurrentDirectoryLibraryLoad__wsplitpath_wcscat_wcscpy
            • String ID: >>>AUTOIT SCRIPT<<<$Bad directive syntax error
            • API String ID: 805182592-1757145024
            • Opcode ID: a61d538edc3ee4327c7ec8cd497e420ed1d1490a4477c31c20fa96932a20555e
            • Instruction ID: cc091f546f9167a9fd41828cfbca9f67c0191b1ec4932cef22a8ce4481195e4c
            • Opcode Fuzzy Hash: a61d538edc3ee4327c7ec8cd497e420ed1d1490a4477c31c20fa96932a20555e
            • Instruction Fuzzy Hash: 1D910871910229EBCF04EFA4DC919EEB7B4FF18314B10542AF516AB291DB749A45CF70
            APIs
            • _memset.LIBCMT ref: 00E23725
            • GetOpenFileNameW.COMDLG32 ref: 00E2376F
              • Part of subcall function 00DB660F: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00DB53B1,?,?,00DB61FF,?,00000000,00000001,00000000), ref: 00DB662F
              • Part of subcall function 00DB40A7: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00DB40C6
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: Name$Path$FileFullLongOpen_memset
            • String ID: X$t3
            • API String ID: 3777226403-2341782549
            • Opcode ID: 95113fb2a88085dd91f9546da1b31aa0ebe9c5667293a39ff926f5405f91cd4b
            • Instruction ID: 8699a2e9a35a51b065e6ea12d2a82171afbb341914d3083632167cceee031e1d
            • Opcode Fuzzy Hash: 95113fb2a88085dd91f9546da1b31aa0ebe9c5667293a39ff926f5405f91cd4b
            • Instruction Fuzzy Hash: 40219671A10298AFCF01DFA8D845BDE7BF9DF89304F00405AE505B7241DBB49A898F75
            APIs
            • __getstream.LIBCMT ref: 00DD34FE
              • Part of subcall function 00DD7C0E: __getptd_noexit.LIBCMT ref: 00DD7C0E
            • @_EH4_CallFilterFunc@8.LIBCMT ref: 00DD3539
            • __wopenfile.LIBCMT ref: 00DD3549
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: CallFilterFunc@8__getptd_noexit__getstream__wopenfile
            • String ID: <G
            • API String ID: 1820251861-2138716496
            • Opcode ID: 847d76a15e7d533489d16bcd085c5f2c70aa74e527410cc701f9812f370a9429
            • Instruction ID: bdb4b78c3e1e5021591b2a60bcec24f7e8d1219908742aebf39c75d0b3e37e87
            • Opcode Fuzzy Hash: 847d76a15e7d533489d16bcd085c5f2c70aa74e527410cc701f9812f370a9429
            • Instruction Fuzzy Hash: 19110670A403069FDB12BFB4AC4266E37B4EF45390B198527F815DB381EB34CA0197B2
            APIs
            • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,00000003,00000000,80000001,80000001,?,00DCD28B,SwapMouseButtons,00000004,?), ref: 00DCD2BC
            • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,00DCD28B,SwapMouseButtons,00000004,?,?,?,?,00DCC865), ref: 00DCD2DD
            • RegCloseKey.KERNELBASE(00000000,?,?,00DCD28B,SwapMouseButtons,00000004,?,?,?,?,00DCC865), ref: 00DCD2FF
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: CloseOpenQueryValue
            • String ID: Control Panel\Mouse
            • API String ID: 3677997916-824357125
            • Opcode ID: 6103ec06496ecc3b7277cd0ed0e8a9f6a34d084eefecac4a17cd51f0d591831f
            • Instruction ID: d8be21b7be6465d175adffcb32e828ec324bf13fcc7ccccc7147111fbcd3b851
            • Opcode Fuzzy Hash: 6103ec06496ecc3b7277cd0ed0e8a9f6a34d084eefecac4a17cd51f0d591831f
            • Instruction Fuzzy Hash: F611577561121ABFDB208FA8DC84EAEBBB9EF45740F004429B801E7110E631EE449B60
            APIs
            • CreateProcessW.KERNELBASE(?,00000000), ref: 01676743
            • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 016767D9
            • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 016767FB
            Memory Dump Source
            • Source File: 00000001.00000002.1337125232.0000000001674000.00000040.00000020.00020000.00000000.sdmp, Offset: 01674000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_1674000_A2028041200SD.jbxd
            Similarity
            • API ID: Process$ContextCreateMemoryReadThreadWow64
            • String ID:
            • API String ID: 2438371351-0
            • Opcode ID: 0b43d72d38ac188f5e361c01a6572487286e397564ea08694eb873f1bb21aafa
            • Instruction ID: d6d4c034a5d5d94928b58e7f935b1b23f9503e4454ccd1a43e6561496cd6d31c
            • Opcode Fuzzy Hash: 0b43d72d38ac188f5e361c01a6572487286e397564ea08694eb873f1bb21aafa
            • Instruction Fuzzy Hash: 4B621B30A146189BEB24DFA4CC40BEEB776EF58700F1091A9D10DEB390E7769E85CB59
            APIs
              • Part of subcall function 00DB4517: _fseek.LIBCMT ref: 00DB452F
              • Part of subcall function 00DFC56D: _wcscmp.LIBCMT ref: 00DFC65D
              • Part of subcall function 00DFC56D: _wcscmp.LIBCMT ref: 00DFC670
            • _free.LIBCMT ref: 00DFC4DD
            • _free.LIBCMT ref: 00DFC4E4
            • _free.LIBCMT ref: 00DFC54F
              • Part of subcall function 00DD1C9D: RtlFreeHeap.NTDLL(00000000,00000000,?,00DD7A85), ref: 00DD1CB1
              • Part of subcall function 00DD1C9D: GetLastError.KERNEL32(00000000,?,00DD7A85), ref: 00DD1CC3
            • _free.LIBCMT ref: 00DFC557
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: _free$_wcscmp$ErrorFreeHeapLast_fseek
            • String ID:
            • API String ID: 1552873950-0
            • Opcode ID: 2db9d723d2f1f24614347a7e6fc8c80c315d14cd5ac174f49895e1fbecc6b5fc
            • Instruction ID: f4c9aa07fbe0882a5e4f268fdb323ecb7c9800a8cbc5b56e523b1b03f02201a8
            • Opcode Fuzzy Hash: 2db9d723d2f1f24614347a7e6fc8c80c315d14cd5ac174f49895e1fbecc6b5fc
            • Instruction Fuzzy Hash: 97515FB1904218AFDB14DF64DC81BEEBBB9EF48314F10449EF259A3241DB715A908F69
            APIs
            • _memset.LIBCMT ref: 00DCEBB2
              • Part of subcall function 00DB51AF: _memset.LIBCMT ref: 00DB522F
              • Part of subcall function 00DB51AF: _wcscpy.LIBCMT ref: 00DB5283
              • Part of subcall function 00DB51AF: Shell_NotifyIconW.SHELL32(00000001,?), ref: 00DB5293
            • KillTimer.USER32(?,00000001,?,?), ref: 00DCEC07
            • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00DCEC16
            • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00E23C88
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: IconNotifyShell_Timer_memset$Kill_wcscpy
            • String ID:
            • API String ID: 1378193009-0
            • Opcode ID: 16c4ffe67383b7888feec663a7d98ba708a317d6e9ffd23108018bb2ecad593e
            • Instruction ID: ef1556d644ffaae759b266311f595a0c15767db0fa57d7e113fa07dc4fa1b0f2
            • Opcode Fuzzy Hash: 16c4ffe67383b7888feec663a7d98ba708a317d6e9ffd23108018bb2ecad593e
            • Instruction Fuzzy Hash: FE21B3709087949FE7329B38DC5ABE6FFEC9B01308F04048DE69A67241C3742A848B61
            APIs
            • GetTempPathW.KERNEL32(00000104,?), ref: 00DFC72F
            • GetTempFileNameW.KERNELBASE(?,aut,00000000,?), ref: 00DFC746
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: Temp$FileNamePath
            • String ID: aut
            • API String ID: 3285503233-3010740371
            • Opcode ID: ff531504cc1e7f88665b6c488f13f5d58d9489e089f4790fdde4682b698055e9
            • Instruction ID: f992b8e90ca2f46f0fe0312cd43fc19fe358c67c40641cbcf541223abeacbfbe
            • Opcode Fuzzy Hash: ff531504cc1e7f88665b6c488f13f5d58d9489e089f4790fdde4682b698055e9
            • Instruction Fuzzy Hash: 1ED05E7154030EAFDB10ABA0EC0EF8B7B6C9700704F0001A07650B50B2DAB0E6998B54
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: fd890680048bf56c3309d53a951ea55d94de79edaa2ed6975485e8d481ca0f99
            • Instruction ID: ec8479ce351674788787bec2fa585b323559429a126a76155728e2970810bb0a
            • Opcode Fuzzy Hash: fd890680048bf56c3309d53a951ea55d94de79edaa2ed6975485e8d481ca0f99
            • Instruction Fuzzy Hash: 12F158716083059FC720DF24C885B6AB7E5FF88314F14892EF995AB292DB70E945CF92
            APIs
            • __FF_MSGBANNER.LIBCMT ref: 00DD3973
              • Part of subcall function 00DD81C2: __NMSG_WRITE.LIBCMT ref: 00DD81E9
              • Part of subcall function 00DD81C2: __NMSG_WRITE.LIBCMT ref: 00DD81F3
            • __NMSG_WRITE.LIBCMT ref: 00DD397A
              • Part of subcall function 00DD821F: GetModuleFileNameW.KERNEL32(00000000,00E70312,00000104,00000000,00000001,00000000), ref: 00DD82B1
              • Part of subcall function 00DD821F: ___crtMessageBoxW.LIBCMT ref: 00DD835F
              • Part of subcall function 00DD1145: ___crtCorExitProcess.LIBCMT ref: 00DD114B
              • Part of subcall function 00DD1145: ExitProcess.KERNEL32 ref: 00DD1154
              • Part of subcall function 00DD7C0E: __getptd_noexit.LIBCMT ref: 00DD7C0E
            • RtlAllocateHeap.NTDLL(01630000,00000000,00000001,00000001,00000000,?,?,00DCF507,?,0000000E), ref: 00DD399F
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: ExitProcess___crt$AllocateFileHeapMessageModuleName__getptd_noexit
            • String ID:
            • API String ID: 1372826849-0
            • Opcode ID: e948a800fc104ed758cbdbff636078647cead9a47f2051a01ef14fe3da2eb6de
            • Instruction ID: 5ae076457e24cbb58aaec2ff0d9780f88e079a7df9b58d5665265efd37c5cb98
            • Opcode Fuzzy Hash: e948a800fc104ed758cbdbff636078647cead9a47f2051a01ef14fe3da2eb6de
            • Instruction Fuzzy Hash: 8C01B935385311AEE6117B29EC66A2A7358DBC1760F25002BF505E7382DFF0DD408A71
            APIs
            • CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000003,00000080,00000000,?,?,00DFC385,?,?,?,?,?,00000004), ref: 00DFC6F2
            • SetFileTime.KERNELBASE(00000000,?,00000000,?,?,00DFC385,?,?,?,?,?,00000004,00000001,?,?,00000004), ref: 00DFC708
            • CloseHandle.KERNEL32(00000000,?,00DFC385,?,?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 00DFC70F
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: File$CloseCreateHandleTime
            • String ID:
            • API String ID: 3397143404-0
            • Opcode ID: d48e5757018d3f734001b3f8a2e6a07cf01f8de340bd5f19d0f959f3e37e3e16
            • Instruction ID: 0c01f09ad12b52a0e81d9cc37a7c235e6fbb2e04954fe929a2bc7ab6884a6e7e
            • Opcode Fuzzy Hash: d48e5757018d3f734001b3f8a2e6a07cf01f8de340bd5f19d0f959f3e37e3e16
            • Instruction Fuzzy Hash: 32E0863214522CBBD7212B55BC0DFCA7F18AB05760F104110FB15790E097B129259798
            APIs
            • _free.LIBCMT ref: 00DFBB72
              • Part of subcall function 00DD1C9D: RtlFreeHeap.NTDLL(00000000,00000000,?,00DD7A85), ref: 00DD1CB1
              • Part of subcall function 00DD1C9D: GetLastError.KERNEL32(00000000,?,00DD7A85), ref: 00DD1CC3
            • _free.LIBCMT ref: 00DFBB83
            • _free.LIBCMT ref: 00DFBB95
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: _free$ErrorFreeHeapLast
            • String ID:
            • API String ID: 776569668-0
            • Opcode ID: 9be2b5beef45e3014043d3abdf219173afad32993680376f9e1db3d5b0d03a7e
            • Instruction ID: a2c24018b7d47a619557133185080b1253928b5b35e3286841e62ba31c10e28a
            • Opcode Fuzzy Hash: 9be2b5beef45e3014043d3abdf219173afad32993680376f9e1db3d5b0d03a7e
            • Instruction Fuzzy Hash: 5EE0C2A520070152CA20653CEE44FB353CCCF04322718080FB519E324ADF20E84084B4
            APIs
              • Part of subcall function 00DB22A4: RegisterWindowMessageW.USER32(WM_GETCONTROLNAME,?,00DB24F1), ref: 00DB2303
            • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 00DB25A1
            • CoInitialize.OLE32(00000000), ref: 00DB2618
            • CloseHandle.KERNEL32(00000000), ref: 00E2503A
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: Handle$CloseInitializeMessageRegisterWindow
            • String ID:
            • API String ID: 3815369404-0
            • Opcode ID: 52370b148f1f0de01ccfddcd3e4d79ef0f56672d1ce57e11e081c3c714c2bbd0
            • Instruction ID: bc6323764dcf07eb9a3a608722dd24125613b1be66de2d7ee7bcfb331c90d525
            • Opcode Fuzzy Hash: 52370b148f1f0de01ccfddcd3e4d79ef0f56672d1ce57e11e081c3c714c2bbd0
            • Instruction Fuzzy Hash: 7A71BEB4911381CF8304DF6FA996598BBA5FB9838078051EED11EFB672DB304488EF65
            APIs
            • IsThemeActive.UXTHEME ref: 00DB3A73
              • Part of subcall function 00DD1405: __lock.LIBCMT ref: 00DD140B
              • Part of subcall function 00DB3ADB: SystemParametersInfoW.USER32(00002000,00000000,?,00000000), ref: 00DB3AF3
              • Part of subcall function 00DB3ADB: SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00DB3B08
              • Part of subcall function 00DB3D19: GetCurrentDirectoryW.KERNEL32(00007FFF,?,00000000,00000001,?,?,00DB3AA3,?), ref: 00DB3D45
              • Part of subcall function 00DB3D19: IsDebuggerPresent.KERNEL32(?,?,?,?,00DB3AA3,?), ref: 00DB3D57
              • Part of subcall function 00DB3D19: GetFullPathNameW.KERNEL32(00007FFF,?,?,00E71148,00E71130,?,?,?,?,00DB3AA3,?), ref: 00DB3DC8
              • Part of subcall function 00DB3D19: SetCurrentDirectoryW.KERNEL32(?,?,?,00DB3AA3,?), ref: 00DB3E48
            • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00DB3AB3
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: InfoParametersSystem$CurrentDirectory$ActiveDebuggerFullNamePathPresentTheme__lock
            • String ID:
            • API String ID: 924797094-0
            • Opcode ID: 5f0482beadaaa27937cdec62d2c6cad447cf03c8860188d2c0f9afa38c56430b
            • Instruction ID: bbc2af2540e8d68a8cf4b19243e1904f0c3e316c7f9f54cd353852aa1ef45dec
            • Opcode Fuzzy Hash: 5f0482beadaaa27937cdec62d2c6cad447cf03c8860188d2c0f9afa38c56430b
            • Instruction Fuzzy Hash: 0A1190715083419FC311EF2AEC4595ABBF8FB94710F00495FF589972A1DB709588CBA2
            APIs
            • ___lock_fhandle.LIBCMT ref: 00DDEA29
            • __close_nolock.LIBCMT ref: 00DDEA42
              • Part of subcall function 00DD7BDA: __getptd_noexit.LIBCMT ref: 00DD7BDA
              • Part of subcall function 00DD7C0E: __getptd_noexit.LIBCMT ref: 00DD7C0E
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: __getptd_noexit$___lock_fhandle__close_nolock
            • String ID:
            • API String ID: 1046115767-0
            • Opcode ID: ddc16b996f698915c83cd31d7c62d63de1b5456287068e5d0a0d5dab1983c60f
            • Instruction ID: e1b03e9619951c25be944e68dc2eb9cd633177d37ffb0ec7959fd23512aa7128
            • Opcode Fuzzy Hash: ddc16b996f698915c83cd31d7c62d63de1b5456287068e5d0a0d5dab1983c60f
            • Instruction Fuzzy Hash: F411E5728456518ED312BF68C8413187B60AF81335F2A5387E4645F3E3DBB4CD4086B1
            APIs
              • Part of subcall function 00DD395C: __FF_MSGBANNER.LIBCMT ref: 00DD3973
              • Part of subcall function 00DD395C: __NMSG_WRITE.LIBCMT ref: 00DD397A
              • Part of subcall function 00DD395C: RtlAllocateHeap.NTDLL(01630000,00000000,00000001,00000001,00000000,?,?,00DCF507,?,0000000E), ref: 00DD399F
            • std::exception::exception.LIBCMT ref: 00DCF51E
            • __CxxThrowException@8.LIBCMT ref: 00DCF533
              • Part of subcall function 00DD6805: RaiseException.KERNEL32(?,?,0000000E,00E66A30,?,?,?,00DCF538,0000000E,00E66A30,?,00000001), ref: 00DD6856
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: AllocateExceptionException@8HeapRaiseThrowstd::exception::exception
            • String ID:
            • API String ID: 3902256705-0
            • Opcode ID: 998ab3e77acb12eaa1162038ec27032c1cf1e512756382e9ff3c3031a0e0faf3
            • Instruction ID: 0698034c09e0a6030d22f2603a4ac090c4c08ea7e25a9d1ba8e6f6a754b54dc1
            • Opcode Fuzzy Hash: 998ab3e77acb12eaa1162038ec27032c1cf1e512756382e9ff3c3031a0e0faf3
            • Instruction Fuzzy Hash: C5F0A43110821E67D704BF98ED06EDE7BA9DF00354F64402AFA04E2281DBB0D64496F5
            APIs
              • Part of subcall function 00DD7C0E: __getptd_noexit.LIBCMT ref: 00DD7C0E
            • __lock_file.LIBCMT ref: 00DD3629
              • Part of subcall function 00DD4E1C: __lock.LIBCMT ref: 00DD4E3F
            • __fclose_nolock.LIBCMT ref: 00DD3634
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
            • String ID:
            • API String ID: 2800547568-0
            • Opcode ID: 4a4e98d338f1a525fe1db3ffd0befe840db0cc77e133caba326440e2b5af3d59
            • Instruction ID: c3f8e1751e3d4b8bc03a537377b8c4c3e850085c34c728fda567a290bc7b309b
            • Opcode Fuzzy Hash: 4a4e98d338f1a525fe1db3ffd0befe840db0cc77e133caba326440e2b5af3d59
            • Instruction Fuzzy Hash: 72F0B471841304AAD7117B65880276E7BA0EF41730F25815BE460AB3C1CB7CCA019FB6
            APIs
            • CreateProcessW.KERNELBASE(?,00000000), ref: 01676743
            • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 016767D9
            • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 016767FB
            Memory Dump Source
            • Source File: 00000001.00000002.1337125232.0000000001674000.00000040.00000020.00020000.00000000.sdmp, Offset: 01674000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_1674000_A2028041200SD.jbxd
            Similarity
            • API ID: Process$ContextCreateMemoryReadThreadWow64
            • String ID:
            • API String ID: 2438371351-0
            • Opcode ID: 45c0bcdfd50c24934144be52d4489c8f4aeee23b26077383fd0484b0fd6f3e51
            • Instruction ID: 434a2b5b53ac4ff38e9e57fc8a744f2512df9947528a15541396adfe9c8d9ac7
            • Opcode Fuzzy Hash: 45c0bcdfd50c24934144be52d4489c8f4aeee23b26077383fd0484b0fd6f3e51
            • Instruction Fuzzy Hash: AD12CF24E24658C6EB24DF64D8507DEB232EF68300F1090E9910DEB7A5E77A4F85CF5A
            APIs
            • __flush.LIBCMT ref: 00DD2A0B
              • Part of subcall function 00DD7C0E: __getptd_noexit.LIBCMT ref: 00DD7C0E
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: __flush__getptd_noexit
            • String ID:
            • API String ID: 4101623367-0
            • Opcode ID: ba1b573b9a1c5d238bdcc52ef1885e10968c5b94d85714b9232a10917baff8d1
            • Instruction ID: 4615574318ecd305a5efed293d9d6163e40c42504b8a615f4f3173c9196576d4
            • Opcode Fuzzy Hash: ba1b573b9a1c5d238bdcc52ef1885e10968c5b94d85714b9232a10917baff8d1
            • Instruction Fuzzy Hash: 9141C4707407069FDB288EA9C8915BEB7A6EF64360B28952FE855C7340EB70DE408B70
            APIs
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: ProtectVirtual
            • String ID:
            • API String ID: 544645111-0
            • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
            • Instruction ID: db5700e57de67f0417595eeed0520ebd3e9e9427e6f8aa70ae697bec6f86e1ed
            • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
            • Instruction Fuzzy Hash: 3231CBB5A00106DBD718DF58C480A69FBB5FF49340B6886A9E44ACB255DB31EDC1DBE0
            APIs
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: ClearVariant
            • String ID:
            • API String ID: 1473721057-0
            • Opcode ID: 9c7aee992061832e2b9284b6a441f0e9088295274068afc7a57f72e8df98c865
            • Instruction ID: 48d9f63ddd902a80182ab1572c6885631f23f28ded93b31021b064a091c7ce0a
            • Opcode Fuzzy Hash: 9c7aee992061832e2b9284b6a441f0e9088295274068afc7a57f72e8df98c865
            • Instruction Fuzzy Hash: 20415774508612CFDB24CF18C484F1ABBF1AF45308F1989ACE99A5B362C372E845CF62
            APIs
              • Part of subcall function 00DB4214: FreeLibrary.KERNEL32(00000000,?), ref: 00DB4247
            • LoadLibraryExW.KERNEL32(00000001,00000000,00000002,?,?,?,?,00DB39FE,?,00000001), ref: 00DB41DB
              • Part of subcall function 00DB4291: FreeLibrary.KERNEL32(00000000), ref: 00DB42C4
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: Library$Free$Load
            • String ID:
            • API String ID: 2391024519-0
            • Opcode ID: e5e062bb10cf47d0196d72fded14df66ef3cc941ebcf4f77992c51670a5b6f32
            • Instruction ID: 04077497b2b96c2eb1746446bfcd9a20fee8c6a529cf07eebc3e313fb86e2779
            • Opcode Fuzzy Hash: e5e062bb10cf47d0196d72fded14df66ef3cc941ebcf4f77992c51670a5b6f32
            • Instruction Fuzzy Hash: EB11C13160031AEADB14EB70DC06BEE77A9DF40704F10842DB597A61C2DAB0DA04AB74
            APIs
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: ClearVariant
            • String ID:
            • API String ID: 1473721057-0
            • Opcode ID: 1c90cdd5ba207bca89ba71a2a4403aa7cb12d631455a0abafb92136f0698e3c4
            • Instruction ID: ea0f55c6dd07bd63029daf9f13148628790b6600ec1c578c5df0eee75888ae55
            • Opcode Fuzzy Hash: 1c90cdd5ba207bca89ba71a2a4403aa7cb12d631455a0abafb92136f0698e3c4
            • Instruction Fuzzy Hash: CA210570508612CFDB24DF68C444F5ABBF1BF85304F19496CEA9A5B662C731E845CF62
            APIs
            • ___lock_fhandle.LIBCMT ref: 00DDAFC0
              • Part of subcall function 00DD7BDA: __getptd_noexit.LIBCMT ref: 00DD7BDA
              • Part of subcall function 00DD7C0E: __getptd_noexit.LIBCMT ref: 00DD7C0E
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: __getptd_noexit$___lock_fhandle
            • String ID:
            • API String ID: 1144279405-0
            • Opcode ID: f40107ebe2bf2a6cddcc502a2ce78cd419d5e50417b8f7dcb4fa4ebda23e0368
            • Instruction ID: 2dc87680a3fae956375fff33e7959a5e933a801b9332de649656ae6886df4f7c
            • Opcode Fuzzy Hash: f40107ebe2bf2a6cddcc502a2ce78cd419d5e50417b8f7dcb4fa4ebda23e0368
            • Instruction Fuzzy Hash: 83119D728446409FD7126FA8880276A3A60EF82336F1B4287E4745B3E2D7B58D408BB1
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: LibraryLoad
            • String ID:
            • API String ID: 1029625771-0
            • Opcode ID: 6835a613e9910970744cf47f90ff2063449a5087be5f2ce099398601ed1c7b70
            • Instruction ID: 8e1929ce0cc76da0d6dc0c52f5147935dcb715dc8d20293455d772911c882329
            • Opcode Fuzzy Hash: 6835a613e9910970744cf47f90ff2063449a5087be5f2ce099398601ed1c7b70
            • Instruction Fuzzy Hash: 1101363150010DFEDF05EF64C9918FEBB74EF10344F108029B566A7196EA30DA49DB74
            APIs
            • __lock_file.LIBCMT ref: 00DD2AED
              • Part of subcall function 00DD7C0E: __getptd_noexit.LIBCMT ref: 00DD7C0E
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: __getptd_noexit__lock_file
            • String ID:
            • API String ID: 2597487223-0
            • Opcode ID: aa9fdadefb330107cc94311a9566a35736938856837fe6361c84bf1855dfd9db
            • Instruction ID: 64078c948ca5469e8fcdde300d95eb7a25e868a2ac4ed865908b7cf78d18e28e
            • Opcode Fuzzy Hash: aa9fdadefb330107cc94311a9566a35736938856837fe6361c84bf1855dfd9db
            • Instruction Fuzzy Hash: D0F06231640205ABDF21AFA48C067AF36A5FF10320F199417F4149B391D778CA52DBB1
            APIs
            • FreeLibrary.KERNEL32(?,?,?,?,?,00DB39FE,?,00000001), ref: 00DB4286
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: FreeLibrary
            • String ID:
            • API String ID: 3664257935-0
            • Opcode ID: 22c3279ef7798a894bdcbd3051d23c55c57d1d3ec200b573ca3a97a9a3f1b5e9
            • Instruction ID: a51b600dffa9cc41412baae9a162760bcfc717fea76b851778462a6dc25050ba
            • Opcode Fuzzy Hash: 22c3279ef7798a894bdcbd3051d23c55c57d1d3ec200b573ca3a97a9a3f1b5e9
            • Instruction Fuzzy Hash: B1F03971509702CFCB34DF64E8948AABBE4BF043253288A7EF1D782612C7729844EF64
            APIs
            • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00DB40C6
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: LongNamePath
            • String ID:
            • API String ID: 82841172-0
            • Opcode ID: d70bed277edb064cc4a47140bd710a32c48e6e1d56811f0ddf419ded729f3ac2
            • Instruction ID: 396f167947c342c09aa27d620794232025f71d90318e9e16ebf3483af9a23400
            • Opcode Fuzzy Hash: d70bed277edb064cc4a47140bd710a32c48e6e1d56811f0ddf419ded729f3ac2
            • Instruction Fuzzy Hash: 8AE0CD775001245BC711A754DC46FEE779DDF88690F090175F905E7244D964D98196B0
            APIs
            • Sleep.KERNELBASE(000001F4), ref: 01676F99
            Memory Dump Source
            • Source File: 00000001.00000002.1337125232.0000000001674000.00000040.00000020.00020000.00000000.sdmp, Offset: 01674000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_1674000_A2028041200SD.jbxd
            Similarity
            • API ID: Sleep
            • String ID:
            • API String ID: 3472027048-0
            • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
            • Instruction ID: 4486d18ef53f69841733c7e4741d0aef72e0bee4a3ab82dc8c464a0304286b24
            • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
            • Instruction Fuzzy Hash: 57E0E67494410DDFDB00EFB8DA4969D7BB4EF04301F100161FD05D2280D6309D508A62
            APIs
            • SendMessageW.USER32(?,00000400,00000000,00000000), ref: 00E1B1CD
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: MessageSend
            • String ID: %d/%02d/%02d
            • API String ID: 3850602802-328681919
            • Opcode ID: c365e61e7f121732db0db5aa0b5ce620cfd854bb97a969c18769d9c1cbf3eb42
            • Instruction ID: c98c70ace6dca72ff11e951b00d256638d6983949992ebd40407c6690220acdc
            • Opcode Fuzzy Hash: c365e61e7f121732db0db5aa0b5ce620cfd854bb97a969c18769d9c1cbf3eb42
            • Instruction Fuzzy Hash: 9712BC71605208AFEB248F65DC49FEA7BB8FF45324F144129F91AEB2D1DB708981CB61
            APIs
            • GetForegroundWindow.USER32(00000000,00000000), ref: 00DCEB4A
            • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00E23AEA
            • IsIconic.USER32(000000FF), ref: 00E23AF3
            • ShowWindow.USER32(000000FF,00000009), ref: 00E23B00
            • SetForegroundWindow.USER32(000000FF), ref: 00E23B0A
            • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00E23B20
            • GetCurrentThreadId.KERNEL32 ref: 00E23B27
            • GetWindowThreadProcessId.USER32(000000FF,00000000), ref: 00E23B33
            • AttachThreadInput.USER32(000000FF,00000000,00000001), ref: 00E23B44
            • AttachThreadInput.USER32(000000FF,00000000,00000001), ref: 00E23B4C
            • AttachThreadInput.USER32(00000000,?,00000001), ref: 00E23B54
            • SetForegroundWindow.USER32(000000FF), ref: 00E23B57
            • MapVirtualKeyW.USER32(00000012,00000000), ref: 00E23B6C
            • keybd_event.USER32(00000012,00000000), ref: 00E23B77
            • MapVirtualKeyW.USER32(00000012,00000000), ref: 00E23B81
            • keybd_event.USER32(00000012,00000000), ref: 00E23B86
            • MapVirtualKeyW.USER32(00000012,00000000), ref: 00E23B8F
            • keybd_event.USER32(00000012,00000000), ref: 00E23B94
            • MapVirtualKeyW.USER32(00000012,00000000), ref: 00E23B9E
            • keybd_event.USER32(00000012,00000000), ref: 00E23BA3
            • SetForegroundWindow.USER32(000000FF), ref: 00E23BA6
            • AttachThreadInput.USER32(000000FF,?,00000000), ref: 00E23BCD
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
            • String ID: Shell_TrayWnd
            • API String ID: 4125248594-2988720461
            • Opcode ID: 966c1dd2158604cb0fc7c0811b0925d5abc85a223880b31fa588569715c57799
            • Instruction ID: e28504e9e20ae58e8f71bee9d5254229429d481ba97f60fc13f428212c0be111
            • Opcode Fuzzy Hash: 966c1dd2158604cb0fc7c0811b0925d5abc85a223880b31fa588569715c57799
            • Instruction Fuzzy Hash: D13180B1A4422CBFEB211F76AC4EF7E3E6CEB44B54F104016FA05BA1D0D6B55D00AEA0
            APIs
              • Part of subcall function 00DEB134: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00DEB180
              • Part of subcall function 00DEB134: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00DEB1AD
              • Part of subcall function 00DEB134: GetLastError.KERNEL32 ref: 00DEB1BA
            • _memset.LIBCMT ref: 00DEAD08
            • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?,?,?,?,00000001,?,?), ref: 00DEAD5A
            • CloseHandle.KERNEL32(?), ref: 00DEAD6B
            • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 00DEAD82
            • GetProcessWindowStation.USER32 ref: 00DEAD9B
            • SetProcessWindowStation.USER32(00000000), ref: 00DEADA5
            • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 00DEADBF
              • Part of subcall function 00DEAB84: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00DEACC0), ref: 00DEAB99
              • Part of subcall function 00DEAB84: CloseHandle.KERNEL32(?,?,00DEACC0), ref: 00DEABAB
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLookupPrivilegeValue_memset
            • String ID: $H*$default$winsta0
            • API String ID: 2063423040-3938961404
            • Opcode ID: 7fe2626850d51e9e05af3e1a0dd5f0e6817baa8fb595e8397962e767c8e6b266
            • Instruction ID: 043c80729c558d507e6ba087f764949de305b386a1a663c23debf8ee5b2e5b0a
            • Opcode Fuzzy Hash: 7fe2626850d51e9e05af3e1a0dd5f0e6817baa8fb595e8397962e767c8e6b266
            • Instruction Fuzzy Hash: 41818A7190028EAFDF11AFAADC49AEE7B79FF04304F084119F924B6161D731AE549B72
            APIs
              • Part of subcall function 00DF6EBB: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00DF5FA6,?), ref: 00DF6ED8
              • Part of subcall function 00DF6EBB: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00DF5FA6,?), ref: 00DF6EF1
              • Part of subcall function 00DF725E: __wsplitpath.LIBCMT ref: 00DF727B
              • Part of subcall function 00DF725E: __wsplitpath.LIBCMT ref: 00DF728E
              • Part of subcall function 00DF72CB: GetFileAttributesW.KERNEL32(?,00DF6019), ref: 00DF72CC
            • _wcscat.LIBCMT ref: 00DF6149
            • _wcscat.LIBCMT ref: 00DF6167
            • __wsplitpath.LIBCMT ref: 00DF618E
            • FindFirstFileW.KERNEL32(?,?), ref: 00DF61A4
            • _wcscpy.LIBCMT ref: 00DF6209
            • _wcscat.LIBCMT ref: 00DF621C
            • _wcscat.LIBCMT ref: 00DF622F
            • lstrcmpiW.KERNEL32(?,?), ref: 00DF625D
            • DeleteFileW.KERNEL32(?), ref: 00DF626E
            • MoveFileW.KERNEL32(?,?), ref: 00DF6289
            • MoveFileW.KERNEL32(?,?), ref: 00DF6298
            • CopyFileW.KERNEL32(?,?,00000000), ref: 00DF62AD
            • DeleteFileW.KERNEL32(?), ref: 00DF62BE
            • FindNextFileW.KERNEL32(00000000,00000010), ref: 00DF62E1
            • FindClose.KERNEL32(00000000), ref: 00DF62FD
            • FindClose.KERNEL32(00000000), ref: 00DF630B
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: File$Find_wcscat$__wsplitpath$CloseDeleteFullMoveNamePath$AttributesCopyFirstNext_wcscpylstrcmpi
            • String ID: \*.*
            • API String ID: 1917200108-1173974218
            • Opcode ID: c34c507986861b64396499c2319b4f6071814f73c0cfaf9c860c77933ad444dc
            • Instruction ID: ce5d571a1877574057f9b513c858aa15f484a26af96658daa2ba8c507cdb9620
            • Opcode Fuzzy Hash: c34c507986861b64396499c2319b4f6071814f73c0cfaf9c860c77933ad444dc
            • Instruction Fuzzy Hash: 5F511E7290911C6ACB21EBA5DC44DEF77BCAF05300F0A41E6E685E2541EA36D7498FB8
            APIs
            • OpenClipboard.USER32(00E4DC00), ref: 00E06B36
            • IsClipboardFormatAvailable.USER32(0000000D), ref: 00E06B44
            • GetClipboardData.USER32(0000000D), ref: 00E06B4C
            • CloseClipboard.USER32 ref: 00E06B58
            • GlobalLock.KERNEL32(00000000), ref: 00E06B74
            • CloseClipboard.USER32 ref: 00E06B7E
            • GlobalUnlock.KERNEL32(00000000), ref: 00E06B93
            • IsClipboardFormatAvailable.USER32(00000001), ref: 00E06BA0
            • GetClipboardData.USER32(00000001), ref: 00E06BA8
            • GlobalLock.KERNEL32(00000000), ref: 00E06BB5
            • GlobalUnlock.KERNEL32(00000000), ref: 00E06BE9
            • CloseClipboard.USER32 ref: 00E06CF6
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: Clipboard$Global$Close$AvailableDataFormatLockUnlock$Open
            • String ID:
            • API String ID: 3222323430-0
            • Opcode ID: 8b653cc6a3e778f4473253d8578ba05008497f7eac134dce61f02cae350b1ac3
            • Instruction ID: b07ae49daf15175853aa87652da7906f4cf6b302bd4060d6ba8f5a06176bf970
            • Opcode Fuzzy Hash: 8b653cc6a3e778f4473253d8578ba05008497f7eac134dce61f02cae350b1ac3
            • Instruction Fuzzy Hash: B0518271204205AFD300EF65ED8AFAE77A8EF84B14F005029F556F61E1DF70D9598A72
            APIs
            • FindFirstFileW.KERNEL32(?,?), ref: 00DFF62B
            • FindClose.KERNEL32(00000000), ref: 00DFF67F
            • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00DFF6A4
            • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00DFF6BB
            • FileTimeToSystemTime.KERNEL32(?,?), ref: 00DFF6E2
            • __swprintf.LIBCMT ref: 00DFF72E
            • __swprintf.LIBCMT ref: 00DFF767
            • __swprintf.LIBCMT ref: 00DFF7BB
              • Part of subcall function 00DD172B: __woutput_l.LIBCMT ref: 00DD1784
            • __swprintf.LIBCMT ref: 00DFF809
            • __swprintf.LIBCMT ref: 00DFF858
            • __swprintf.LIBCMT ref: 00DFF8A7
            • __swprintf.LIBCMT ref: 00DFF8F6
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: __swprintf$FileTime$FindLocal$CloseFirstSystem__woutput_l
            • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
            • API String ID: 835046349-2428617273
            • Opcode ID: fb59030de4d471423a39b4cd9d978551ede3a6f90ecc521d7ba192b72a53b101
            • Instruction ID: 108a6c0b8f38643c8829ad4632940920ea4c8fa5ea0224dc3adfba215876069b
            • Opcode Fuzzy Hash: fb59030de4d471423a39b4cd9d978551ede3a6f90ecc521d7ba192b72a53b101
            • Instruction Fuzzy Hash: 06A1ECB2418344ABC310EBA5C885DBFB7ECEF98704F44492EB69683151EB34D949CB72
            APIs
            • FindFirstFileW.KERNEL32(?,?,771A8FB0,?,00000000), ref: 00E01B50
            • _wcscmp.LIBCMT ref: 00E01B65
            • _wcscmp.LIBCMT ref: 00E01B7C
            • GetFileAttributesW.KERNEL32(?), ref: 00E01B8E
            • SetFileAttributesW.KERNEL32(?,?), ref: 00E01BA8
            • FindNextFileW.KERNEL32(00000000,?), ref: 00E01BC0
            • FindClose.KERNEL32(00000000), ref: 00E01BCB
            • FindFirstFileW.KERNEL32(*.*,?), ref: 00E01BE7
            • _wcscmp.LIBCMT ref: 00E01C0E
            • _wcscmp.LIBCMT ref: 00E01C25
            • SetCurrentDirectoryW.KERNEL32(?), ref: 00E01C37
            • SetCurrentDirectoryW.KERNEL32(00E639FC), ref: 00E01C55
            • FindNextFileW.KERNEL32(00000000,00000010), ref: 00E01C5F
            • FindClose.KERNEL32(00000000), ref: 00E01C6C
            • FindClose.KERNEL32(00000000), ref: 00E01C7C
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: Find$File$_wcscmp$Close$AttributesCurrentDirectoryFirstNext
            • String ID: *.*
            • API String ID: 1803514871-438819550
            • Opcode ID: 7dd647f55412dd49edbf3874b30bc2a9020fc8dd77f2bc09efbc0fe8218a5116
            • Instruction ID: 2fefe3b073e41be079afea3bbf4dc28d6868e1818dfff581a1cf25032ed24cdb
            • Opcode Fuzzy Hash: 7dd647f55412dd49edbf3874b30bc2a9020fc8dd77f2bc09efbc0fe8218a5116
            • Instruction Fuzzy Hash: FC31E23264521DAFDB14EBB0EC88ADE77ACAF45364F001196E801F60D0EB70DA848E60
            APIs
            • FindFirstFileW.KERNEL32(?,?,771A8FB0,?,00000000), ref: 00E01CAB
            • _wcscmp.LIBCMT ref: 00E01CC0
            • _wcscmp.LIBCMT ref: 00E01CD7
              • Part of subcall function 00DF6BD4: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00DF6BEF
            • FindNextFileW.KERNEL32(00000000,?), ref: 00E01D06
            • FindClose.KERNEL32(00000000), ref: 00E01D11
            • FindFirstFileW.KERNEL32(*.*,?), ref: 00E01D2D
            • _wcscmp.LIBCMT ref: 00E01D54
            • _wcscmp.LIBCMT ref: 00E01D6B
            • SetCurrentDirectoryW.KERNEL32(?), ref: 00E01D7D
            • SetCurrentDirectoryW.KERNEL32(00E639FC), ref: 00E01D9B
            • FindNextFileW.KERNEL32(00000000,00000010), ref: 00E01DA5
            • FindClose.KERNEL32(00000000), ref: 00E01DB2
            • FindClose.KERNEL32(00000000), ref: 00E01DC2
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: Find$File$_wcscmp$Close$CurrentDirectoryFirstNext$Create
            • String ID: *.*
            • API String ID: 1824444939-438819550
            • Opcode ID: 6a2f18d53a24b104b07b11dac1b12e3e4f60b9f990704e5bce0c55d70f4ff4d2
            • Instruction ID: 1683dceb54498b32db93849f98923d361e83e6d39a5d9548fd7ce10697314f90
            • Opcode Fuzzy Hash: 6a2f18d53a24b104b07b11dac1b12e3e4f60b9f990704e5bce0c55d70f4ff4d2
            • Instruction Fuzzy Hash: 2A31F03290421EAFDB10EBA0EC48ADE77ACAF45328F101596E800B61D0DB30CA858B60
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: _memset
            • String ID: Q\E$[$[:<:]]$[:>:]]$\$\$\$\b(?<=\w)$\b(?=\w)$]$^
            • API String ID: 2102423945-2023335898
            • Opcode ID: 5c94e5fe822be52b63ed0ffbe12ea107f6a77771ab0f88945acbdf411fea777c
            • Instruction ID: 7f602b7b26591033836cb84e9aa81698911dad926e67bcfc6731cf8510ace09e
            • Opcode Fuzzy Hash: 5c94e5fe822be52b63ed0ffbe12ea107f6a77771ab0f88945acbdf411fea777c
            • Instruction Fuzzy Hash: F382A071D04229CBCB24CF94D8806EDBBB1FF84314F299169D85ABB251E770DD85DBA0
            APIs
            • GetLocalTime.KERNEL32(?), ref: 00E009DF
            • SystemTimeToFileTime.KERNEL32(?,?), ref: 00E009EF
            • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 00E009FB
            • __wsplitpath.LIBCMT ref: 00E00A59
            • _wcscat.LIBCMT ref: 00E00A71
            • _wcscat.LIBCMT ref: 00E00A83
            • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00E00A98
            • SetCurrentDirectoryW.KERNEL32(?), ref: 00E00AAC
            • SetCurrentDirectoryW.KERNEL32(?), ref: 00E00ADE
            • SetCurrentDirectoryW.KERNEL32(?), ref: 00E00AFF
            • _wcscpy.LIBCMT ref: 00E00B0B
            • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 00E00B4A
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: CurrentDirectoryTime$File$Local_wcscat$System__wsplitpath_wcscpy
            • String ID: *.*
            • API String ID: 3566783562-438819550
            • Opcode ID: fac097052c0a7e0797375b3f41e09f9a89ff9ac426ed8b117c6779d625368352
            • Instruction ID: d0855fd38b6a39f29b795f260404adad24da863fda4c8e86a80aef951eecb3af
            • Opcode Fuzzy Hash: fac097052c0a7e0797375b3f41e09f9a89ff9ac426ed8b117c6779d625368352
            • Instruction Fuzzy Hash: 40615A725083459FD710EF60C844AAEB3E8FF89314F04891EF989D7251EB31E949CBA2
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID:
            • String ID: $ANY)$ANYCRLF)$BSR_ANYCRLF)$BSR_UNICODE)$CR)$CRLF)$LF)$LIMIT_MATCH=$LIMIT_RECURSION=$NO_AUTO_POSSESS)$NO_START_OPT)$UCP)$UTF)$UTF16)$dv836ddv876ddv8d6ddv8f6ddv886ddv806ddv806ddv876ddv856ddv806ddv876ddv836ddv836ddv8c6ddv806ddv8e6ddv896ddv816ddv896ddv806ddv816ddv80$
            • API String ID: 0-453874636
            • Opcode ID: 811369b45b411ec260730667eff998edc10a56ae8195663328e8add5e0740c7a
            • Instruction ID: a117a4893c914550245aa278da0f51bf6e58c39e0f51de2decfd340cde523a96
            • Opcode Fuzzy Hash: 811369b45b411ec260730667eff998edc10a56ae8195663328e8add5e0740c7a
            • Instruction Fuzzy Hash: 97728C71E04219DBDB24CF58D841BEEBBB5FF48310F14916AE956BB280DB309E41DBA0
            APIs
              • Part of subcall function 00DEABBB: GetUserObjectSecurity.USER32(?,?,?,00000000,?), ref: 00DEABD7
              • Part of subcall function 00DEABBB: GetLastError.KERNEL32(?,00DEA69F,?,?,?), ref: 00DEABE1
              • Part of subcall function 00DEABBB: GetProcessHeap.KERNEL32(00000008,?,?,00DEA69F,?,?,?), ref: 00DEABF0
              • Part of subcall function 00DEABBB: HeapAlloc.KERNEL32(00000000,?,00DEA69F,?,?,?), ref: 00DEABF7
              • Part of subcall function 00DEABBB: GetUserObjectSecurity.USER32(?,?,00000000,?,?), ref: 00DEAC0E
              • Part of subcall function 00DEAC56: GetProcessHeap.KERNEL32(00000008,00DEA6B5,00000000,00000000,?,00DEA6B5,?), ref: 00DEAC62
              • Part of subcall function 00DEAC56: HeapAlloc.KERNEL32(00000000,?,00DEA6B5,?), ref: 00DEAC69
              • Part of subcall function 00DEAC56: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00DEA6B5,?), ref: 00DEAC7A
            • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00DEA6D0
            • _memset.LIBCMT ref: 00DEA6E5
            • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00DEA704
            • GetLengthSid.ADVAPI32(?), ref: 00DEA715
            • GetAce.ADVAPI32(?,00000000,?), ref: 00DEA752
            • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00DEA76E
            • GetLengthSid.ADVAPI32(?), ref: 00DEA78B
            • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 00DEA79A
            • HeapAlloc.KERNEL32(00000000), ref: 00DEA7A1
            • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00DEA7C2
            • CopySid.ADVAPI32(00000000), ref: 00DEA7C9
            • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00DEA7FA
            • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00DEA820
            • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00DEA834
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
            • String ID:
            • API String ID: 3996160137-0
            • Opcode ID: 8d93ebb6e01b7dd4871da1815b90d81ae44632aa199ae92d2067e43fb8c0b592
            • Instruction ID: 8ceb987e4bdcc450a1d5459de58b71e141f0a79573884b2b6d3472e43d70e928
            • Opcode Fuzzy Hash: 8d93ebb6e01b7dd4871da1815b90d81ae44632aa199ae92d2067e43fb8c0b592
            • Instruction Fuzzy Hash: 01513F7190014AAFDF14EFA6DC85AEEBBB9FF04700F048119F911A6251D735AD05CB71
            APIs
              • Part of subcall function 00DF6EBB: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00DF5FA6,?), ref: 00DF6ED8
              • Part of subcall function 00DF72CB: GetFileAttributesW.KERNEL32(?,00DF6019), ref: 00DF72CC
            • _wcscat.LIBCMT ref: 00DF6441
            • __wsplitpath.LIBCMT ref: 00DF645F
            • FindFirstFileW.KERNEL32(?,?), ref: 00DF6474
            • _wcscpy.LIBCMT ref: 00DF64A3
            • _wcscat.LIBCMT ref: 00DF64B8
            • _wcscat.LIBCMT ref: 00DF64CA
            • DeleteFileW.KERNEL32(?), ref: 00DF64DA
            • FindNextFileW.KERNEL32(00000000,00000010), ref: 00DF64EB
            • FindClose.KERNEL32(00000000), ref: 00DF6506
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: File$Find_wcscat$AttributesCloseDeleteFirstFullNameNextPath__wsplitpath_wcscpy
            • String ID: \*.*
            • API String ID: 2643075503-1173974218
            • Opcode ID: 739dbb124616137f79998054bd2240d5af636c1037acdd46d76d8f2312a3b496
            • Instruction ID: 1d7f158d186202b752851add72c9ed4b8a714a9ae2e09068ebf296f832e8a67f
            • Opcode Fuzzy Hash: 739dbb124616137f79998054bd2240d5af636c1037acdd46d76d8f2312a3b496
            • Instruction Fuzzy Hash: 1E3152B240D388AEC721EBA48C85AEB7BDCAF95310F44491AF6D9C3241EA35D50D8777
            APIs
              • Part of subcall function 00E13C06: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00E12BB5,?,?), ref: 00E13C1D
            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00E1328E
              • Part of subcall function 00DB936C: __swprintf.LIBCMT ref: 00DB93AB
              • Part of subcall function 00DB936C: __itow.LIBCMT ref: 00DB93DF
            • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 00E1332D
            • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 00E133C5
            • RegCloseKey.ADVAPI32(000000FE,000000FE,00000000,?,00000000), ref: 00E13604
            • RegCloseKey.ADVAPI32(00000000), ref: 00E13611
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: CloseQueryValue$BuffCharConnectRegistryUpper__itow__swprintf
            • String ID:
            • API String ID: 1240663315-0
            • Opcode ID: 62fc084a12a7bb40a492202c2b103f6084302a799e918360b71608683b3695f7
            • Instruction ID: 126177e9a97b048c50563c6f375f3c60fa84ab3796be0faaac6375b784bcfcb5
            • Opcode Fuzzy Hash: 62fc084a12a7bb40a492202c2b103f6084302a799e918360b71608683b3695f7
            • Instruction Fuzzy Hash: 19E15B35604200AFCB14DF29C995EAEBBE9FF88714F04846DF54AE7261DB30E945CB61
            APIs
            • GetKeyboardState.USER32(?), ref: 00DF2B5F
            • GetAsyncKeyState.USER32(000000A0), ref: 00DF2BE0
            • GetKeyState.USER32(000000A0), ref: 00DF2BFB
            • GetAsyncKeyState.USER32(000000A1), ref: 00DF2C15
            • GetKeyState.USER32(000000A1), ref: 00DF2C2A
            • GetAsyncKeyState.USER32(00000011), ref: 00DF2C42
            • GetKeyState.USER32(00000011), ref: 00DF2C54
            • GetAsyncKeyState.USER32(00000012), ref: 00DF2C6C
            • GetKeyState.USER32(00000012), ref: 00DF2C7E
            • GetAsyncKeyState.USER32(0000005B), ref: 00DF2C96
            • GetKeyState.USER32(0000005B), ref: 00DF2CA8
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: State$Async$Keyboard
            • String ID:
            • API String ID: 541375521-0
            • Opcode ID: b28fb6a749e44c8887150f2ba57d596c8138332fbe338a32d06d9a9435b18226
            • Instruction ID: ba671c24c5f12dca7c16476cd0621406d1caf3d7dfa6a121a7bdf80a778b4546
            • Opcode Fuzzy Hash: b28fb6a749e44c8887150f2ba57d596c8138332fbe338a32d06d9a9435b18226
            • Instruction Fuzzy Hash: 6041A4345087CD6DFF359B649C043BABEA0AB11344F0DC059DBCA562C2DBA499D8C7B2
            APIs
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: Clipboard$AllocCloseEmptyGlobalOpen
            • String ID:
            • API String ID: 1737998785-0
            • Opcode ID: ae0661d517fa1e122b4db4902cf512d7ea6a8324fea5d2c925fd0c15899180a4
            • Instruction ID: 0a5f3e8252f0a22f4a3ddf5f7c08d386cd2859561e40d6322b2adb132d0a5fc7
            • Opcode Fuzzy Hash: ae0661d517fa1e122b4db4902cf512d7ea6a8324fea5d2c925fd0c15899180a4
            • Instruction Fuzzy Hash: 0521A1313042159FDB01BF65ED4AF6DBBA8EF44710F04801AF91AEB2A1DB30ED548B60
            APIs
              • Part of subcall function 00DE9ABF: CLSIDFromProgID.OLE32 ref: 00DE9ADC
              • Part of subcall function 00DE9ABF: ProgIDFromCLSID.OLE32(?,00000000), ref: 00DE9AF7
              • Part of subcall function 00DE9ABF: lstrcmpiW.KERNEL32(?,00000000), ref: 00DE9B05
              • Part of subcall function 00DE9ABF: CoTaskMemFree.OLE32(00000000,?,00000000), ref: 00DE9B15
            • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,?,?,?), ref: 00E0C235
            • _memset.LIBCMT ref: 00E0C242
            • _memset.LIBCMT ref: 00E0C360
            • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,00000001), ref: 00E0C38C
            • CoTaskMemFree.OLE32(?), ref: 00E0C397
            Strings
            • NULL Pointer assignment, xrefs: 00E0C3E5
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: FreeFromProgTask_memset$CreateInitializeInstanceSecuritylstrcmpi
            • String ID: NULL Pointer assignment
            • API String ID: 1300414916-2785691316
            • Opcode ID: 07c0807709c1b9dd908ee60d1f698ea18407545dba75c47e2d7e0f7ad1766831
            • Instruction ID: 02b6f96eab518c6a285504eee2d5e57a8febd406d5643defe296ff033cb313b6
            • Opcode Fuzzy Hash: 07c0807709c1b9dd908ee60d1f698ea18407545dba75c47e2d7e0f7ad1766831
            • Instruction Fuzzy Hash: 20911871D00218ABDB10DF95DC95EDEBBB9EF44710F20815AF519B7281EB70AA45CFA0
            APIs
              • Part of subcall function 00DEB134: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00DEB180
              • Part of subcall function 00DEB134: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00DEB1AD
              • Part of subcall function 00DEB134: GetLastError.KERNEL32 ref: 00DEB1BA
            • ExitWindowsEx.USER32(?,00000000), ref: 00DF7A0F
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
            • String ID: $@$SeShutdownPrivilege
            • API String ID: 2234035333-194228
            • Opcode ID: 32f1e6589e5e9ef0c4cf85df8aec531e3615710cdf14ebaa84aff74315f9e891
            • Instruction ID: ab7b50325790ad930ede163de2e95db663548d1cc48041062d502939e2957ea2
            • Opcode Fuzzy Hash: 32f1e6589e5e9ef0c4cf85df8aec531e3615710cdf14ebaa84aff74315f9e891
            • Instruction Fuzzy Hash: 5101D47175825A6AE7282678AC4EBFF36589B00740F2B8424BB47A20D2E5A19F0081B0
            APIs
            • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 00E08CA8
            • WSAGetLastError.WSOCK32(00000000), ref: 00E08CB7
            • bind.WSOCK32(00000000,?,00000010), ref: 00E08CD3
            • listen.WSOCK32(00000000,00000005), ref: 00E08CE2
            • WSAGetLastError.WSOCK32(00000000), ref: 00E08CFC
            • closesocket.WSOCK32(00000000,00000000), ref: 00E08D10
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: ErrorLast$bindclosesocketlistensocket
            • String ID:
            • API String ID: 1279440585-0
            • Opcode ID: 468513b70c9857425223cb8712e2fc8221bfcd4fa8fc33453324440d1c249bec
            • Instruction ID: 1dfca01923b7e3834ca1c60bc23e2c225e332b9b20cf24b020dcd49557f45555
            • Opcode Fuzzy Hash: 468513b70c9857425223cb8712e2fc8221bfcd4fa8fc33453324440d1c249bec
            • Instruction Fuzzy Hash: 4321D031600208AFCB10AF28DE89B6EB7F9EF48314F148159F956B73D2CB30AD458B61
            APIs
            • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,00000000), ref: 00DF6554
            • Process32FirstW.KERNEL32(00000000,0000022C), ref: 00DF6564
            • Process32NextW.KERNEL32(00000000,0000022C), ref: 00DF6583
            • __wsplitpath.LIBCMT ref: 00DF65A7
            • _wcscat.LIBCMT ref: 00DF65BA
            • CloseHandle.KERNEL32(00000000,?,00000000), ref: 00DF65F9
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32__wsplitpath_wcscat
            • String ID:
            • API String ID: 1605983538-0
            • Opcode ID: e45d5a31c986ae1dfd2312d95d26bfe153ed5a7a0e15e226c712660b94361a52
            • Instruction ID: 4d5a4dfc785a087859744d0bc6f71ebe5c084f9a009953bfd84efff0d870f0c9
            • Opcode Fuzzy Hash: e45d5a31c986ae1dfd2312d95d26bfe153ed5a7a0e15e226c712660b94361a52
            • Instruction Fuzzy Hash: 0621537190425CABDB10ABA4DC88BEDBBBCAB49300F5044A5F645E7241EB71DF85CB70
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID:
            • String ID: ERCP$VUUU$VUUU$VUUU$VUUU$dv836ddv876ddv8d6ddv8f6ddv886ddv806ddv806ddv876ddv856ddv806ddv876ddv836ddv836ddv8c6ddv806ddv8e6ddv896ddv816ddv896ddv806ddv816ddv80
            • API String ID: 0-2913670471
            • Opcode ID: c69f976fb2f0bfcf01a5c2e8cd9c3386bd18991ea522be72ea470b5e2ee6b32b
            • Instruction ID: ab4e1a8bed93b4b1baf7985d821d7a087b7b8b6f34436829ab34c1a3ce1fe141
            • Opcode Fuzzy Hash: c69f976fb2f0bfcf01a5c2e8cd9c3386bd18991ea522be72ea470b5e2ee6b32b
            • Instruction Fuzzy Hash: 84927A71E0025ACBDF24CF58C8947FDBBB1AB54314F24919AE95ABB280D770DD81CBA1
            APIs
            • lstrlenW.KERNEL32(?,?,?,00000000), ref: 00DF13DC
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: lstrlen
            • String ID: ($,2$<2$|
            • API String ID: 1659193697-916407979
            • Opcode ID: 92cd1d5994d52bc6434c6bd0a9cb4b1bbcc18708104132b511886fefaab96090
            • Instruction ID: ffa5a084a7e130e481ab36b7f74c353fa34c1584bdf887779d96686d50bd05c0
            • Opcode Fuzzy Hash: 92cd1d5994d52bc6434c6bd0a9cb4b1bbcc18708104132b511886fefaab96090
            • Instruction Fuzzy Hash: F9321579A00605DFC728CF69C480A6AB7F0FF88320B16C56EE59ADB3A1D770E941CB54
            APIs
              • Part of subcall function 00E0A82C: inet_addr.WSOCK32(00000000,00000000,?,?,?,00000000), ref: 00E0A84E
            • socket.WSOCK32(00000002,00000002,00000011,?,?,?,00000000), ref: 00E09296
            • WSAGetLastError.WSOCK32(00000000,00000000), ref: 00E092B9
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: ErrorLastinet_addrsocket
            • String ID:
            • API String ID: 4170576061-0
            • Opcode ID: 6d29f432c9035ab877a1fe60640fafb5b6e5b1b826e998cd241f01695d1dc00e
            • Instruction ID: 0560cd5cefd740849fed13273c10e73a453a27f968b9b7123f409d948bd55640
            • Opcode Fuzzy Hash: 6d29f432c9035ab877a1fe60640fafb5b6e5b1b826e998cd241f01695d1dc00e
            • Instruction Fuzzy Hash: 8E41AD70600204AFDB14AB68C846F7EB7EDEF44724F14844DFA56AB2D2CA749D418BB1
            APIs
            • FindFirstFileW.KERNEL32(?,?), ref: 00DFEB8A
            • _wcscmp.LIBCMT ref: 00DFEBBA
            • _wcscmp.LIBCMT ref: 00DFEBCF
            • FindNextFileW.KERNEL32(00000000,?), ref: 00DFEBE0
            • FindClose.KERNEL32(00000000,00000001,00000000), ref: 00DFEC0E
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: Find$File_wcscmp$CloseFirstNext
            • String ID:
            • API String ID: 2387731787-0
            • Opcode ID: 7e84c2ce6cf2c61d4b95eb83fde5d1ff87c3ce946e7130c4a301685298a35891
            • Instruction ID: bd4efc2e52fb4c34cc9452ea8b3d1e7b7a50cbaa52d216e7a8019fec03189dd0
            • Opcode Fuzzy Hash: 7e84c2ce6cf2c61d4b95eb83fde5d1ff87c3ce946e7130c4a301685298a35891
            • Instruction Fuzzy Hash: B941AF356043069FC708DF28D491EAAB7E4FF49324F14855EFA5A8B3A1DB31E944CB61
            APIs
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: Window$EnabledForegroundIconicVisibleZoomed
            • String ID:
            • API String ID: 292994002-0
            • Opcode ID: cd767fcb26a3ecb1df78e165440c6571834a334a0afcf38c2ed9b7cfd537ae8a
            • Instruction ID: b5e432ded39005a97a2de6a840bc5daa1ee72b0386eacc16ee997f092ffa381b
            • Opcode Fuzzy Hash: cd767fcb26a3ecb1df78e165440c6571834a334a0afcf38c2ed9b7cfd537ae8a
            • Instruction Fuzzy Hash: 3C11B232301115BFE7211F26ED49EAFBB9CEF54764B041429F84AE7241CF30D98286B0
            APIs
            • LoadLibraryA.KERNEL32(kernel32.dll,?,00DCE014,771B0AE0,00DCDEF1,00E4DC38,?,?), ref: 00DCE02C
            • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00DCE03E
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: AddressLibraryLoadProc
            • String ID: GetNativeSystemInfo$kernel32.dll
            • API String ID: 2574300362-192647395
            • Opcode ID: 72f6f9c81e07f53991412629d9919a99ae1e809c471413418108f8c6861f365a
            • Instruction ID: dd093dc3efed57f334b27ca3a89379e4aaf31a92d446dad4e27b5e9a5853af68
            • Opcode Fuzzy Hash: 72f6f9c81e07f53991412629d9919a99ae1e809c471413418108f8c6861f365a
            • Instruction Fuzzy Hash: 52D0A770445B139FC7324F61FC0CB127BD4AB00301F1C442EE481F3150D7B4C8848AA0
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: Exception@8Throwstd::exception::exception
            • String ID: @$ $ $
            • API String ID: 3728558374-1762808387
            • Opcode ID: 5672972e8508aa722dca3d59888e88a47292f76cf914916ebb1fab766d7e534f
            • Instruction ID: c8819fb31139ecc04db65e2f8f978747985b011be3094af9746a98d056e62463
            • Opcode Fuzzy Hash: 5672972e8508aa722dca3d59888e88a47292f76cf914916ebb1fab766d7e534f
            • Instruction Fuzzy Hash: 00728A71A0421ADFCB14DF94C891FAEB7B5EF48304F18C05EE94AAB251D731AE45CBA1
            APIs
              • Part of subcall function 00DCB34E: GetWindowLongW.USER32(?,000000EB), ref: 00DCB35F
            • DefDlgProcW.USER32(?,?,?,?,?), ref: 00DCB22F
              • Part of subcall function 00DCB55D: DefDlgProcW.USER32(?,00000020,?,00000000), ref: 00DCB5A5
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: Proc$LongWindow
            • String ID:
            • API String ID: 2749884682-0
            • Opcode ID: 203126c7a317bb68158551d3b07851524593cf7554e14034f2c815b359351ea4
            • Instruction ID: 2313dec2b5878356f0c032bcfb78c10fc07e412c9d5248cb7aee1baaa416d754
            • Opcode Fuzzy Hash: 203126c7a317bb68158551d3b07851524593cf7554e14034f2c815b359351ea4
            • Instruction Fuzzy Hash: 47A13870114127BADB28AB2A6C8BFBF795CEB42368F18511FF445F7291CB24DC4096B6
            APIs
            • InternetQueryDataAvailable.WININET(?,?,00000000,00000000,00000000,?,?,?,?,?,?,?,?,00E043BF,00000000), ref: 00E04FA6
            • InternetReadFile.WININET(00000001,00000000,00000001,00000001), ref: 00E04FD2
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: Internet$AvailableDataFileQueryRead
            • String ID:
            • API String ID: 599397726-0
            • Opcode ID: 76d646d0088c54e80935b084eb72c16f2bc5af50cd09ba084b62be69add68d18
            • Instruction ID: bfa6052f1b48457d5d7b6e2421c64a7c929b2aa6229b182a2a55fca8cba2ddbc
            • Opcode Fuzzy Hash: 76d646d0088c54e80935b084eb72c16f2bc5af50cd09ba084b62be69add68d18
            • Instruction Fuzzy Hash: 8041CBF260460ABFEB109E94DD85EBF77BCEB40758F10602EF705761C1D6719E819A60
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: _memmove
            • String ID: \Q
            • API String ID: 4104443479-1011046347
            • Opcode ID: 1fd8c96fe28af85ffbad50a803c05a90f01070d1826670d999620b2c350c4d78
            • Instruction ID: 27f0417fea41fd4e6622125c7bb2507b7ce9c20833790fd1ab8a401a80a5740d
            • Opcode Fuzzy Hash: 1fd8c96fe28af85ffbad50a803c05a90f01070d1826670d999620b2c350c4d78
            • Instruction Fuzzy Hash: 16A22975A04219CFDB24CF58C8846EDBBB1FF88314F2581A9D85AAB391D7349E81DF90
            APIs
            • SetErrorMode.KERNEL32(00000001), ref: 00DFE20D
            • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 00DFE267
            • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 00DFE2B4
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: ErrorMode$DiskFreeSpace
            • String ID:
            • API String ID: 1682464887-0
            • Opcode ID: 4505f7c0c59a6fe7bd47c6cc2f8b2695f4cffcc8cc0d94c7300e94079643f4d2
            • Instruction ID: cd8b665b31ef0e25224536b9099c1ea2a8ec5b52b97c8e46f7f5bea79346df60
            • Opcode Fuzzy Hash: 4505f7c0c59a6fe7bd47c6cc2f8b2695f4cffcc8cc0d94c7300e94079643f4d2
            • Instruction Fuzzy Hash: 0A215C35A00118EFCB00EFA5D884EEEFBB8FF48310F0584A9E905AB251DB319915CB64
            APIs
              • Part of subcall function 00DCF4EA: std::exception::exception.LIBCMT ref: 00DCF51E
              • Part of subcall function 00DCF4EA: __CxxThrowException@8.LIBCMT ref: 00DCF533
            • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00DEB180
            • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00DEB1AD
            • GetLastError.KERNEL32 ref: 00DEB1BA
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: AdjustErrorException@8LastLookupPrivilegePrivilegesThrowTokenValuestd::exception::exception
            • String ID:
            • API String ID: 1922334811-0
            • Opcode ID: 0d85712924c1a3c8f847dadc7934f64a5fe7e0c282d370a0f26dc16fdb9c7759
            • Instruction ID: b27deac469dc5d9f3a0375ce5e24f9069335597c93ac6aec97c454b92ed0355a
            • Opcode Fuzzy Hash: 0d85712924c1a3c8f847dadc7934f64a5fe7e0c282d370a0f26dc16fdb9c7759
            • Instruction Fuzzy Hash: A5119EB2518305AFE718AF65ECC5D6BBBBDFB44720B20852EE456A7240DB70FC458A70
            APIs
            • CreateFileW.KERNEL32(?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 00DF66AF
            • DeviceIoControl.KERNEL32(00000000,002D1400,?,0000000C,?,0000000C,?,00000000), ref: 00DF66EC
            • CloseHandle.KERNEL32(00000000,?,?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 00DF66F5
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: CloseControlCreateDeviceFileHandle
            • String ID:
            • API String ID: 33631002-0
            • Opcode ID: 83531503cfbecd94d8a08e4f26bfbf542c2034f417ac30b6ac6bbe2fec2efdda
            • Instruction ID: d87ce8a2da2a3eddf6eb7641be9cc74628d6e308a88fe1df3890767fb509437c
            • Opcode Fuzzy Hash: 83531503cfbecd94d8a08e4f26bfbf542c2034f417ac30b6ac6bbe2fec2efdda
            • Instruction Fuzzy Hash: CF1182B1901228BEE7109BA8DC49FBF7BACEB04714F054555FA01F7190C3749E0487A1
            APIs
            • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 00DF7223
            • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 00DF723A
            • FreeSid.ADVAPI32(?), ref: 00DF724A
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: AllocateCheckFreeInitializeMembershipToken
            • String ID:
            • API String ID: 3429775523-0
            • Opcode ID: 0279a0beee866410def522b369bf34bd4a0b6bc63d727825b545e3e9cbfff3b1
            • Instruction ID: e0637f36885136f90ace7f128660b7f9adefdc0e403ebc3c64e55f6300a831a0
            • Opcode Fuzzy Hash: 0279a0beee866410def522b369bf34bd4a0b6bc63d727825b545e3e9cbfff3b1
            • Instruction Fuzzy Hash: CFF01D76A1420DBFDF04DFF5DD89AEEBBB9EF08605F104469A602E2191E2709A449B14
            APIs
            • FindFirstFileW.KERNEL32(?,?), ref: 00DFF599
            • FindClose.KERNEL32(00000000), ref: 00DFF5C9
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: Find$CloseFileFirst
            • String ID:
            • API String ID: 2295610775-0
            • Opcode ID: 38b3c06b3a4b77fb60a5283247a7e6c87d11fa9e17629eb152eebedff94cf685
            • Instruction ID: 321c397b688993ae0f21973451b2e2e04349ec46d00609a88c736f5c2dcf20df
            • Opcode Fuzzy Hash: 38b3c06b3a4b77fb60a5283247a7e6c87d11fa9e17629eb152eebedff94cf685
            • Instruction Fuzzy Hash: A1118E316042049FD700EF29D849A2EB7E9FF84324F05891EF9A597391CB30A9048BA1
            APIs
            • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,00000016,?,00E0BE6A,?,?,00000000,?), ref: 00DFCEA7
            • FormatMessageW.KERNEL32(00001000,00000000,000000FF,00000000,?,00000FFF,00000000,00000016,?,00E0BE6A,?,?,00000000,?), ref: 00DFCEB9
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: ErrorFormatLastMessage
            • String ID:
            • API String ID: 3479602957-0
            • Opcode ID: f00feb4157ebf95266dd8bd1beba240563cb6f23c2524186e0eef81f69903d0e
            • Instruction ID: 3c39a68c08f64785d9aef540a41000557c0357a1b88f8d66838e2b3b7c1eecae
            • Opcode Fuzzy Hash: f00feb4157ebf95266dd8bd1beba240563cb6f23c2524186e0eef81f69903d0e
            • Instruction Fuzzy Hash: A2F0EC3101022DEBDB20ABA0DC48FFA376CFF083A0F008126F91AE2181C630DA14CBB0
            APIs
            • SendInput.USER32(00000001,?,0000001C,?,?,00000002), ref: 00DF4153
            • keybd_event.USER32(?,75A4C0D0,?,00000000), ref: 00DF4166
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: InputSendkeybd_event
            • String ID:
            • API String ID: 3536248340-0
            • Opcode ID: 3a4a9f994570f84916c5e7b86a3b0323dc6d7ffe22ac3be1feedf46e1f939a04
            • Instruction ID: d3ab3afc73989c2dc6b4979f533d396aeeadaa05d8595fa0cbc7f2fe7a6287df
            • Opcode Fuzzy Hash: 3a4a9f994570f84916c5e7b86a3b0323dc6d7ffe22ac3be1feedf46e1f939a04
            • Instruction Fuzzy Hash: 8CF0677080434DAFDB058FA1CC09BBEBFB0EF00305F04800AF966A6192D779C6169FA0
            APIs
            • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00DEACC0), ref: 00DEAB99
            • CloseHandle.KERNEL32(?,?,00DEACC0), ref: 00DEABAB
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: AdjustCloseHandlePrivilegesToken
            • String ID:
            • API String ID: 81990902-0
            • Opcode ID: 79d74f9bf7c81e74bccbc33a3e46dbe41bdaf35d26049f4eb8544dce3db78e11
            • Instruction ID: 22562db31f81a77a947387707355f7cd8e2379c7bec12481a239aff0ec0ee973
            • Opcode Fuzzy Hash: 79d74f9bf7c81e74bccbc33a3e46dbe41bdaf35d26049f4eb8544dce3db78e11
            • Instruction Fuzzy Hash: 12E0E671014511AFE7252F55FC09DB77BEAEF04320710846DF55A81470D762AC94DB60
            APIs
            • SetUnhandledExceptionFilter.KERNEL32(00000000,0000000E,00DD6DB3,-0000031A,?,?,00000001), ref: 00DD81B1
            • UnhandledExceptionFilter.KERNEL32(?,?,?,00000001), ref: 00DD81BA
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: ExceptionFilterUnhandled
            • String ID:
            • API String ID: 3192549508-0
            • Opcode ID: 0edd9e893ce250822326f2b6c2134971e5bb17189770be5e0138db5cf8788064
            • Instruction ID: 4f145dec2a02e3e7bab6e20ab5e72c0c940ab54604d2a19fcaf888a4017395b7
            • Opcode Fuzzy Hash: 0edd9e893ce250822326f2b6c2134971e5bb17189770be5e0138db5cf8788064
            • Instruction Fuzzy Hash: 9AB0923104860CAFDB002BA2FC0DBA87F68EB08662F004010F60D550618B7358288A92
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 8be333a869b1bd6f71bdd43a254de56de1122951e021785c64f4119497f9f6af
            • Instruction ID: 545fb1ff64520f26ad70d259a228881b3123f28bbfacdccf3303424d66e6f36c
            • Opcode Fuzzy Hash: 8be333a869b1bd6f71bdd43a254de56de1122951e021785c64f4119497f9f6af
            • Instruction Fuzzy Hash: DF322522D68F014DDB239639DC22335A299AFB73C4F55D737F81AB5AA6EB29C4834110
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: __itow__swprintf
            • String ID:
            • API String ID: 674341424-0
            • Opcode ID: 761acf11f8882ce7d6fc00e7a28f2af8886c94f1b17b54cb24951842eead5039
            • Instruction ID: cc8688b552e1672a9f37f43db7a6b71d37d66645c8c8ec076fb06a6357565048
            • Opcode Fuzzy Hash: 761acf11f8882ce7d6fc00e7a28f2af8886c94f1b17b54cb24951842eead5039
            • Instruction Fuzzy Hash: CB229771608341DFC724DF24C8A0BAEB7E4EF84314F24491DFA9A97291DB71E904CBA2
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 0ba794f98a1865b46581ab18944e3d05dee9aba146e88f667b8f384dacf7eca4
            • Instruction ID: 9e4ad439f635cf559ef3bd18584b095a0d8d560bdd034f5d21b3a56571db6310
            • Opcode Fuzzy Hash: 0ba794f98a1865b46581ab18944e3d05dee9aba146e88f667b8f384dacf7eca4
            • Instruction Fuzzy Hash: EDB10525D2AF414ED323A63A8831336B75C6FBB2D5F91D71BFC1A74D62EB2185874180
            APIs
            • __time64.LIBCMT ref: 00DFB6DF
              • Part of subcall function 00DD344A: GetSystemTimeAsFileTime.KERNEL32(00000000,?,?,?,00DFBDC3,00000000,?,?,?,?,00DFBF70,00000000,?), ref: 00DD3453
              • Part of subcall function 00DD344A: __aulldiv.LIBCMT ref: 00DD3473
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: Time$FileSystem__aulldiv__time64
            • String ID:
            • API String ID: 2893107130-0
            • Opcode ID: 7547dd4455e35c730392c19a4ec72b49b0b77878fca0d0356a107eb9dcf1318f
            • Instruction ID: dd09ecbb9aaae4c111b65993f36b124e36da14a3e33756754688513f8040abe5
            • Opcode Fuzzy Hash: 7547dd4455e35c730392c19a4ec72b49b0b77878fca0d0356a107eb9dcf1318f
            • Instruction Fuzzy Hash: 0E219372634510CBC729CF39D481A52B7E1EB95320B248E6DE0E5CF281CB74B945DB64
            APIs
            • BlockInput.USER32(00000001), ref: 00E06ACA
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: BlockInput
            • String ID:
            • API String ID: 3456056419-0
            • Opcode ID: 769dc09863e20a68a94e47f6c4849faa18a41e9c36f4f6823b39d267fc1259e6
            • Instruction ID: c8462a420c6a62a5bfc2a2bc4dcc1479546cecfa84daf4fd8634f1bb9aa85b0d
            • Opcode Fuzzy Hash: 769dc09863e20a68a94e47f6c4849faa18a41e9c36f4f6823b39d267fc1259e6
            • Instruction Fuzzy Hash: A9E01235300204AFC700EB69D905E9AB7EDEF64761B048416E946E7291DAB0E8448BA0
            APIs
            • mouse_event.USER32(00000004,00000000,00000000,00000000,00000000), ref: 00DF750A
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: mouse_event
            • String ID:
            • API String ID: 2434400541-0
            • Opcode ID: 4e5e40fe5095568e8e15589d114dc27ae624c0b4d79825034a83714b88c43b32
            • Instruction ID: 488747e4231b2de38fed532957e13fc420a519372e7436cb79f351d43b2fe00c
            • Opcode Fuzzy Hash: 4e5e40fe5095568e8e15589d114dc27ae624c0b4d79825034a83714b88c43b32
            • Instruction Fuzzy Hash: BAD092A526C64E79EC294724AC1FFF71E08F300781FDEC589B743EA2C4A8E4AD15A031
            APIs
            • LogonUserW.ADVAPI32(?,00000001,?,?,00000000,00DEAD3E), ref: 00DEB124
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: LogonUser
            • String ID:
            • API String ID: 1244722697-0
            • Opcode ID: 134bc07d8555d5f903c73ef8a779c4159f542308062a1a78a03d5d7dea58b438
            • Instruction ID: aeb626e6decdb44c9403849912201ce54b1b1590ba9cdbc2049ea1f35811ae0e
            • Opcode Fuzzy Hash: 134bc07d8555d5f903c73ef8a779c4159f542308062a1a78a03d5d7dea58b438
            • Instruction Fuzzy Hash: AAD05E320A460EAEDF024FA4EC06EAE3F6AEB04B00F408110FA11D50A0C771D531AF50
            APIs
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: NameUser
            • String ID:
            • API String ID: 2645101109-0
            • Opcode ID: c96cdd21fcd63b65b101ec807162417513b47d481731f083c51d79c1b67155d2
            • Instruction ID: 122ac5d888ee69311ce61781d6787ce91b57f21adc2d57053c5054fee20fd7a7
            • Opcode Fuzzy Hash: c96cdd21fcd63b65b101ec807162417513b47d481731f083c51d79c1b67155d2
            • Instruction Fuzzy Hash: EEC04CB140411DDFC755DBC0DD499EEB7BDAB04701F145091A105F1110D7709B459F72
            APIs
            • SetUnhandledExceptionFilter.KERNEL32(?), ref: 00DD818F
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: ExceptionFilterUnhandled
            • String ID:
            • API String ID: 3192549508-0
            • Opcode ID: 37e96633821f8021c9764d2856e6fb98c13cb98b711fb4e83f7471f2beb620d2
            • Instruction ID: 95320ec9284f0ce3892e3fcd2db5fadb1e4af203c2ed77fff36a7bf1b8f06d4d
            • Opcode Fuzzy Hash: 37e96633821f8021c9764d2856e6fb98c13cb98b711fb4e83f7471f2beb620d2
            • Instruction Fuzzy Hash: E2A0113000820CAB8F002B82FC088A83F2CEB002A0B000020F80C000208B22A8388A82
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 191cb97b84304ba76c72b83888146ba1c06f1a3a53a2c8b0b80f33a4d1eaed81
            • Instruction ID: fcd36f52fd5c1586649ebf80058b2207b751e3b4886ebc67a13139c7609974c6
            • Opcode Fuzzy Hash: 191cb97b84304ba76c72b83888146ba1c06f1a3a53a2c8b0b80f33a4d1eaed81
            • Instruction Fuzzy Hash: DE22AC74904216CFDB24DF58C480BEAB7F1FF18304F188569E996AB351E735E981CBA1
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 7be16d4c38f825b7827e7112172c8ab9061493e069d312f3a6a7a1336947641e
            • Instruction ID: cac61c8a7d1446c1e65e4774c34ec9e0f4cb8986b71235582bcfec25fec31948
            • Opcode Fuzzy Hash: 7be16d4c38f825b7827e7112172c8ab9061493e069d312f3a6a7a1336947641e
            • Instruction Fuzzy Hash: 70127970A00219EFDF14DFA9D991AEEB7F5FF48300F108529E946E7250EB35A914CB64
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: Exception@8Throwstd::exception::exception
            • String ID:
            • API String ID: 3728558374-0
            • Opcode ID: 3c70c88d2a0f6a898a04a56fc53e9a646d0eb5373fe0530e8f0901c2d7e61ffd
            • Instruction ID: d86e48db8dde374cc743f28b97dfa587be61feee75aa065be538fd569a7d0eee
            • Opcode Fuzzy Hash: 3c70c88d2a0f6a898a04a56fc53e9a646d0eb5373fe0530e8f0901c2d7e61ffd
            • Instruction Fuzzy Hash: DC02B3B0A00205EFCF14DF68D981AAEB7B5FF48340F14806DE906EB255EB75DA15CBA1
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 6bcf19402166b509fafb4c50a64371ef2a93877f8d810bfc08732e8a9195a1a8
            • Instruction ID: 7e8c11cf09d0107b34edda5603d63506b6e1bde2676672b25537f01f59f35d36
            • Opcode Fuzzy Hash: 6bcf19402166b509fafb4c50a64371ef2a93877f8d810bfc08732e8a9195a1a8
            • Instruction Fuzzy Hash: A4C1C6322051970ADF2D473A8434A7EBEA55AD27B171E076EE8B3CB5D5EF20C524D630
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 2d76c3bdd49f8e00aad6e71f29a941d673537f809e9b181fbd8d4251c6dfdf40
            • Instruction ID: f178e6d503d3913a807f1d1f371e98fc546fb63f953a4247da89f37f42a8d42d
            • Opcode Fuzzy Hash: 2d76c3bdd49f8e00aad6e71f29a941d673537f809e9b181fbd8d4251c6dfdf40
            • Instruction Fuzzy Hash: B5C1C23220519709DF2D463A8434A7EBEA15AE2BB171E176EE4B3CF6D5EF20C524D630
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
            • Instruction ID: 7ce9fa8fc411f62f65de0e640893adb5e7963f33993def2899f6c0465e0102c7
            • Opcode Fuzzy Hash: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
            • Instruction Fuzzy Hash: 6BC1913220509709DF2D473AC474ABEBAA65AA2BB131E077DE4B3CB5D5EF20C564D630
            Memory Dump Source
            • Source File: 00000001.00000002.1337125232.0000000001674000.00000040.00000020.00020000.00000000.sdmp, Offset: 01674000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_1674000_A2028041200SD.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
            • Instruction ID: 9544b30f7b846510291e9f494a523e35069d2dfac98e48b33bc7a66521c8669e
            • Opcode Fuzzy Hash: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
            • Instruction Fuzzy Hash: 9D41D271D1051CEBCF48CFADC991AEEBBF2AF88201F548299D516AB345D730AB41DB80
            Memory Dump Source
            • Source File: 00000001.00000002.1337125232.0000000001674000.00000040.00000020.00020000.00000000.sdmp, Offset: 01674000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_1674000_A2028041200SD.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
            • Instruction ID: 0ef8afa4fa1fd8de95f03861238da280747043576431bf2550a4f8cf551609a4
            • Opcode Fuzzy Hash: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
            • Instruction Fuzzy Hash: E501A478A00609EFCB44DF98C9949AEF7F9FF48310F208599D819A7705D730AE41DB84
            Memory Dump Source
            • Source File: 00000001.00000002.1337125232.0000000001674000.00000040.00000020.00020000.00000000.sdmp, Offset: 01674000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_1674000_A2028041200SD.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
            • Instruction ID: fb730e5b29fb26bfd5be8442daae00d5aaee6610d8c18001663c6386bfd130ba
            • Opcode Fuzzy Hash: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
            • Instruction Fuzzy Hash: 22019278A01109EFCB48DF98D9949AEF7BAFB48310F208599D809A7301D730AE41DB84
            Memory Dump Source
            • Source File: 00000001.00000002.1337125232.0000000001674000.00000040.00000020.00020000.00000000.sdmp, Offset: 01674000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_1674000_A2028041200SD.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
            • Instruction ID: 2052e7d0eb43af8a57a5c2d707c06396f1b84aee57587abda472ed480d51124b
            • Opcode Fuzzy Hash: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
            • Instruction Fuzzy Hash: 1AB012310527488BC2118B89E008B1073ECA308E04F1000B0D40C07B01827874008D48
            APIs
            • DeleteObject.GDI32(00000000), ref: 00E0A2FE
            • DeleteObject.GDI32(00000000), ref: 00E0A310
            • DestroyWindow.USER32 ref: 00E0A31E
            • GetDesktopWindow.USER32 ref: 00E0A338
            • GetWindowRect.USER32(00000000), ref: 00E0A33F
            • SetRect.USER32(?,00000000,00000000,000001F4,00000190), ref: 00E0A480
            • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000002), ref: 00E0A490
            • CreateWindowExW.USER32(00000002,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00E0A4D8
            • GetClientRect.USER32(00000000,?), ref: 00E0A4E4
            • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 00E0A51E
            • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00E0A540
            • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00E0A553
            • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00E0A55E
            • GlobalLock.KERNEL32(00000000), ref: 00E0A567
            • ReadFile.KERNEL32(00000000,00000000,00000000,00000190,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00E0A576
            • GlobalUnlock.KERNEL32(00000000), ref: 00E0A57F
            • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00E0A586
            • GlobalFree.KERNEL32(00000000), ref: 00E0A591
            • CreateStreamOnHGlobal.OLE32(00000000,00000001,88C00000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00E0A5A3
            • OleLoadPicture.OLEAUT32(88C00000,00000000,00000000,00E3D9BC,00000000), ref: 00E0A5B9
            • GlobalFree.KERNEL32(00000000), ref: 00E0A5C9
            • CopyImage.USER32(000001F4,00000000,00000000,00000000,00002000), ref: 00E0A5EF
            • SendMessageW.USER32(?,00000172,00000000,000001F4), ref: 00E0A60E
            • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00E0A630
            • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00E0A81D
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
            • String ID: $AutoIt v3$DISPLAY$static
            • API String ID: 2211948467-2373415609
            • Opcode ID: 3c762d052e93f8d78a702cf13fabf700e31a2686db813a4f7e5106af57a4cf4f
            • Instruction ID: 9b6c1e28b61111946c005241d30125b714e07f71f2cf10796423476d61a3f87d
            • Opcode Fuzzy Hash: 3c762d052e93f8d78a702cf13fabf700e31a2686db813a4f7e5106af57a4cf4f
            • Instruction Fuzzy Hash: 05028D75900208EFDB14DFA9DD89EAE7BB9FF48310F148158F915AB2A0D770AD85CB60
            APIs
            • SetTextColor.GDI32(?,00000000), ref: 00E1D2DB
            • GetSysColorBrush.USER32(0000000F), ref: 00E1D30C
            • GetSysColor.USER32(0000000F), ref: 00E1D318
            • SetBkColor.GDI32(?,000000FF), ref: 00E1D332
            • SelectObject.GDI32(?,00000000), ref: 00E1D341
            • InflateRect.USER32(?,000000FF,000000FF), ref: 00E1D36C
            • GetSysColor.USER32(00000010), ref: 00E1D374
            • CreateSolidBrush.GDI32(00000000), ref: 00E1D37B
            • FrameRect.USER32(?,?,00000000), ref: 00E1D38A
            • DeleteObject.GDI32(00000000), ref: 00E1D391
            • InflateRect.USER32(?,000000FE,000000FE), ref: 00E1D3DC
            • FillRect.USER32(?,?,00000000), ref: 00E1D40E
            • GetWindowLongW.USER32(?,000000F0), ref: 00E1D439
              • Part of subcall function 00E1D575: GetSysColor.USER32(00000012), ref: 00E1D5AE
              • Part of subcall function 00E1D575: SetTextColor.GDI32(?,?), ref: 00E1D5B2
              • Part of subcall function 00E1D575: GetSysColorBrush.USER32(0000000F), ref: 00E1D5C8
              • Part of subcall function 00E1D575: GetSysColor.USER32(0000000F), ref: 00E1D5D3
              • Part of subcall function 00E1D575: GetSysColor.USER32(00000011), ref: 00E1D5F0
              • Part of subcall function 00E1D575: CreatePen.GDI32(00000000,00000001,00743C00), ref: 00E1D5FE
              • Part of subcall function 00E1D575: SelectObject.GDI32(?,00000000), ref: 00E1D60F
              • Part of subcall function 00E1D575: SetBkColor.GDI32(?,00000000), ref: 00E1D618
              • Part of subcall function 00E1D575: SelectObject.GDI32(?,?), ref: 00E1D625
              • Part of subcall function 00E1D575: InflateRect.USER32(?,000000FF,000000FF), ref: 00E1D644
              • Part of subcall function 00E1D575: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00E1D65B
              • Part of subcall function 00E1D575: GetWindowLongW.USER32(00000000,000000F0), ref: 00E1D670
              • Part of subcall function 00E1D575: SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00E1D698
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameMessageRoundSendSolid
            • String ID:
            • API String ID: 3521893082-0
            • Opcode ID: c2e413ee9d17b43583dbe100113614b362d3f51ddf76dd088dcb85bd509a8654
            • Instruction ID: aafa2bd2fcdfddb20d37683e948f92ff67fe8f7f03c6feac39259d3df28906f7
            • Opcode Fuzzy Hash: c2e413ee9d17b43583dbe100113614b362d3f51ddf76dd088dcb85bd509a8654
            • Instruction Fuzzy Hash: CC918E7240D309FFCB109F65EC48AABBBA9FB85325F101A19F562A61E0C731D948CB52
            APIs
            • DestroyWindow.USER32 ref: 00DCB98B
            • DeleteObject.GDI32(00000000), ref: 00DCB9CD
            • DeleteObject.GDI32(00000000), ref: 00DCB9D8
            • DestroyIcon.USER32(00000000), ref: 00DCB9E3
            • DestroyWindow.USER32(00000000), ref: 00DCB9EE
            • SendMessageW.USER32(?,00001308,?,00000000), ref: 00E2D2AA
            • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 00E2D2E3
            • MoveWindow.USER32(00000000,?,?,?,?,00000000), ref: 00E2D711
              • Part of subcall function 00DCB9FF: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00DCB759,?,00000000,?,?,?,?,00DCB72B,00000000,?), ref: 00DCBA58
            • SendMessageW.USER32 ref: 00E2D758
            • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 00E2D76F
            • ImageList_Destroy.COMCTL32(00000000), ref: 00E2D785
            • ImageList_Destroy.COMCTL32(00000000), ref: 00E2D790
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: Destroy$ImageList_MessageSendWindow$DeleteObject$IconInvalidateMoveRectRemove
            • String ID: 0
            • API String ID: 464785882-4108050209
            • Opcode ID: 07bf39d0cf9adbdba87eef9017b871e0cf8b4afb8d57c7c7cca7f194be1753c1
            • Instruction ID: c08dd0b432b7b3a983bbb711ec0534a41d53f93918be217fe67161be0ccc5116
            • Opcode Fuzzy Hash: 07bf39d0cf9adbdba87eef9017b871e0cf8b4afb8d57c7c7cca7f194be1753c1
            • Instruction Fuzzy Hash: 49129F30508212DFDB15CF14D889BA9BBE5FF04318F18556EE699EB252CB31E845CFA1
            APIs
            • SetErrorMode.KERNEL32(00000001), ref: 00DFDBD6
            • GetDriveTypeW.KERNEL32(?,00E4DC54,?,\\.\,00E4DC00), ref: 00DFDCC3
            • SetErrorMode.KERNEL32(00000000,00E4DC54,?,\\.\,00E4DC00), ref: 00DFDE29
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: ErrorMode$DriveType
            • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
            • API String ID: 2907320926-4222207086
            • Opcode ID: ad3ab5006ad06458c98357e0f83b20a3279ea09d45dfc9025a361970a119b0da
            • Instruction ID: ac348a23763dbaa182c5d3aaf759bcc4c7a8b9b31e71aad8bf5a8883bc9ed685
            • Opcode Fuzzy Hash: ad3ab5006ad06458c98357e0f83b20a3279ea09d45dfc9025a361970a119b0da
            • Instruction Fuzzy Hash: 6C51B63028834AEBC214DF24DC81979B7A3FB94780B25E919F287A7291DB70DD45D772
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: __wcsnicmp
            • String ID: #OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
            • API String ID: 1038674560-86951937
            • Opcode ID: b972ccc86217d99eb5cbeb5f349f21d51f6f3f67d55e18b3111984a1d1b7c974
            • Instruction ID: 7ff8eee4761331c4513f6a97e12fdf3bba9c16c72f756795e99290c041113ecd
            • Opcode Fuzzy Hash: b972ccc86217d99eb5cbeb5f349f21d51f6f3f67d55e18b3111984a1d1b7c974
            • Instruction Fuzzy Hash: 4B81D634644315FADB25AF64EC82FFE7768EF24704F046029FA06BB182EB60D941D6B5
            APIs
            • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013,?,?,?), ref: 00E1C788
            • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 00E1C83E
            • SendMessageW.USER32(?,00001102,00000002,?), ref: 00E1C859
            • SendMessageW.USER32(?,000000F1,?,00000000), ref: 00E1CB15
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: MessageSend$Window
            • String ID: 0
            • API String ID: 2326795674-4108050209
            • Opcode ID: 68ffb10a07e5cd2d8a5abe9b987088407bb1ba59a426a6eae517b6ced35728c4
            • Instruction ID: aa08dcbd32c2fb45ed82f1d54baf3c68e85c29bc0a6a9d12ccf3e4ccf8136a6b
            • Opcode Fuzzy Hash: 68ffb10a07e5cd2d8a5abe9b987088407bb1ba59a426a6eae517b6ced35728c4
            • Instruction Fuzzy Hash: B2F1D370288305AFD7118F24CC8ABEABBE4FF49758F241919F599F62A1C774D884CB91
            APIs
            • CharUpperBuffW.USER32(?,?,00E4DC00), ref: 00E16449
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: BuffCharUpper
            • String ID: ADDSTRING$CHECK$CURRENTTAB$DELSTRING$EDITPASTE$FINDSTRING$GETCURRENTCOL$GETCURRENTLINE$GETCURRENTSELECTION$GETLINE$GETLINECOUNT$GETSELECTED$HIDEDROPDOWN$ISCHECKED$ISENABLED$ISVISIBLE$SELECTSTRING$SENDCOMMANDID$SETCURRENTSELECTION$SHOWDROPDOWN$TABLEFT$TABRIGHT$UNCHECK
            • API String ID: 3964851224-45149045
            • Opcode ID: b56067fb0780aea11c2b771feb507020d35e2c37542148cb4a949c29e5a65bc2
            • Instruction ID: 78c44deea3063f4cef274bcd5835a42b75c740b543713eec8b55de7f542b63b3
            • Opcode Fuzzy Hash: b56067fb0780aea11c2b771feb507020d35e2c37542148cb4a949c29e5a65bc2
            • Instruction Fuzzy Hash: A1C183702042468BCB04EF10C552EEE77A6EF95358F14585DF8966B2E2DB20ED8ACB71
            APIs
            • GetSysColor.USER32(00000012), ref: 00E1D5AE
            • SetTextColor.GDI32(?,?), ref: 00E1D5B2
            • GetSysColorBrush.USER32(0000000F), ref: 00E1D5C8
            • GetSysColor.USER32(0000000F), ref: 00E1D5D3
            • CreateSolidBrush.GDI32(?), ref: 00E1D5D8
            • GetSysColor.USER32(00000011), ref: 00E1D5F0
            • CreatePen.GDI32(00000000,00000001,00743C00), ref: 00E1D5FE
            • SelectObject.GDI32(?,00000000), ref: 00E1D60F
            • SetBkColor.GDI32(?,00000000), ref: 00E1D618
            • SelectObject.GDI32(?,?), ref: 00E1D625
            • InflateRect.USER32(?,000000FF,000000FF), ref: 00E1D644
            • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00E1D65B
            • GetWindowLongW.USER32(00000000,000000F0), ref: 00E1D670
            • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00E1D698
            • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 00E1D6BF
            • InflateRect.USER32(?,000000FD,000000FD), ref: 00E1D6DD
            • DrawFocusRect.USER32(?,?), ref: 00E1D6E8
            • GetSysColor.USER32(00000011), ref: 00E1D6F6
            • SetTextColor.GDI32(?,00000000), ref: 00E1D6FE
            • DrawTextW.USER32(?,00000000,000000FF,?,?), ref: 00E1D712
            • SelectObject.GDI32(?,00E1D2A5), ref: 00E1D729
            • DeleteObject.GDI32(?), ref: 00E1D734
            • SelectObject.GDI32(?,?), ref: 00E1D73A
            • DeleteObject.GDI32(?), ref: 00E1D73F
            • SetTextColor.GDI32(?,?), ref: 00E1D745
            • SetBkColor.GDI32(?,?), ref: 00E1D74F
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
            • String ID:
            • API String ID: 1996641542-0
            • Opcode ID: 9f05f66a75a5b3c7cfb4b606f718ee8277661c3a575cf1bc6bb66dd634a2ef9b
            • Instruction ID: 9e51c43147d2fe892985318183dd57a6e386c9cc9cd96ee2cb15cf747fd3988d
            • Opcode Fuzzy Hash: 9f05f66a75a5b3c7cfb4b606f718ee8277661c3a575cf1bc6bb66dd634a2ef9b
            • Instruction Fuzzy Hash: 0E514A71905208FFDF119FA9EC48EEEBF7AEB08324F104115F915BB2A1D7719A449B50
            APIs
            • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 00E1B7B0
            • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00E1B7C1
            • CharNextW.USER32(0000014E), ref: 00E1B7F0
            • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 00E1B831
            • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 00E1B847
            • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00E1B858
            • SendMessageW.USER32(?,000000C2,00000001,0000014E), ref: 00E1B875
            • SetWindowTextW.USER32(?,0000014E), ref: 00E1B8C7
            • SendMessageW.USER32(?,000000B1,000F4240,000F423F), ref: 00E1B8DD
            • SendMessageW.USER32(?,00001002,00000000,?), ref: 00E1B90E
            • _memset.LIBCMT ref: 00E1B933
            • SendMessageW.USER32(00000000,00001060,00000001,00000004), ref: 00E1B97C
            • _memset.LIBCMT ref: 00E1B9DB
            • SendMessageW.USER32 ref: 00E1BA05
            • SendMessageW.USER32(?,00001074,?,00000001), ref: 00E1BA5D
            • SendMessageW.USER32(?,0000133D,?,?), ref: 00E1BB0A
            • InvalidateRect.USER32(?,00000000,00000001), ref: 00E1BB2C
            • GetMenuItemInfoW.USER32(?), ref: 00E1BB76
            • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00E1BBA3
            • DrawMenuBar.USER32(?), ref: 00E1BBB2
            • SetWindowTextW.USER32(?,0000014E), ref: 00E1BBDA
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: MessageSend$Menu$InfoItemTextWindow_memset$CharDrawInvalidateNextRect
            • String ID: 0
            • API String ID: 1073566785-4108050209
            • Opcode ID: a32e0ec4a4ce415251c15d3f28a68cdf04a88f844e22a28b03b7adeeed4010be
            • Instruction ID: 24cc20937b2c70c415df800c9d7800ecd7b12e43aa70cec56be6a18b933a9e0b
            • Opcode Fuzzy Hash: a32e0ec4a4ce415251c15d3f28a68cdf04a88f844e22a28b03b7adeeed4010be
            • Instruction Fuzzy Hash: A1E19E71904218AFDB20DF66DC85EEE7BB8FF05714F10815AF929BA290D7748A85CF60
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: Window$Foreground
            • String ID: ACTIVE$ALL$CLASS$H+$HANDLE$INSTANCE$L+$LAST$P+$REGEXPCLASS$REGEXPTITLE$T+$TITLE
            • API String ID: 62970417-993842312
            • Opcode ID: 3e17fd33fa590bef33ba568424e24ecb077e9b76521158b39606756850f709ce
            • Instruction ID: 527f7ea42fb8c9cc1a4bc62630dde114d4c80338c3218b109252b3335602fd95
            • Opcode Fuzzy Hash: 3e17fd33fa590bef33ba568424e24ecb077e9b76521158b39606756850f709ce
            • Instruction Fuzzy Hash: C5D1C431508646EBCB04EF20D982AEABBB0FF54344F005A1DF556771A1DB30E99ACBB1
            APIs
            • GetCursorPos.USER32(?), ref: 00E1778A
            • GetDesktopWindow.USER32 ref: 00E1779F
            • GetWindowRect.USER32(00000000), ref: 00E177A6
            • GetWindowLongW.USER32(?,000000F0), ref: 00E17808
            • DestroyWindow.USER32(?), ref: 00E17834
            • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00E1785D
            • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00E1787B
            • SendMessageW.USER32(?,00000439,00000000,00000030), ref: 00E178A1
            • SendMessageW.USER32(?,00000421,?,?), ref: 00E178B6
            • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 00E178C9
            • IsWindowVisible.USER32(?), ref: 00E178E9
            • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 00E17904
            • SendMessageW.USER32(?,00000411,00000001,00000030), ref: 00E17918
            • GetWindowRect.USER32(?,?), ref: 00E17930
            • MonitorFromPoint.USER32(?,?,00000002), ref: 00E17956
            • GetMonitorInfoW.USER32 ref: 00E17970
            • CopyRect.USER32(?,?), ref: 00E17987
            • SendMessageW.USER32(?,00000412,00000000), ref: 00E179F2
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
            • String ID: ($0$tooltips_class32
            • API String ID: 698492251-4156429822
            • Opcode ID: 32f112720646ece66cf1297155d92242ee47df7a7a8e9002c65086a4d292ffed
            • Instruction ID: 405a6655aba12705e541746fbb5fa74382f9e1860660c4c569a257bd7b37cf26
            • Opcode Fuzzy Hash: 32f112720646ece66cf1297155d92242ee47df7a7a8e9002c65086a4d292ffed
            • Instruction Fuzzy Hash: 84B1AE71608340AFD704DF64C949BAABBF5FF88714F00891DF59AAB291D770E844CBA6
            APIs
            • GetFileVersionInfoSizeW.VERSION(?,?), ref: 00DF6CFB
            • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 00DF6D21
            • _wcscpy.LIBCMT ref: 00DF6D4F
            • _wcscmp.LIBCMT ref: 00DF6D5A
            • _wcscat.LIBCMT ref: 00DF6D70
            • _wcsstr.LIBCMT ref: 00DF6D7B
            • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 00DF6D97
            • _wcscat.LIBCMT ref: 00DF6DE0
            • _wcscat.LIBCMT ref: 00DF6DE7
            • _wcsncpy.LIBCMT ref: 00DF6E12
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: _wcscat$FileInfoVersion$QuerySizeValue_wcscmp_wcscpy_wcsncpy_wcsstr
            • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
            • API String ID: 699586101-1459072770
            • Opcode ID: a2ae075c049cd9c650f919a56acf619b9a026ec16b52c5017b1cd7350f86e21b
            • Instruction ID: 5c6e03b67df47ad5ed6142fd5fd8a188c00bdecbf226db2d86a9487f934331ad
            • Opcode Fuzzy Hash: a2ae075c049cd9c650f919a56acf619b9a026ec16b52c5017b1cd7350f86e21b
            • Instruction Fuzzy Hash: F941E772A04215BBE714AB74DC47EBF7B7CDF45710F04402AFA01B6282EB74DA0596B1
            APIs
            • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00DCA939
            • GetSystemMetrics.USER32(00000007), ref: 00DCA941
            • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00DCA96C
            • GetSystemMetrics.USER32(00000008), ref: 00DCA974
            • GetSystemMetrics.USER32(00000004), ref: 00DCA999
            • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 00DCA9B6
            • AdjustWindowRectEx.USER32(000000FF,00000000,00000000,00000000), ref: 00DCA9C6
            • CreateWindowExW.USER32(00000000,AutoIt v3 GUI,?,00000000,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 00DCA9F9
            • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00DCAA0D
            • GetClientRect.USER32(00000000,000000FF), ref: 00DCAA2B
            • GetStockObject.GDI32(00000011), ref: 00DCAA47
            • SendMessageW.USER32(00000000,00000030,00000000), ref: 00DCAA52
              • Part of subcall function 00DCB63C: GetCursorPos.USER32(000000FF), ref: 00DCB64F
              • Part of subcall function 00DCB63C: ScreenToClient.USER32(00000000,000000FF), ref: 00DCB66C
              • Part of subcall function 00DCB63C: GetAsyncKeyState.USER32(00000001), ref: 00DCB691
              • Part of subcall function 00DCB63C: GetAsyncKeyState.USER32(00000002), ref: 00DCB69F
            • SetTimer.USER32(00000000,00000000,00000028,00DCAB87), ref: 00DCAA79
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
            • String ID: AutoIt v3 GUI
            • API String ID: 1458621304-248962490
            • Opcode ID: 7e2f11d37862c6eeedc5bf985b0855d72a7532d91793d991e72619dc9e661868
            • Instruction ID: adde4b4a7416e89ed8d69f2174aee1a86c40500e4e96a803beda15415457339e
            • Opcode Fuzzy Hash: 7e2f11d37862c6eeedc5bf985b0855d72a7532d91793d991e72619dc9e661868
            • Instruction Fuzzy Hash: F1B17C71A0420AAFDB14DFA9DC4AFAE7BB4FB08318F154219FA15E7290DB70D841CB61
            APIs
            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00E13735
            • RegCreateKeyExW.ADVAPI32(?,?,00000000,00E4DC00,00000000,?,00000000,?,?), ref: 00E137A3
            • RegCloseKey.ADVAPI32(00000000,00000001,00000000,00000000,00000000), ref: 00E137EB
            • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000002,?), ref: 00E13874
            • RegCloseKey.ADVAPI32(?), ref: 00E13B94
            • RegCloseKey.ADVAPI32(00000000), ref: 00E13BA1
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: Close$ConnectCreateRegistryValue
            • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
            • API String ID: 536824911-966354055
            • Opcode ID: fef906dc30add86bc310dd30576bb9816cb8489aa0eb10e350f6ff00e210b908
            • Instruction ID: c1b417f6227a3bfd0309bb34af437fc54ab16d49b767441618e900991240dfdf
            • Opcode Fuzzy Hash: fef906dc30add86bc310dd30576bb9816cb8489aa0eb10e350f6ff00e210b908
            • Instruction Fuzzy Hash: AC0226756046019FCB14EF24C855AAEB7E5FF88724F04845DF98AAB3A1DB30ED41CBA1
            APIs
            • CharUpperBuffW.USER32(?,?), ref: 00E16C56
            • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 00E16D16
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: BuffCharMessageSendUpper
            • String ID: DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
            • API String ID: 3974292440-719923060
            • Opcode ID: 6403c7ecae678e88c99bb913b597e1aac92cb3311ebd6261a226170b8a104642
            • Instruction ID: c7b8e7f16cf4fe42c259b5e1075ad236cae4616f96fa84bdb67cd3d6560147cd
            • Opcode Fuzzy Hash: 6403c7ecae678e88c99bb913b597e1aac92cb3311ebd6261a226170b8a104642
            • Instruction Fuzzy Hash: C3A18F702042829BCB14EF20D952EAAB3A5FF84354F14596DB8666B3D2DB30ED46CB71
            APIs
            • GetClassNameW.USER32(?,?,00000100), ref: 00DECF91
            • __swprintf.LIBCMT ref: 00DED032
            • _wcscmp.LIBCMT ref: 00DED045
            • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00DED09A
            • _wcscmp.LIBCMT ref: 00DED0D6
            • GetClassNameW.USER32(?,?,00000400), ref: 00DED10D
            • GetDlgCtrlID.USER32(?), ref: 00DED15F
            • GetWindowRect.USER32(?,?), ref: 00DED195
            • GetParent.USER32(?), ref: 00DED1B3
            • ScreenToClient.USER32(00000000), ref: 00DED1BA
            • GetClassNameW.USER32(?,?,00000100), ref: 00DED234
            • _wcscmp.LIBCMT ref: 00DED248
            • GetWindowTextW.USER32(?,?,00000400), ref: 00DED26E
            • _wcscmp.LIBCMT ref: 00DED282
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: _wcscmp$ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf
            • String ID: %s%u
            • API String ID: 3119225716-679674701
            • Opcode ID: b0b0852f7f1a54d2293a7c6513aa7a9f1031f721268b5ac6947c1fc3a5a6fad5
            • Instruction ID: 156634675c8e5372f23f70ec628de1152a970bd2f21577c77d830f32a8e09a8d
            • Opcode Fuzzy Hash: b0b0852f7f1a54d2293a7c6513aa7a9f1031f721268b5ac6947c1fc3a5a6fad5
            • Instruction Fuzzy Hash: 98A10471604346AFD714EF65C884FAAB7A9FF44354F04852AFAA9D3180DB30EA05CBB1
            APIs
            • GetClassNameW.USER32(00000008,?,00000400), ref: 00DED8EB
            • _wcscmp.LIBCMT ref: 00DED8FC
            • GetWindowTextW.USER32(00000001,?,00000400), ref: 00DED924
            • CharUpperBuffW.USER32(?,00000000), ref: 00DED941
            • _wcscmp.LIBCMT ref: 00DED95F
            • _wcsstr.LIBCMT ref: 00DED970
            • GetClassNameW.USER32(00000018,?,00000400), ref: 00DED9A8
            • _wcscmp.LIBCMT ref: 00DED9B8
            • GetWindowTextW.USER32(00000002,?,00000400), ref: 00DED9DF
            • GetClassNameW.USER32(00000018,?,00000400), ref: 00DEDA28
            • _wcscmp.LIBCMT ref: 00DEDA38
            • GetClassNameW.USER32(00000010,?,00000400), ref: 00DEDA60
            • GetWindowRect.USER32(00000004,?), ref: 00DEDAC9
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: ClassName_wcscmp$Window$Text$BuffCharRectUpper_wcsstr
            • String ID: @$ThumbnailClass
            • API String ID: 1788623398-1539354611
            • Opcode ID: cae9246bdde897ced5ad513d1e2becd92817a67aaf488e086739d2a75a6e9213
            • Instruction ID: 628ed06596e906744da7c34dc156ab8c563951fc76012a47a35b0efddcdd876a
            • Opcode Fuzzy Hash: cae9246bdde897ced5ad513d1e2becd92817a67aaf488e086739d2a75a6e9213
            • Instruction Fuzzy Hash: 318192710083859FDB01EF11D885FAA7BA9FF54314F08846AFD899A096EB34DE45CBB1
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: __wcsnicmp
            • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:
            • API String ID: 1038674560-1810252412
            • Opcode ID: b36ca8b82cd8123b61b9f1e66841f754fb1255af70c74063cbfcd18ddc21d7d9
            • Instruction ID: 29422f07834037cfbb00b1312dedab72abeea7b1e3803a43c2f04268d9188b5b
            • Opcode Fuzzy Hash: b36ca8b82cd8123b61b9f1e66841f754fb1255af70c74063cbfcd18ddc21d7d9
            • Instruction Fuzzy Hash: B3317A31A84745EAEB14FB61ED83EEDB366DF20780F20112AF582B10D5EF51AE04C671
            APIs
            • LoadIconW.USER32(00000063), ref: 00DEEAB0
            • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00DEEAC2
            • SetWindowTextW.USER32(?,?), ref: 00DEEAD9
            • GetDlgItem.USER32(?,000003EA), ref: 00DEEAEE
            • SetWindowTextW.USER32(00000000,?), ref: 00DEEAF4
            • GetDlgItem.USER32(?,000003E9), ref: 00DEEB04
            • SetWindowTextW.USER32(00000000,?), ref: 00DEEB0A
            • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 00DEEB2B
            • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 00DEEB45
            • GetWindowRect.USER32(?,?), ref: 00DEEB4E
            • SetWindowTextW.USER32(?,?), ref: 00DEEBB9
            • GetDesktopWindow.USER32 ref: 00DEEBBF
            • GetWindowRect.USER32(00000000), ref: 00DEEBC6
            • MoveWindow.USER32(?,?,?,?,00000000,00000000), ref: 00DEEC12
            • GetClientRect.USER32(?,?), ref: 00DEEC1F
            • PostMessageW.USER32(?,00000005,00000000,00000000), ref: 00DEEC44
            • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 00DEEC6F
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer
            • String ID:
            • API String ID: 3869813825-0
            • Opcode ID: 3b7545285f1c8bacfd70d184cec280d6f21dcbddc9143f2d329d820cbc923fe2
            • Instruction ID: 42dfac3cb15affe4f3b3dd0c3b0d2b6061705097e12c017e12efbf06a655dcf3
            • Opcode Fuzzy Hash: 3b7545285f1c8bacfd70d184cec280d6f21dcbddc9143f2d329d820cbc923fe2
            • Instruction Fuzzy Hash: B5513F71900749EFDB20EFAADD8AF6EBBF5FF04704F004928E596A25A0D775A944CB10
            APIs
            • LoadCursorW.USER32(00000000,00007F8A), ref: 00E079C6
            • LoadCursorW.USER32(00000000,00007F00), ref: 00E079D1
            • LoadCursorW.USER32(00000000,00007F03), ref: 00E079DC
            • LoadCursorW.USER32(00000000,00007F8B), ref: 00E079E7
            • LoadCursorW.USER32(00000000,00007F01), ref: 00E079F2
            • LoadCursorW.USER32(00000000,00007F81), ref: 00E079FD
            • LoadCursorW.USER32(00000000,00007F88), ref: 00E07A08
            • LoadCursorW.USER32(00000000,00007F80), ref: 00E07A13
            • LoadCursorW.USER32(00000000,00007F86), ref: 00E07A1E
            • LoadCursorW.USER32(00000000,00007F83), ref: 00E07A29
            • LoadCursorW.USER32(00000000,00007F85), ref: 00E07A34
            • LoadCursorW.USER32(00000000,00007F82), ref: 00E07A3F
            • LoadCursorW.USER32(00000000,00007F84), ref: 00E07A4A
            • LoadCursorW.USER32(00000000,00007F04), ref: 00E07A55
            • LoadCursorW.USER32(00000000,00007F02), ref: 00E07A60
            • LoadCursorW.USER32(00000000,00007F89), ref: 00E07A6B
            • GetCursorInfo.USER32(?), ref: 00E07A7B
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: Cursor$Load$Info
            • String ID:
            • API String ID: 2577412497-0
            • Opcode ID: ef177b712d4ad9995f6671632a2a99bf7d1a064932ea90c2f2398dff583ebafe
            • Instruction ID: 864f39df54eb05656a2e810a8fa0b1c4ee5bd5ba323a3f59e8ae086e577252e1
            • Opcode Fuzzy Hash: ef177b712d4ad9995f6671632a2a99bf7d1a064932ea90c2f2398dff583ebafe
            • Instruction Fuzzy Hash: B23129B0E0831A6ADB109FB68C8995FBFF8FF04754F50452AE54DF7180DA78A5408FA1
            APIs
              • Part of subcall function 00DCE968: GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,00DBC8B7,?,00002000,?,?,00000000,?,00DB419E,?,?,?,00E4DC00), ref: 00DCE984
              • Part of subcall function 00DB660F: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00DB53B1,?,?,00DB61FF,?,00000000,00000001,00000000), ref: 00DB662F
            • __wsplitpath.LIBCMT ref: 00DBC93E
              • Part of subcall function 00DD1DFC: __wsplitpath_helper.LIBCMT ref: 00DD1E3C
            • _wcscpy.LIBCMT ref: 00DBC953
            • _wcscat.LIBCMT ref: 00DBC968
            • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,00000001,?,?,00000000), ref: 00DBC978
            • SetCurrentDirectoryW.KERNEL32(?), ref: 00DBCABE
              • Part of subcall function 00DBB337: _wcscpy.LIBCMT ref: 00DBB36F
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: CurrentDirectory$_wcscpy$FullNamePath__wsplitpath__wsplitpath_helper_wcscat
            • String ID: #include depth exceeded. Make sure there are no recursive includes$>>>AUTOIT SCRIPT<<<$AU3!$Bad directive syntax error$EA06$Error opening the file$Unterminated string
            • API String ID: 2258743419-1018226102
            • Opcode ID: b1036b674a46b67a531c0e68a8651d1c16e26aa35a93afd45738d95a12fa8287
            • Instruction ID: 306322fd614237f01d5cdaf6c94819bda43166eae346d99ceb9b97293a382a5a
            • Opcode Fuzzy Hash: b1036b674a46b67a531c0e68a8651d1c16e26aa35a93afd45738d95a12fa8287
            • Instruction Fuzzy Hash: 15125A71508341DBC724EF24D881AAEBBE5FF99304F04591EF59AA3261DB30DA49CB72
            APIs
            • _memset.LIBCMT ref: 00E1CEFB
            • DestroyWindow.USER32(?,?), ref: 00E1CF73
            • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 00E1CFF4
            • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 00E1D016
            • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00E1D025
            • DestroyWindow.USER32(?), ref: 00E1D042
            • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00DB0000,00000000), ref: 00E1D075
            • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00E1D094
            • GetDesktopWindow.USER32 ref: 00E1D0A9
            • GetWindowRect.USER32(00000000), ref: 00E1D0B0
            • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00E1D0C2
            • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 00E1D0DA
              • Part of subcall function 00DCB526: GetWindowLongW.USER32(?,000000EB), ref: 00DCB537
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_memset
            • String ID: 0$tooltips_class32
            • API String ID: 3877571568-3619404913
            • Opcode ID: 982c1ab2e84e89fd2ba0f98bca459592b11608a4424a538641935991b9f0f6ad
            • Instruction ID: 2ffc8dde22f6b65d9ff561003a00d84a2cb0292dccfd7694cf88b74cb8ee7022
            • Opcode Fuzzy Hash: 982c1ab2e84e89fd2ba0f98bca459592b11608a4424a538641935991b9f0f6ad
            • Instruction Fuzzy Hash: 2171D270158305AFD720CF68CC85FA67BEAEB8C708F04551DF985A72A1D770E986CB22
            APIs
              • Part of subcall function 00DCB34E: GetWindowLongW.USER32(?,000000EB), ref: 00DCB35F
            • DragQueryPoint.SHELL32(?,?), ref: 00E1F37A
              • Part of subcall function 00E1D7DE: ClientToScreen.USER32(?,?), ref: 00E1D807
              • Part of subcall function 00E1D7DE: GetWindowRect.USER32(?,?), ref: 00E1D87D
              • Part of subcall function 00E1D7DE: PtInRect.USER32(?,?,00E1ED5A), ref: 00E1D88D
            • SendMessageW.USER32(?,000000B0,?,?), ref: 00E1F3E3
            • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 00E1F3EE
            • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 00E1F411
            • _wcscat.LIBCMT ref: 00E1F441
            • SendMessageW.USER32(?,000000C2,00000001,?), ref: 00E1F458
            • SendMessageW.USER32(?,000000B0,?,?), ref: 00E1F471
            • SendMessageW.USER32(?,000000B1,?,?), ref: 00E1F488
            • SendMessageW.USER32(?,000000B1,?,?), ref: 00E1F4AA
            • DragFinish.SHELL32(?), ref: 00E1F4B1
            • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 00E1F59C
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen_wcscat
            • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
            • API String ID: 169749273-3440237614
            • Opcode ID: 2191583d4ebfd66219b2d793d721b35a64d1e5f923b0dc997596b9de55cc3d4a
            • Instruction ID: 278e60b68a16ca228bdb93079c16d3b5a397dabd8ce03e5a0ba92283f8956798
            • Opcode Fuzzy Hash: 2191583d4ebfd66219b2d793d721b35a64d1e5f923b0dc997596b9de55cc3d4a
            • Instruction Fuzzy Hash: 84614A71108305AFC301DF64DC46E9FBBF8FB88710F004A1EF5A6A21A1DB719A49CB62
            APIs
            • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000016,00000000,?,?,00E23973,00000016,0000138C,00000016,?,00000016,00E4DDB4,00000000,?), ref: 00DF26F1
            • LoadStringW.USER32(00000000,?,00E23973,00000016), ref: 00DF26FA
            • GetModuleHandleW.KERNEL32(00000000,00000016,?,00000FFF,?,?,00E23973,00000016,0000138C,00000016,?,00000016,00E4DDB4,00000000,?,00000016), ref: 00DF271C
            • LoadStringW.USER32(00000000,?,00E23973,00000016), ref: 00DF271F
            • __swprintf.LIBCMT ref: 00DF276F
            • __swprintf.LIBCMT ref: 00DF2780
            • _wprintf.LIBCMT ref: 00DF2829
            • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00DF2840
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: HandleLoadModuleString__swprintf$Message_wprintf
            • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR$s9
            • API String ID: 618562835-2846937808
            • Opcode ID: 782219bc2a7ae03f99c188d64490bac8725f7b1f9558f141599d724f8bfb8c8f
            • Instruction ID: 2d6b55523a39424a6f876c37144b94a295d3251ba1d99b3a37f9e49013d0e3c3
            • Opcode Fuzzy Hash: 782219bc2a7ae03f99c188d64490bac8725f7b1f9558f141599d724f8bfb8c8f
            • Instruction Fuzzy Hash: AC410E72800219FACB14FBE4ED86EEEB778EF54380F504065F60676092EA646F59CB71
            APIs
            • VariantInit.OLEAUT32(00000000), ref: 00DFAB3D
            • VariantCopy.OLEAUT32(?,?), ref: 00DFAB46
            • VariantClear.OLEAUT32(?), ref: 00DFAB52
            • VariantTimeToSystemTime.OLEAUT32(?,?,?), ref: 00DFAC40
            • __swprintf.LIBCMT ref: 00DFAC70
            • VarR8FromDec.OLEAUT32(?,?), ref: 00DFAC9C
            • VariantInit.OLEAUT32(?), ref: 00DFAD4D
            • SysFreeString.OLEAUT32(00000016), ref: 00DFADDF
            • VariantClear.OLEAUT32(?), ref: 00DFAE35
            • VariantClear.OLEAUT32(?), ref: 00DFAE44
            • VariantInit.OLEAUT32(00000000), ref: 00DFAE80
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: Variant$ClearInit$Time$CopyFreeFromStringSystem__swprintf
            • String ID: %4d%02d%02d%02d%02d%02d$Default
            • API String ID: 3730832054-3931177956
            • Opcode ID: cb516953f2140e624bd8ad5d33d1f58e1cf9944c7b9a9e94c0599dc2af23f501
            • Instruction ID: 7aad51285d4ec4b4a0a14b82354406078b0d6ab0f002e5a0f95076a572f73fed
            • Opcode Fuzzy Hash: cb516953f2140e624bd8ad5d33d1f58e1cf9944c7b9a9e94c0599dc2af23f501
            • Instruction Fuzzy Hash: 83D1C2B1A04219DBCB149F69D885BB9B7B5FF04700F1AC095F6599B280DB70DC40DBB2
            APIs
            • CharUpperBuffW.USER32(?,?), ref: 00E171FC
            • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00E17247
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: BuffCharMessageSendUpper
            • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
            • API String ID: 3974292440-4258414348
            • Opcode ID: 20be4990b75c0db37d9d8b4b8e58ff145cb9088fe7b6f55ac0342ef413b2e8cd
            • Instruction ID: 44e51c43d74c8706b50f1d796d37f87ea9a34f5a34b851f97ca0a6367b4605e3
            • Opcode Fuzzy Hash: 20be4990b75c0db37d9d8b4b8e58ff145cb9088fe7b6f55ac0342ef413b2e8cd
            • Instruction Fuzzy Hash: 7F917E702087419BCB05EF10C952AAEB7A1FF94754F04585CF8966B3A2DB30ED4ACBA1
            APIs
            • EnumChildWindows.USER32(?,00DECF50), ref: 00DECE90
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: ChildEnumWindows
            • String ID: 4+$CLASS$CLASSNN$H+$INSTANCE$L+$NAME$P+$REGEXPCLASS$T+$TEXT
            • API String ID: 3555792229-2655548891
            • Opcode ID: 8682ecc5ac1ba3848af7666f0f3ca74ab508b818d4ecfe2ee2f253755a438ac6
            • Instruction ID: d72b6dce89fdf375698d8313f1d0a7248ddcdca712b72542e997e7f5b7a86a22
            • Opcode Fuzzy Hash: 8682ecc5ac1ba3848af7666f0f3ca74ab508b818d4ecfe2ee2f253755a438ac6
            • Instruction Fuzzy Hash: EF91B470610686AACB18EF61C482BEEFB75FF04340F549519E95AB7141DF30A95ACBF0
            APIs
            • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 00E1E5AB
            • LoadLibraryExW.KERNEL32(?,00000000,00000032,00000000,?,?,?,?,?,00E1BEAF), ref: 00E1E607
            • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00E1E647
            • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00E1E68C
            • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00E1E6C3
            • FreeLibrary.KERNEL32(?,00000004,?,?,?,?,00E1BEAF), ref: 00E1E6CF
            • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 00E1E6DF
            • DestroyIcon.USER32(?,?,?,?,?,00E1BEAF), ref: 00E1E6EE
            • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 00E1E70B
            • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 00E1E717
              • Part of subcall function 00DD0FA7: __wcsicmp_l.LIBCMT ref: 00DD1030
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: Load$Image$IconLibraryMessageSend$DestroyExtractFree__wcsicmp_l
            • String ID: .dll$.exe$.icl
            • API String ID: 1212759294-1154884017
            • Opcode ID: d343169eff14dd8ad1449fdc7f11eba09b7702c9225b43c3e1dcfeed2a0c8087
            • Instruction ID: 1a256169382dee1a673ea88b2a3e10b9f2a76783cc17a4a7432409fe7372d5fc
            • Opcode Fuzzy Hash: d343169eff14dd8ad1449fdc7f11eba09b7702c9225b43c3e1dcfeed2a0c8087
            • Instruction Fuzzy Hash: CA619D71540219FEEB24DF64DC46BFE7BA8FB18724F104106F915E62D1EBB0A994CBA0
            APIs
              • Part of subcall function 00DB936C: __swprintf.LIBCMT ref: 00DB93AB
              • Part of subcall function 00DB936C: __itow.LIBCMT ref: 00DB93DF
            • CharLowerBuffW.USER32(?,?), ref: 00DFD292
            • GetDriveTypeW.KERNEL32 ref: 00DFD2DF
            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00DFD327
            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00DFD35E
            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00DFD38C
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: SendString$BuffCharDriveLowerType__itow__swprintf
            • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
            • API String ID: 1148790751-4113822522
            • Opcode ID: 82da842ca045e5d8b55d59a29d2d8fe48d1b6ed09a5a00264cb4bbddee336a37
            • Instruction ID: 9843ecd53540d35a6c32b9dcf07c7e89f5ad9e7b13a1ee950ea919fbb4f79ffa
            • Opcode Fuzzy Hash: 82da842ca045e5d8b55d59a29d2d8fe48d1b6ed09a5a00264cb4bbddee336a37
            • Instruction Fuzzy Hash: 655128711043059FC700EF20D9819AEB7E5EF98758F04885DF99667291DB31EE09CBA2
            APIs
            • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00DFD0D8
            • __swprintf.LIBCMT ref: 00DFD0FA
            • CreateDirectoryW.KERNEL32(?,00000000), ref: 00DFD137
            • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 00DFD15C
            • _memset.LIBCMT ref: 00DFD17B
            • _wcsncpy.LIBCMT ref: 00DFD1B7
            • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 00DFD1EC
            • CloseHandle.KERNEL32(00000000), ref: 00DFD1F7
            • RemoveDirectoryW.KERNEL32(?), ref: 00DFD200
            • CloseHandle.KERNEL32(00000000), ref: 00DFD20A
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove__swprintf_memset_wcsncpy
            • String ID: :$\$\??\%s
            • API String ID: 2733774712-3457252023
            • Opcode ID: 631df2873211686d8bc1cf74fddcd373b8bcce22bcd3421ef70118c02fbb1a98
            • Instruction ID: bf78c87a2a4c2c846b4734a3c5cefc0e76d2bc6e1490c95ccbad8e6b387aaf81
            • Opcode Fuzzy Hash: 631df2873211686d8bc1cf74fddcd373b8bcce22bcd3421ef70118c02fbb1a98
            • Instruction Fuzzy Hash: 973190B250020DABDB21DFA5DC49FEB77BEEF89740F1480A6F609E2160E77096448B34
            APIs
            • CreateFileW.KERNEL32(00000000,80000000,00000000,00000000,00000003,00000000,00000000,00000000,?,?,?,?,?,00E1BEF4,?,?), ref: 00E1E754
            • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,00E1BEF4,?,?,00000000,?), ref: 00E1E76B
            • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,00E1BEF4,?,?,00000000,?), ref: 00E1E776
            • CloseHandle.KERNEL32(00000000,?,?,?,?,00E1BEF4,?,?,00000000,?), ref: 00E1E783
            • GlobalLock.KERNEL32(00000000), ref: 00E1E78C
            • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,?,?,?,00E1BEF4,?,?,00000000,?), ref: 00E1E79B
            • GlobalUnlock.KERNEL32(00000000), ref: 00E1E7A4
            • CloseHandle.KERNEL32(00000000,?,?,?,?,00E1BEF4,?,?,00000000,?), ref: 00E1E7AB
            • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,?,?,00E1BEF4,?,?,00000000,?), ref: 00E1E7BC
            • OleLoadPicture.OLEAUT32(?,00000000,00000000,00E3D9BC,?), ref: 00E1E7D5
            • GlobalFree.KERNEL32(00000000), ref: 00E1E7E5
            • GetObjectW.GDI32(00000000,00000018,?), ref: 00E1E809
            • CopyImage.USER32(00000000,00000000,?,?,00002000), ref: 00E1E834
            • DeleteObject.GDI32(00000000), ref: 00E1E85C
            • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 00E1E872
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
            • String ID:
            • API String ID: 3840717409-0
            • Opcode ID: 904984729eb537e76c516599e142181269a5397fa5ddb0f497b3bc36872537cf
            • Instruction ID: e9b038e71a93b95dcb3c047c9cc1cc35bab0a9ccb7c9ac9173a5b43df2958e0a
            • Opcode Fuzzy Hash: 904984729eb537e76c516599e142181269a5397fa5ddb0f497b3bc36872537cf
            • Instruction Fuzzy Hash: C8414975600208EFDB119F66EC8CEAB7BB9EF89715F104058F916A72A0C7309D45DB20
            APIs
            • __wsplitpath.LIBCMT ref: 00E0076F
            • _wcscat.LIBCMT ref: 00E00787
            • _wcscat.LIBCMT ref: 00E00799
            • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00E007AE
            • SetCurrentDirectoryW.KERNEL32(?), ref: 00E007C2
            • GetFileAttributesW.KERNEL32(?), ref: 00E007DA
            • SetFileAttributesW.KERNEL32(?,00000000), ref: 00E007F4
            • SetCurrentDirectoryW.KERNEL32(?), ref: 00E00806
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: CurrentDirectory$AttributesFile_wcscat$__wsplitpath
            • String ID: *.*
            • API String ID: 34673085-438819550
            • Opcode ID: 72ad17363a8d43fdc1ad7778665a3adf2f9947b6819ff319667e2928fda85112
            • Instruction ID: c574429bf015e935f82d81ff0956553dd4cef46d13070223b96f9141240229ce
            • Opcode Fuzzy Hash: 72ad17363a8d43fdc1ad7778665a3adf2f9947b6819ff319667e2928fda85112
            • Instruction Fuzzy Hash: 6081B3715043419FCB24DF24D844AAEB7E9FBC8304F18982EF885E7291EB35D9948B62
            APIs
              • Part of subcall function 00DCB34E: GetWindowLongW.USER32(?,000000EB), ref: 00DCB35F
            • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 00E1EF3B
            • GetFocus.USER32 ref: 00E1EF4B
            • GetDlgCtrlID.USER32(00000000), ref: 00E1EF56
            • _memset.LIBCMT ref: 00E1F081
            • GetMenuItemInfoW.USER32 ref: 00E1F0AC
            • GetMenuItemCount.USER32(00000000), ref: 00E1F0CC
            • GetMenuItemID.USER32(?,00000000), ref: 00E1F0DF
            • GetMenuItemInfoW.USER32(00000000,-00000001,00000001,?), ref: 00E1F113
            • GetMenuItemInfoW.USER32(00000000,?,00000001,?), ref: 00E1F15B
            • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00E1F193
            • DefDlgProcW.USER32(?,00000111,?,?,?,?,?,?,?), ref: 00E1F1C8
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow_memset
            • String ID: 0
            • API String ID: 1296962147-4108050209
            • Opcode ID: d59f2c49697dbb32535ff68762cee2b96c5a1a33f4202fc9e1253488d418e1ba
            • Instruction ID: 4c97f208977ef7c2edfdb3a2096e3b0d833244d5f3e4e6e45fa8a4a544a7cb49
            • Opcode Fuzzy Hash: d59f2c49697dbb32535ff68762cee2b96c5a1a33f4202fc9e1253488d418e1ba
            • Instruction Fuzzy Hash: B381AE71209305EFD710CF15D885AABBBE5FB88318F00552EF999A7292D770D885CBA2
            APIs
              • Part of subcall function 00DEABBB: GetUserObjectSecurity.USER32(?,?,?,00000000,?), ref: 00DEABD7
              • Part of subcall function 00DEABBB: GetLastError.KERNEL32(?,00DEA69F,?,?,?), ref: 00DEABE1
              • Part of subcall function 00DEABBB: GetProcessHeap.KERNEL32(00000008,?,?,00DEA69F,?,?,?), ref: 00DEABF0
              • Part of subcall function 00DEABBB: HeapAlloc.KERNEL32(00000000,?,00DEA69F,?,?,?), ref: 00DEABF7
              • Part of subcall function 00DEABBB: GetUserObjectSecurity.USER32(?,?,00000000,?,?), ref: 00DEAC0E
              • Part of subcall function 00DEAC56: GetProcessHeap.KERNEL32(00000008,00DEA6B5,00000000,00000000,?,00DEA6B5,?), ref: 00DEAC62
              • Part of subcall function 00DEAC56: HeapAlloc.KERNEL32(00000000,?,00DEA6B5,?), ref: 00DEAC69
              • Part of subcall function 00DEAC56: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00DEA6B5,?), ref: 00DEAC7A
            • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00DEA8CB
            • _memset.LIBCMT ref: 00DEA8E0
            • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00DEA8FF
            • GetLengthSid.ADVAPI32(?), ref: 00DEA910
            • GetAce.ADVAPI32(?,00000000,?), ref: 00DEA94D
            • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00DEA969
            • GetLengthSid.ADVAPI32(?), ref: 00DEA986
            • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 00DEA995
            • HeapAlloc.KERNEL32(00000000), ref: 00DEA99C
            • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00DEA9BD
            • CopySid.ADVAPI32(00000000), ref: 00DEA9C4
            • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00DEA9F5
            • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00DEAA1B
            • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00DEAA2F
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
            • String ID:
            • API String ID: 3996160137-0
            • Opcode ID: 50c51a5cb13cd0e03c3a4721d6479e797807d81e9047030bcb24779550811789
            • Instruction ID: aed362c1bcd6a2fa6b35d6f0fafa6462faa5c3bc158cca10f265cfb53e4caf88
            • Opcode Fuzzy Hash: 50c51a5cb13cd0e03c3a4721d6479e797807d81e9047030bcb24779550811789
            • Instruction Fuzzy Hash: 7A515D7190024AAFDF05DFA6DD89AEEBB7AFF04300F048129F811AA250D731A909CB61
            APIs
            • GetDC.USER32(00000000), ref: 00E09E36
            • CreateCompatibleBitmap.GDI32(00000000,00000007,?), ref: 00E09E42
            • CreateCompatibleDC.GDI32(?), ref: 00E09E4E
            • SelectObject.GDI32(00000000,?), ref: 00E09E5B
            • StretchBlt.GDI32(00000006,00000000,00000000,00000007,?,?,?,?,00000007,?,00CC0020), ref: 00E09EAF
            • GetDIBits.GDI32(00000006,?,00000000,00000000,00000000,?,00000000), ref: 00E09EEB
            • GetDIBits.GDI32(00000006,?,00000000,?,00000000,00000028,00000000), ref: 00E09F0F
            • SelectObject.GDI32(00000006,?), ref: 00E09F17
            • DeleteObject.GDI32(?), ref: 00E09F20
            • DeleteDC.GDI32(00000006), ref: 00E09F27
            • ReleaseDC.USER32(00000000,?), ref: 00E09F32
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
            • String ID: (
            • API String ID: 2598888154-3887548279
            • Opcode ID: c243923a6f61bf5a6fe5d28ad4f3a1ad6ac606f615e746ccbe605ad0d03d4d1d
            • Instruction ID: 92247a57ce6f599f3f6133e4862bc4211175019d60745f5dd8c03bef3f9be099
            • Opcode Fuzzy Hash: c243923a6f61bf5a6fe5d28ad4f3a1ad6ac606f615e746ccbe605ad0d03d4d1d
            • Instruction Fuzzy Hash: E2514871A04309EFCB14CFA9DC89EAEBBB9EF48710F14841DF959A7251C731A845CBA0
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: LoadString__swprintf_wprintf
            • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
            • API String ID: 2889450990-2391861430
            • Opcode ID: ec6d26f5dd7c2b77e937aae75b8c469cd4dcc12d8a62c5649b0d7e356f7afc47
            • Instruction ID: b664128159165cc6f16fe67d752281b51b6cd473d11b937d0db2508592e8ed3d
            • Opcode Fuzzy Hash: ec6d26f5dd7c2b77e937aae75b8c469cd4dcc12d8a62c5649b0d7e356f7afc47
            • Instruction Fuzzy Hash: 6C515A3190020DFACB15EBA4DE46EEEB778EF04340F104166F506721A2EB316E69DB71
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: LoadString__swprintf_wprintf
            • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
            • API String ID: 2889450990-3420473620
            • Opcode ID: bbac4ed41650cbaade76d389ce0d88fa7f73472cf5cca5fae65ec62b9117e118
            • Instruction ID: 7ce8e7dfcc8718a6cbf20ed1c6d4b246fa953e2e7510b06abffb4acda46b2291
            • Opcode Fuzzy Hash: bbac4ed41650cbaade76d389ce0d88fa7f73472cf5cca5fae65ec62b9117e118
            • Instruction Fuzzy Hash: 49515931900209FADB15EBE4DE46EEEB778EF04340F104165F606721A2EB716EA9DB71
            APIs
            • CharUpperBuffW.USER32(?,?,?,?,?,?,?,00E12BB5,?,?), ref: 00E13C1D
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: BuffCharUpper
            • String ID: $E$HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
            • API String ID: 3964851224-1752687603
            • Opcode ID: 5ec38b74693f6137f3ffa570fa37ec4b4455255a9ba826c5d9d8fce4010d8b6d
            • Instruction ID: 12e4fb82f190a11ed7b0523349cefa54d74ecfb6c2861a114e83021268b3b0bc
            • Opcode Fuzzy Hash: 5ec38b74693f6137f3ffa570fa37ec4b4455255a9ba826c5d9d8fce4010d8b6d
            • Instruction Fuzzy Hash: 1E4160B015024A8BDF01EF20F952AEB3765FF52344F546458EC663B292EB709E5ACB70
            APIs
            • _memset.LIBCMT ref: 00DF55D7
            • GetMenuItemInfoW.USER32(00000000,00000007,00000000,00000030), ref: 00DF5664
            • GetMenuItemCount.USER32(00E71708), ref: 00DF56ED
            • DeleteMenu.USER32(00E71708,00000005,00000000,000000F5,?,?), ref: 00DF577D
            • DeleteMenu.USER32(00E71708,00000004,00000000), ref: 00DF5785
            • DeleteMenu.USER32(00E71708,00000006,00000000), ref: 00DF578D
            • DeleteMenu.USER32(00E71708,00000003,00000000), ref: 00DF5795
            • GetMenuItemCount.USER32(00E71708), ref: 00DF579D
            • SetMenuItemInfoW.USER32(00E71708,00000004,00000000,00000030), ref: 00DF57D3
            • GetCursorPos.USER32(?), ref: 00DF57DD
            • SetForegroundWindow.USER32(00000000), ref: 00DF57E6
            • TrackPopupMenuEx.USER32(00E71708,00000000,?,00000000,00000000,00000000), ref: 00DF57F9
            • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 00DF5805
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: Menu$DeleteItem$CountInfo$CursorForegroundMessagePopupPostTrackWindow_memset
            • String ID:
            • API String ID: 3993528054-0
            • Opcode ID: a82dad13b52324d627a1b33490af95fe83b16d089fd51f2d6313cdb0786a7c5d
            • Instruction ID: 97033825d50c34b5c83352badea852c68193a90a8b7a25ad4b5114b775d27975
            • Opcode Fuzzy Hash: a82dad13b52324d627a1b33490af95fe83b16d089fd51f2d6313cdb0786a7c5d
            • Instruction Fuzzy Hash: BE710630640A0DBEEB209B15EC49FBABF65FF01368F198205F728AA1D5C7719810D770
            APIs
            • _memset.LIBCMT ref: 00DEA1DC
            • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 00DEA211
            • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 00DEA22D
            • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 00DEA249
            • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 00DEA273
            • CLSIDFromString.OLE32(?,?,?,SOFTWARE\Classes\), ref: 00DEA29B
            • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00DEA2A6
            • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00DEA2AB
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_memset
            • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
            • API String ID: 1687751970-22481851
            • Opcode ID: 09582d6613acda2473e0e5e611cca00b0a10eccf1e28f9804abe9c28c4c4d583
            • Instruction ID: 65ca5aa2fc421f70cb1049a5dcb96b8dcdef6848ae0f0e02a58f809de29018d0
            • Opcode Fuzzy Hash: 09582d6613acda2473e0e5e611cca00b0a10eccf1e28f9804abe9c28c4c4d583
            • Instruction Fuzzy Hash: B141D676C10629ABDB15EBA5EC85DEDB778FF04740F044469E902B31A1EB70AE05CBA0
            APIs
            • __swprintf.LIBCMT ref: 00DF67FD
            • __swprintf.LIBCMT ref: 00DF680A
              • Part of subcall function 00DD172B: __woutput_l.LIBCMT ref: 00DD1784
            • FindResourceW.KERNEL32(?,?,0000000E), ref: 00DF6834
            • LoadResource.KERNEL32(?,00000000), ref: 00DF6840
            • LockResource.KERNEL32(00000000), ref: 00DF684D
            • FindResourceW.KERNEL32(?,?,00000003), ref: 00DF686D
            • LoadResource.KERNEL32(?,00000000), ref: 00DF687F
            • SizeofResource.KERNEL32(?,00000000), ref: 00DF688E
            • LockResource.KERNEL32(?), ref: 00DF689A
            • CreateIconFromResourceEx.USER32(?,?,00000001,00030000,00000000,00000000,00000000), ref: 00DF68F9
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: Resource$FindLoadLock__swprintf$CreateFromIconSizeof__woutput_l
            • String ID: 5
            • API String ID: 1433390588-3632891597
            • Opcode ID: 838d61c161ace91f5339ffa3f4fd68d708cde7aa4f7b7a0e30886c5572750cb0
            • Instruction ID: fcaa4f8d1ef29e9785496cf654dde41024d2325d30d8aa2001a53084f60e2236
            • Opcode Fuzzy Hash: 838d61c161ace91f5339ffa3f4fd68d708cde7aa4f7b7a0e30886c5572750cb0
            • Instruction Fuzzy Hash: A3318E7190021EAFDB109FA1ED49EBB7BA8EF08380F058429FA16E2190E730D955DB70
            APIs
            • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,00E236F4,00000010,?,Bad directive syntax error,00E4DC00,00000000,?,?,?,>>>AUTOIT SCRIPT<<<), ref: 00DF25D6
            • LoadStringW.USER32(00000000,?,00E236F4,00000010), ref: 00DF25DD
            • _wprintf.LIBCMT ref: 00DF2610
            • __swprintf.LIBCMT ref: 00DF2632
            • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 00DF26A1
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: HandleLoadMessageModuleString__swprintf_wprintf
            • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
            • API String ID: 1080873982-4153970271
            • Opcode ID: 69b40ce47279ba873ec31625fe82a7f28e703c31b4014cbb8d0ec57f3208f39f
            • Instruction ID: 22f27efd62387399b2eb1f0863f2f196bfa4c81501df367d0808e0fd300d839d
            • Opcode Fuzzy Hash: 69b40ce47279ba873ec31625fe82a7f28e703c31b4014cbb8d0ec57f3208f39f
            • Instruction Fuzzy Hash: CC21273184021EFECF11ABA0DC4AEEE7B39FB18344F044455F516661A2EA71A628DB70
            APIs
            • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 00DF7B42
            • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 00DF7B58
            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00DF7B69
            • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 00DF7B7B
            • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 00DF7B8C
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: SendString
            • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
            • API String ID: 890592661-1007645807
            • Opcode ID: 639313f09d6a3596c88b717c524200603704f17ac8c0061c8a225c63c640ec1a
            • Instruction ID: f3ef8c6e83406cdc647b72f1cac9a19510476701c8469edcac82e295014f54a7
            • Opcode Fuzzy Hash: 639313f09d6a3596c88b717c524200603704f17ac8c0061c8a225c63c640ec1a
            • Instruction Fuzzy Hash: BD11C4A0A9035DB9D720B775DC4ADFF7B7CEBD2B40F00541AB412B20C1EEA05A45C5B0
            APIs
            • timeGetTime.WINMM ref: 00DF7794
              • Part of subcall function 00DCDC38: timeGetTime.WINMM(?,75A4B400,00E258AB), ref: 00DCDC3C
            • Sleep.KERNEL32(0000000A), ref: 00DF77C0
            • EnumThreadWindows.USER32(?,Function_00047744,00000000), ref: 00DF77E4
            • FindWindowExW.USER32(?,00000000,BUTTON,00000000), ref: 00DF7806
            • SetActiveWindow.USER32 ref: 00DF7825
            • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00DF7833
            • SendMessageW.USER32(00000010,00000000,00000000), ref: 00DF7852
            • Sleep.KERNEL32(000000FA), ref: 00DF785D
            • IsWindow.USER32 ref: 00DF7869
            • EndDialog.USER32(00000000), ref: 00DF787A
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
            • String ID: BUTTON
            • API String ID: 1194449130-3405671355
            • Opcode ID: 291a9b6b909cf951f2cbcbbdbc350e711a7ee8d5b01a21c856b493b715441e59
            • Instruction ID: aa5de1280ba3e25c5a5b91e1dffb6fcf56c8304fc833816e01ae0ed810e1d7d8
            • Opcode Fuzzy Hash: 291a9b6b909cf951f2cbcbbdbc350e711a7ee8d5b01a21c856b493b715441e59
            • Instruction Fuzzy Hash: CF21337420820DBFE7519B32FC8DAB53F6AFB44354F058014F61AA61B2CB719D58D631
            APIs
              • Part of subcall function 00DB936C: __swprintf.LIBCMT ref: 00DB93AB
              • Part of subcall function 00DB936C: __itow.LIBCMT ref: 00DB93DF
            • CoInitialize.OLE32(00000000), ref: 00E0034B
            • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 00E003DE
            • SHGetDesktopFolder.SHELL32(?), ref: 00E003F2
            • CoCreateInstance.OLE32(00E3DA8C,00000000,00000001,00E63CF8,?), ref: 00E0043E
            • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 00E004AD
            • CoTaskMemFree.OLE32(?,?), ref: 00E00505
            • _memset.LIBCMT ref: 00E00542
            • SHBrowseForFolderW.SHELL32(?), ref: 00E0057E
            • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00E005A1
            • CoTaskMemFree.OLE32(00000000), ref: 00E005A8
            • CoTaskMemFree.OLE32(00000000,00000001,00000000), ref: 00E005DF
            • CoUninitialize.OLE32(00000001,00000000), ref: 00E005E1
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize__itow__swprintf_memset
            • String ID:
            • API String ID: 1246142700-0
            • Opcode ID: 1efb1be7033218071b40eb4213165d3a0d3a9f424094620060d4dbe40a774949
            • Instruction ID: ff350c2f042f68cc03fc6a3366cc3fa2aa4b25f4ba37ba2c63ee27c30ee49d4a
            • Opcode Fuzzy Hash: 1efb1be7033218071b40eb4213165d3a0d3a9f424094620060d4dbe40a774949
            • Instruction Fuzzy Hash: DEB1E875A00209AFDB14DFA4D888EAEBBB9FF48304F149459F916EB251DB30ED45CB60
            APIs
            • GetKeyboardState.USER32(?), ref: 00DF2ED6
            • SetKeyboardState.USER32(?), ref: 00DF2F41
            • GetAsyncKeyState.USER32(000000A0), ref: 00DF2F61
            • GetKeyState.USER32(000000A0), ref: 00DF2F78
            • GetAsyncKeyState.USER32(000000A1), ref: 00DF2FA7
            • GetKeyState.USER32(000000A1), ref: 00DF2FB8
            • GetAsyncKeyState.USER32(00000011), ref: 00DF2FE4
            • GetKeyState.USER32(00000011), ref: 00DF2FF2
            • GetAsyncKeyState.USER32(00000012), ref: 00DF301B
            • GetKeyState.USER32(00000012), ref: 00DF3029
            • GetAsyncKeyState.USER32(0000005B), ref: 00DF3052
            • GetKeyState.USER32(0000005B), ref: 00DF3060
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: State$Async$Keyboard
            • String ID:
            • API String ID: 541375521-0
            • Opcode ID: 10b9c953f5cd9fb7a305ba723058e04a1b543c4b2d16227c54ceb735ebcc225d
            • Instruction ID: c7f7068eb601a7280c6d5b5eefba5052a8a8d963347b14ee8a5ef8d087393bd5
            • Opcode Fuzzy Hash: 10b9c953f5cd9fb7a305ba723058e04a1b543c4b2d16227c54ceb735ebcc225d
            • Instruction Fuzzy Hash: 6951B660A0878C29FB35DBA488117FABFB49F11344F0EC59AD7C25A1C2DA549B8CC772
            APIs
            • GetDlgItem.USER32(?,00000001), ref: 00DEED1E
            • GetWindowRect.USER32(00000000,?), ref: 00DEED30
            • MoveWindow.USER32(00000001,0000000A,?,00000001,?,00000000), ref: 00DEED8E
            • GetDlgItem.USER32(?,00000002), ref: 00DEED99
            • GetWindowRect.USER32(00000000,?), ref: 00DEEDAB
            • MoveWindow.USER32(00000001,?,00000000,00000001,?,00000000), ref: 00DEEE01
            • GetDlgItem.USER32(?,000003E9), ref: 00DEEE0F
            • GetWindowRect.USER32(00000000,?), ref: 00DEEE20
            • MoveWindow.USER32(00000000,0000000A,00000000,?,?,00000000), ref: 00DEEE63
            • GetDlgItem.USER32(?,000003EA), ref: 00DEEE71
            • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 00DEEE8E
            • InvalidateRect.USER32(?,00000000,00000001), ref: 00DEEE9B
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: Window$ItemMoveRect$Invalidate
            • String ID:
            • API String ID: 3096461208-0
            • Opcode ID: e26e079c8960159a3322054ae8d62a19ce9a182b8725de88436d840d0719cdaa
            • Instruction ID: a3c3741c27599130136094fb022fb7c96ff79104d902bcb50035fb230b8e1d29
            • Opcode Fuzzy Hash: e26e079c8960159a3322054ae8d62a19ce9a182b8725de88436d840d0719cdaa
            • Instruction Fuzzy Hash: FB512771B04609AFDF18DF69DD8AAAEBBB9FB88710F14812DF519E7290D7709D048B10
            APIs
              • Part of subcall function 00DCB9FF: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00DCB759,?,00000000,?,?,?,?,00DCB72B,00000000,?), ref: 00DCBA58
            • DestroyWindow.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?,?,?,?,00DCB72B), ref: 00DCB7F6
            • KillTimer.USER32(00000000,?,00000000,?,?,?,?,00DCB72B,00000000,?,?,00DCB2EF,?,?), ref: 00DCB88D
            • DestroyAcceleratorTable.USER32(00000000), ref: 00E2D8A6
            • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00DCB72B,00000000,?,?,00DCB2EF,?,?), ref: 00E2D8D7
            • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00DCB72B,00000000,?,?,00DCB2EF,?,?), ref: 00E2D8EE
            • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00DCB72B,00000000,?,?,00DCB2EF,?,?), ref: 00E2D90A
            • DeleteObject.GDI32(00000000), ref: 00E2D91C
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
            • String ID:
            • API String ID: 641708696-0
            • Opcode ID: 82b320b595e7e40aa4696965b2db441156e8ef4a6f8cf62139ecd06ee49eb475
            • Instruction ID: 2374db653893c3b1552f2d465429091037ebe98115992a9fc498466cd610374d
            • Opcode Fuzzy Hash: 82b320b595e7e40aa4696965b2db441156e8ef4a6f8cf62139ecd06ee49eb475
            • Instruction Fuzzy Hash: BE618B30504712DFDB298F5AEC8AB257BA5FF90725F14111EE586A7AA0C770E884CFA0
            APIs
              • Part of subcall function 00DCB526: GetWindowLongW.USER32(?,000000EB), ref: 00DCB537
            • GetSysColor.USER32(0000000F), ref: 00DCB438
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: ColorLongWindow
            • String ID:
            • API String ID: 259745315-0
            • Opcode ID: f111dd1f3b9ee10718c5158c438500823090ebf8b3d7df593685b15418d9045f
            • Instruction ID: f82babd77341ee613b19b3fc5dcde399df3509691d42b7c623acca8d3e807cac
            • Opcode Fuzzy Hash: f111dd1f3b9ee10718c5158c438500823090ebf8b3d7df593685b15418d9045f
            • Instruction Fuzzy Hash: 0741BF3000D515AFCB245F28AC8AFB93B65AB05734F18425AF9659F1E2C731CC41D731
            APIs
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: _wcscat_wcscpy$__wsplitpath$_wcschr
            • String ID:
            • API String ID: 136442275-0
            • Opcode ID: e1227600ee634b8d423f04a14847deba96461f6b8931e4d0a6d94aff8ceeb26d
            • Instruction ID: 692984ba1394c8268efb7995717ee031388fc30e50ce40d3d1ec3c106cfdaed5
            • Opcode Fuzzy Hash: e1227600ee634b8d423f04a14847deba96461f6b8931e4d0a6d94aff8ceeb26d
            • Instruction Fuzzy Hash: 56414E7684511CAECF61DB94DC42DDA77BDEB84300F0041E7B649A2141EB70ABE88F70
            APIs
            • CharLowerBuffW.USER32(00E4DC00,00E4DC00,00E4DC00), ref: 00DFD7CE
            • GetDriveTypeW.KERNEL32(?,00E63A70,00000061), ref: 00DFD898
            • _wcscpy.LIBCMT ref: 00DFD8C2
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: BuffCharDriveLowerType_wcscpy
            • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
            • API String ID: 2820617543-1000479233
            • Opcode ID: 1a61fd7261f0508c346b76f59247eb80dfdf7bc953762619d3c2b598af6d6c58
            • Instruction ID: a89288414e09b56ba24a36835c69ca41633392948f37a98028978701bb62e44f
            • Opcode Fuzzy Hash: 1a61fd7261f0508c346b76f59247eb80dfdf7bc953762619d3c2b598af6d6c58
            • Instruction Fuzzy Hash: 8451A031108309AFC700EF14D892BBEB7A6EF84354F14C92DF69A572A2DB71D905DA72
            APIs
            • __swprintf.LIBCMT ref: 00DB93AB
            • __itow.LIBCMT ref: 00DB93DF
              • Part of subcall function 00DD1557: _xtow@16.LIBCMT ref: 00DD1578
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: __itow__swprintf_xtow@16
            • String ID: %.15g$0x%p$False$True
            • API String ID: 1502193981-2263619337
            • Opcode ID: 817dd73413d92f9d1d5a70e9864bcef2294bd230e778223b1904a7f2b97bc15a
            • Instruction ID: 1d56d1f5b4b74736869fc5b6378d4624c14a2c3b79a9a83d8acd22d7bdfb0c39
            • Opcode Fuzzy Hash: 817dd73413d92f9d1d5a70e9864bcef2294bd230e778223b1904a7f2b97bc15a
            • Instruction Fuzzy Hash: 1B41B4B1504215EBEB28DB78E952FAAB7E5EF44304F24446EE54AE72C1EA31D941CB30
            APIs
            • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 00E1A259
            • CreateCompatibleDC.GDI32(00000000), ref: 00E1A260
            • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 00E1A273
            • SelectObject.GDI32(00000000,00000000), ref: 00E1A27B
            • GetPixel.GDI32(00000000,00000000,00000000), ref: 00E1A286
            • DeleteDC.GDI32(00000000), ref: 00E1A28F
            • GetWindowLongW.USER32(?,000000EC), ref: 00E1A299
            • SetLayeredWindowAttributes.USER32(?,00000000,00000000,00000001), ref: 00E1A2AD
            • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?,?), ref: 00E1A2B9
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
            • String ID: static
            • API String ID: 2559357485-2160076837
            • Opcode ID: de44eff1f1e1febd033f128bc609d28e64e6497dbd5056d296539f0bfe43814e
            • Instruction ID: 3c37eeaeb06d0837d13350367ea0a1877b0f1fe3a470a343d13eb02a235eb71b
            • Opcode Fuzzy Hash: de44eff1f1e1febd033f128bc609d28e64e6497dbd5056d296539f0bfe43814e
            • Instruction Fuzzy Hash: 7631AE31101218AFDF115FA5EC09FEA3F69FF09364F140224FA19B20A0C731D860DBA0
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: _wcscpy$CleanupStartup_strcatgethostbynamegethostnameinet_ntoa
            • String ID: 0.0.0.0
            • API String ID: 2620052-3771769585
            • Opcode ID: 33508a59fb397228e6e6ee4d7f4c3f5c01e8bbbcea7e61ea5b7bf7a6be9bf470
            • Instruction ID: b2e85c25b254a0ca7bd4c854c3db7d4d7e9db5ec4aaf142caa38586d16da0786
            • Opcode Fuzzy Hash: 33508a59fb397228e6e6ee4d7f4c3f5c01e8bbbcea7e61ea5b7bf7a6be9bf470
            • Instruction Fuzzy Hash: 2111B47250821DAFCB24AB71BC4AEEA7BACEF40710F054166F245A6191EF70DA858A70
            APIs
            • _memset.LIBCMT ref: 00DD5047
              • Part of subcall function 00DD7C0E: __getptd_noexit.LIBCMT ref: 00DD7C0E
            • __gmtime64_s.LIBCMT ref: 00DD50E0
            • __gmtime64_s.LIBCMT ref: 00DD5116
            • __gmtime64_s.LIBCMT ref: 00DD5133
            • __allrem.LIBCMT ref: 00DD5189
            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00DD51A5
            • __allrem.LIBCMT ref: 00DD51BC
            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00DD51DA
            • __allrem.LIBCMT ref: 00DD51F1
            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00DD520F
            • __invoke_watson.LIBCMT ref: 00DD5280
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@__gmtime64_s$__getptd_noexit__invoke_watson_memset
            • String ID:
            • API String ID: 384356119-0
            • Opcode ID: d5e017027a87c5018ad803d53256558374d4b82fb585307daa6d96de3ac92c4c
            • Instruction ID: 374b8e551560e551409121b96f4a1552fb4f9c0858ad51f837a6b94f62d7c255
            • Opcode Fuzzy Hash: d5e017027a87c5018ad803d53256558374d4b82fb585307daa6d96de3ac92c4c
            • Instruction Fuzzy Hash: AD71D871A00B16ABE714AE79DC42B6A77A8EF14764F18422BF410DA385E770DD408BF0
            APIs
            • _memset.LIBCMT ref: 00DF4DF8
            • GetMenuItemInfoW.USER32(00E71708,000000FF,00000000,00000030), ref: 00DF4E59
            • SetMenuItemInfoW.USER32(00E71708,00000004,00000000,00000030), ref: 00DF4E8F
            • Sleep.KERNEL32(000001F4), ref: 00DF4EA1
            • GetMenuItemCount.USER32(?), ref: 00DF4EE5
            • GetMenuItemID.USER32(?,00000000), ref: 00DF4F01
            • GetMenuItemID.USER32(?,-00000001), ref: 00DF4F2B
            • GetMenuItemID.USER32(?,?), ref: 00DF4F70
            • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00DF4FB6
            • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00DF4FCA
            • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00DF4FEB
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: ItemMenu$Info$CheckCountRadioSleep_memset
            • String ID:
            • API String ID: 4176008265-0
            • Opcode ID: 6376b3d219c2afa743c72164750dc4793c381e9ee1cb1d148de71509ad043096
            • Instruction ID: 5b9dbc81c96a1e849cfe8e09ff213b86e7235d4f2f154bbc6020c85c67232002
            • Opcode Fuzzy Hash: 6376b3d219c2afa743c72164750dc4793c381e9ee1cb1d148de71509ad043096
            • Instruction Fuzzy Hash: 2A61587190428DAFDB21CFA8D888ABF7BB8EF41318F198159F646A7251D731AD45CB30
            APIs
            • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00E19C98
            • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00E19C9B
            • GetWindowLongW.USER32(?,000000F0), ref: 00E19CBF
            • _memset.LIBCMT ref: 00E19CD0
            • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00E19CE2
            • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00E19D5A
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: MessageSend$LongWindow_memset
            • String ID:
            • API String ID: 830647256-0
            • Opcode ID: 5b7016080aafac2d3139f7300c8edb0a63c3f91d155b464c7d7c686aab8a2222
            • Instruction ID: 0a65392913a05dfcfa90ecc63173e83082a9a438fa2f5e07f43a1190766e62fc
            • Opcode Fuzzy Hash: 5b7016080aafac2d3139f7300c8edb0a63c3f91d155b464c7d7c686aab8a2222
            • Instruction Fuzzy Hash: 71618E75900208AFDB10DFA8DC81EEEB7B8EF09714F144199FA15E7292D770AD85DB60
            APIs
            • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,00000000,?), ref: 00DE94FE
            • SafeArrayAllocData.OLEAUT32(?), ref: 00DE9549
            • VariantInit.OLEAUT32(?), ref: 00DE955B
            • SafeArrayAccessData.OLEAUT32(?,?), ref: 00DE957B
            • VariantCopy.OLEAUT32(?,?), ref: 00DE95BE
            • SafeArrayUnaccessData.OLEAUT32(?), ref: 00DE95D2
            • VariantClear.OLEAUT32(?), ref: 00DE95E7
            • SafeArrayDestroyData.OLEAUT32(?), ref: 00DE95F4
            • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00DE95FD
            • VariantClear.OLEAUT32(?), ref: 00DE960F
            • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00DE961A
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
            • String ID:
            • API String ID: 2706829360-0
            • Opcode ID: e987f01657ffe6708fbcd30eced12511088ce054aba491e7d54adece8abe30e6
            • Instruction ID: 446d3a60572e39e136fc71486a220e9bbe3d4c30f46a010fd3f6033767c133f1
            • Opcode Fuzzy Hash: e987f01657ffe6708fbcd30eced12511088ce054aba491e7d54adece8abe30e6
            • Instruction Fuzzy Hash: 81412B71900219AFCB01EFA6EC589DEBF79EF08354F008069E512A7251DB70AA45CBB0
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: Variant$ClearInit$_memset
            • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop$h?$|?
            • API String ID: 2862541840-300242882
            • Opcode ID: b9fa839bca048f10a038966576ff88f5d62823cf19b4090ab9b0d10256bce1f3
            • Instruction ID: 58426f78524521d2ac6682cb3d680e578d19ae8b24c5e6f9fb43a207669117bd
            • Opcode Fuzzy Hash: b9fa839bca048f10a038966576ff88f5d62823cf19b4090ab9b0d10256bce1f3
            • Instruction Fuzzy Hash: 4A916071A00219ABDB24CFA5D888FEEBBB8FF85714F109559F515BB280D7709984CFA0
            APIs
              • Part of subcall function 00DB936C: __swprintf.LIBCMT ref: 00DB93AB
              • Part of subcall function 00DB936C: __itow.LIBCMT ref: 00DB93DF
            • CoInitialize.OLE32 ref: 00E0ADF6
            • CoUninitialize.OLE32 ref: 00E0AE01
            • CoCreateInstance.OLE32(?,00000000,00000017,00E3D8FC,?), ref: 00E0AE61
            • IIDFromString.OLE32(?,?), ref: 00E0AED4
            • VariantInit.OLEAUT32(?), ref: 00E0AF6E
            • VariantClear.OLEAUT32(?), ref: 00E0AFCF
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize__itow__swprintf
            • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
            • API String ID: 834269672-1287834457
            • Opcode ID: a0e40ea002862434975052d68c23616975cfef98b4f1e90a6eaf10e19e5a008c
            • Instruction ID: 582d64689632bc2f831bec4f95f5e0ffc07ed30c547fd7e9eedc126e0641fd36
            • Opcode Fuzzy Hash: a0e40ea002862434975052d68c23616975cfef98b4f1e90a6eaf10e19e5a008c
            • Instruction Fuzzy Hash: 08618B712083169FC711DF54D848BAABBE8EF44714F185429F985AB2D1C770ED89CBA3
            APIs
            • WSAStartup.WSOCK32(00000101,?), ref: 00E08168
            • inet_addr.WSOCK32(?,?,?), ref: 00E081AD
            • gethostbyname.WSOCK32(?), ref: 00E081B9
            • IcmpCreateFile.IPHLPAPI ref: 00E081C7
            • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 00E08237
            • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 00E0824D
            • IcmpCloseHandle.IPHLPAPI(00000000), ref: 00E082C2
            • WSACleanup.WSOCK32 ref: 00E082C8
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
            • String ID: Ping
            • API String ID: 1028309954-2246546115
            • Opcode ID: 7dd0bbdeb6c6eb1fa48f5c820429df783fbf72abd162d76558ca3ab0b9e709c6
            • Instruction ID: 6ce6d06450909d1ad4af9f7eb12f9995174f20681ed86e4aabbaae1e4dc5ae6d
            • Opcode Fuzzy Hash: 7dd0bbdeb6c6eb1fa48f5c820429df783fbf72abd162d76558ca3ab0b9e709c6
            • Instruction Fuzzy Hash: C451C1316047019FD710DF65DE49B6ABBE5EF48310F04882AFA96E72E1DB70E944CB61
            APIs
            • _memset.LIBCMT ref: 00E19E5B
            • CreateMenu.USER32 ref: 00E19E76
            • SetMenu.USER32(?,00000000), ref: 00E19E85
            • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00E19F12
            • IsMenu.USER32(?), ref: 00E19F28
            • CreatePopupMenu.USER32 ref: 00E19F32
            • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00E19F63
            • DrawMenuBar.USER32 ref: 00E19F71
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: Menu$CreateItem$DrawInfoInsertPopup_memset
            • String ID: 0
            • API String ID: 176399719-4108050209
            • Opcode ID: 92607f29d76ae287f1e17a7fa9ba4f207d1ab3c91f9c93b708fcec19ed5fcc6a
            • Instruction ID: 9696156f8dbc307e1ee7033e59bd647c2188a5e4e9a207b122387d081f9137de
            • Opcode Fuzzy Hash: 92607f29d76ae287f1e17a7fa9ba4f207d1ab3c91f9c93b708fcec19ed5fcc6a
            • Instruction Fuzzy Hash: BC417C74A00209EFDB10DFA5D858BEABBB5FF48314F144019F946A7361D734A994CF50
            APIs
            • SetErrorMode.KERNEL32(00000001), ref: 00DFE396
            • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 00DFE40C
            • GetLastError.KERNEL32 ref: 00DFE416
            • SetErrorMode.KERNEL32(00000000,READY), ref: 00DFE483
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: Error$Mode$DiskFreeLastSpace
            • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
            • API String ID: 4194297153-14809454
            • Opcode ID: 909bc602b3828dd0eb1b1f23b1fcc5e15d2d10ae3ae641b48010d0a3090891c1
            • Instruction ID: 853481067fcd2f56756616960d42191621877eec7dc0c687d98f56a0f47fdd26
            • Opcode Fuzzy Hash: 909bc602b3828dd0eb1b1f23b1fcc5e15d2d10ae3ae641b48010d0a3090891c1
            • Instruction Fuzzy Hash: 66314135A4020DDFDB01EBA8D945ABDBBB4EF44340F15C069FA16A72A1DA70DA01CBB1
            APIs
            • SendMessageW.USER32(?,0000018C,000000FF,00000002), ref: 00DEB98C
            • GetDlgCtrlID.USER32 ref: 00DEB997
            • GetParent.USER32 ref: 00DEB9B3
            • SendMessageW.USER32(00000000,?,00000111,?), ref: 00DEB9B6
            • GetDlgCtrlID.USER32(?), ref: 00DEB9BF
            • GetParent.USER32(?), ref: 00DEB9DB
            • SendMessageW.USER32(00000000,?,?,00000111), ref: 00DEB9DE
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: MessageSend$CtrlParent
            • String ID: ComboBox$ListBox
            • API String ID: 1383977212-1403004172
            • Opcode ID: 52ed808e5a5073d0a4223f11e72689217e220dbaa9375bd037a6fe4b9bc342e3
            • Instruction ID: 63a0b79e57b5c81d74fde332c2c463ea914c0c390915f64abe908c3e014eaf18
            • Opcode Fuzzy Hash: 52ed808e5a5073d0a4223f11e72689217e220dbaa9375bd037a6fe4b9bc342e3
            • Instruction Fuzzy Hash: CC21A4B4900108AFDB05ABA5DC86EFEBBB5EB45310B10011AF662A72D2DB7599199F30
            APIs
            • SendMessageW.USER32(?,00000186,00000002,00000000), ref: 00DEBA73
            • GetDlgCtrlID.USER32 ref: 00DEBA7E
            • GetParent.USER32 ref: 00DEBA9A
            • SendMessageW.USER32(00000000,?,00000111,?), ref: 00DEBA9D
            • GetDlgCtrlID.USER32(?), ref: 00DEBAA6
            • GetParent.USER32(?), ref: 00DEBAC2
            • SendMessageW.USER32(00000000,?,?,00000111), ref: 00DEBAC5
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: MessageSend$CtrlParent
            • String ID: ComboBox$ListBox
            • API String ID: 1383977212-1403004172
            • Opcode ID: 607939917bef864c02a3401c09c61ee3624abf3e12742ac296535f1edd4f3932
            • Instruction ID: 7ba5f7761b95011326d33a2732dc690032c76f84383a5be0dcafce33d9737d1c
            • Opcode Fuzzy Hash: 607939917bef864c02a3401c09c61ee3624abf3e12742ac296535f1edd4f3932
            • Instruction Fuzzy Hash: 4221B0B4A40248BFDF01ABA5DC86EFEBB79EF45310F14001AF562A3191DBB599199B30
            APIs
            • GetParent.USER32 ref: 00DEBAE3
            • GetClassNameW.USER32(00000000,?,00000100), ref: 00DEBAF8
            • _wcscmp.LIBCMT ref: 00DEBB0A
            • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00DEBB85
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: ClassMessageNameParentSend_wcscmp
            • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
            • API String ID: 1704125052-3381328864
            • Opcode ID: 4cda4902a384f04c830e925080a50cdc9efe7ffe80f595bd0d5c14f3f1c35797
            • Instruction ID: e34b3358c9852934d853ff64030e92607686a6d7e62333013db54a8b5367065f
            • Opcode Fuzzy Hash: 4cda4902a384f04c830e925080a50cdc9efe7ffe80f595bd0d5c14f3f1c35797
            • Instruction Fuzzy Hash: 0911CE76648786FAFA207632EC0BDA73B98DF51774B200027FA58F40D9EBA2A8114534
            APIs
            • VariantInit.OLEAUT32(?), ref: 00E0B2D5
            • CoInitialize.OLE32(00000000), ref: 00E0B302
            • CoUninitialize.OLE32 ref: 00E0B30C
            • GetRunningObjectTable.OLE32(00000000,?), ref: 00E0B40C
            • SetErrorMode.KERNEL32(00000001,00000029), ref: 00E0B539
            • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002), ref: 00E0B56D
            • CoGetObject.OLE32(?,00000000,00E3D91C,?), ref: 00E0B590
            • SetErrorMode.KERNEL32(00000000), ref: 00E0B5A3
            • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00E0B623
            • VariantClear.OLEAUT32(00E3D91C), ref: 00E0B633
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize
            • String ID:
            • API String ID: 2395222682-0
            • Opcode ID: b24d3ca17af19dd7526d75b28786f572ad9b10ca4ca8384416514ee77944df72
            • Instruction ID: 9d9567e23caf731cce1a7033417cd4c161e7ea5a577c2866699881b02c46a2e8
            • Opcode Fuzzy Hash: b24d3ca17af19dd7526d75b28786f572ad9b10ca4ca8384416514ee77944df72
            • Instruction Fuzzy Hash: 02C13371608305AFC704DF64C884A6BBBE9FF88708F00595DF58AAB291DB71ED45CB62
            APIs
            • __lock.LIBCMT ref: 00DDACC1
              • Part of subcall function 00DD7CF4: __mtinitlocknum.LIBCMT ref: 00DD7D06
              • Part of subcall function 00DD7CF4: EnterCriticalSection.KERNEL32(00000000,?,00DD7ADD,0000000D), ref: 00DD7D1F
            • __calloc_crt.LIBCMT ref: 00DDACD2
              • Part of subcall function 00DD6986: __calloc_impl.LIBCMT ref: 00DD6995
              • Part of subcall function 00DD6986: Sleep.KERNEL32(00000000,000003BC,00DCF507,?,0000000E), ref: 00DD69AC
            • @_EH4_CallFilterFunc@8.LIBCMT ref: 00DDACED
            • GetStartupInfoW.KERNEL32(?,00E66E28,00000064,00DD5E91,00E66C70,00000014), ref: 00DDAD46
            • __calloc_crt.LIBCMT ref: 00DDAD91
            • GetFileType.KERNEL32(00000001), ref: 00DDADD8
            • InitializeCriticalSectionAndSpinCount.KERNEL32(0000000D,00000FA0), ref: 00DDAE11
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: CriticalSection__calloc_crt$CallCountEnterFileFilterFunc@8InfoInitializeSleepSpinStartupType__calloc_impl__lock__mtinitlocknum
            • String ID:
            • API String ID: 1426640281-0
            • Opcode ID: d480cf1e1158684ac7a0c78532c9d26f802d360f3d78263fd9b9d51265902f85
            • Instruction ID: 2e5c326180d19943dfd2b8ba3dbe926672e3c69cded31d6585a11b414195f91f
            • Opcode Fuzzy Hash: d480cf1e1158684ac7a0c78532c9d26f802d360f3d78263fd9b9d51265902f85
            • Instruction Fuzzy Hash: 9E81D271A053458FDB14CF7CC8405A9BBF0AF45320B28825EE4AAAB3E1D734D843CB66
            APIs
            • GetCurrentThreadId.KERNEL32 ref: 00DF4047
            • GetForegroundWindow.USER32(00000000,?,?,?,?,?,00DF30A5,?,00000001), ref: 00DF405B
            • GetWindowThreadProcessId.USER32(00000000), ref: 00DF4062
            • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00DF30A5,?,00000001), ref: 00DF4071
            • GetWindowThreadProcessId.USER32(?,00000000), ref: 00DF4083
            • AttachThreadInput.USER32(?,00000000,00000001,?,?,?,?,?,00DF30A5,?,00000001), ref: 00DF409C
            • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00DF30A5,?,00000001), ref: 00DF40AE
            • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,00DF30A5,?,00000001), ref: 00DF40F3
            • AttachThreadInput.USER32(?,?,00000000,?,?,?,?,?,00DF30A5,?,00000001), ref: 00DF4108
            • AttachThreadInput.USER32(00000000,?,00000000,?,?,?,?,?,00DF30A5,?,00000001), ref: 00DF4113
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: Thread$AttachInput$Window$Process$CurrentForeground
            • String ID:
            • API String ID: 2156557900-0
            • Opcode ID: 735034c2dfa59161b1f62a04b62d428cd6ba077b63e2b294eecf38df89ac3927
            • Instruction ID: a37209c6ad5715d9b82061ae5d04bc1728d0b31fa91f69384107b745ef8ef5dc
            • Opcode Fuzzy Hash: 735034c2dfa59161b1f62a04b62d428cd6ba077b63e2b294eecf38df89ac3927
            • Instruction Fuzzy Hash: DA31C575500209BFEB12DF66EC4AB7AB7BDAB90311F15C006FA08F6260CB74D9848B71
            APIs
            • GetSysColor.USER32(00000008), ref: 00DCB496
            • SetTextColor.GDI32(?,000000FF), ref: 00DCB4A0
            • SetBkMode.GDI32(?,00000001), ref: 00DCB4B5
            • GetStockObject.GDI32(00000005), ref: 00DCB4BD
            • GetClientRect.USER32(?), ref: 00E2DD63
            • SendMessageW.USER32(?,00001328,00000000,?), ref: 00E2DD7A
            • GetWindowDC.USER32(?), ref: 00E2DD86
            • GetPixel.GDI32(00000000,?,?), ref: 00E2DD95
            • ReleaseDC.USER32(?,00000000), ref: 00E2DDA7
            • GetSysColor.USER32(00000005), ref: 00E2DDC5
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: Color$ClientMessageModeObjectPixelRectReleaseSendStockTextWindow
            • String ID:
            • API String ID: 3430376129-0
            • Opcode ID: 8e96ff1361e042c40baa16ccf6f03039a0ab8d04dbfe451c17b1db19ea18bf58
            • Instruction ID: 1c1c6d740937363dc06e949fdfe17cb330807daf2a49224de7a7aa611330c242
            • Opcode Fuzzy Hash: 8e96ff1361e042c40baa16ccf6f03039a0ab8d04dbfe451c17b1db19ea18bf58
            • Instruction Fuzzy Hash: 62116731508609FFDB216BB5FC0EFA97F61EB04325F108265FA66A50E2CB324945EB20
            APIs
            • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00DB30DC
            • CoUninitialize.OLE32(?,00000000), ref: 00DB3181
            • UnregisterHotKey.USER32(?), ref: 00DB32A9
            • DestroyWindow.USER32(?), ref: 00E25079
            • FreeLibrary.KERNEL32(?), ref: 00E250F8
            • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00E25125
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
            • String ID: close all
            • API String ID: 469580280-3243417748
            • Opcode ID: 8b8c9637aa61e84b2662494fcc7e49ad9e61ed0ef7a23247ea23569d182ddd28
            • Instruction ID: 17bf86699f707335451ff09e97b332d94923fb813768d1b60d3341919ff4027c
            • Opcode Fuzzy Hash: 8b8c9637aa61e84b2662494fcc7e49ad9e61ed0ef7a23247ea23569d182ddd28
            • Instruction Fuzzy Hash: B9912831600216CFC705EF14D995FA8F3A4FF04304F5452A9E50AA7262DF30AE6ADF64
            APIs
            • SetWindowLongW.USER32(?,000000EB), ref: 00DCCC15
              • Part of subcall function 00DCCCCD: GetClientRect.USER32(?,?), ref: 00DCCCF6
              • Part of subcall function 00DCCCCD: GetWindowRect.USER32(?,?), ref: 00DCCD37
              • Part of subcall function 00DCCCCD: ScreenToClient.USER32(?,?), ref: 00DCCD5F
            • GetDC.USER32 ref: 00E2D137
            • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 00E2D14A
            • SelectObject.GDI32(00000000,00000000), ref: 00E2D158
            • SelectObject.GDI32(00000000,00000000), ref: 00E2D16D
            • ReleaseDC.USER32(?,00000000), ref: 00E2D175
            • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 00E2D200
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
            • String ID: U
            • API String ID: 4009187628-3372436214
            • Opcode ID: 1d83d591f36d3e537d94224d9e59912e594d4c427c64db83aec292abf9628f50
            • Instruction ID: 05ee41e3cbc99da120c12d0f2f65c2d14d86695d38e1323747c4e66ad7447ba8
            • Opcode Fuzzy Hash: 1d83d591f36d3e537d94224d9e59912e594d4c427c64db83aec292abf9628f50
            • Instruction Fuzzy Hash: EA71B031404209DFCF219F64EC85EEA7BB6FF48314F186269EE596B2A5C7318891DB60
            APIs
              • Part of subcall function 00DCB34E: GetWindowLongW.USER32(?,000000EB), ref: 00DCB35F
              • Part of subcall function 00DCB63C: GetCursorPos.USER32(000000FF), ref: 00DCB64F
              • Part of subcall function 00DCB63C: ScreenToClient.USER32(00000000,000000FF), ref: 00DCB66C
              • Part of subcall function 00DCB63C: GetAsyncKeyState.USER32(00000001), ref: 00DCB691
              • Part of subcall function 00DCB63C: GetAsyncKeyState.USER32(00000002), ref: 00DCB69F
            • ImageList_DragLeave.COMCTL32(00000000,00000000,00000001,?,?,?), ref: 00E1ED3C
            • ImageList_EndDrag.COMCTL32 ref: 00E1ED42
            • ReleaseCapture.USER32 ref: 00E1ED48
            • SetWindowTextW.USER32(?,00000000), ref: 00E1EDF0
            • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 00E1EE03
            • DefDlgProcW.USER32(?,00000202,?,?,00000000,00000001,?,?,?), ref: 00E1EEDC
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: AsyncDragImageList_StateWindow$CaptureClientCursorLeaveLongMessageProcReleaseScreenSendText
            • String ID: @GUI_DRAGFILE$@GUI_DROPID
            • API String ID: 1924731296-2107944366
            • Opcode ID: d6bca0ebe70a7dcd0cbee2e43c51d5ab218c49be8d6e9e7ff8cdc1da92478339
            • Instruction ID: bc12e1c33c298acdd93b1a8bf1f8565870ec8bf495ce69cdaa53b8b296dd5279
            • Opcode Fuzzy Hash: d6bca0ebe70a7dcd0cbee2e43c51d5ab218c49be8d6e9e7ff8cdc1da92478339
            • Instruction Fuzzy Hash: A851BD70204304AFD710DF24DC8AFAA77E5FB88714F44591DF996A72E1DB709988CB62
            APIs
            • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00E045FF
            • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 00E0462B
            • InternetQueryOptionW.WININET(00000000,0000001F,00000000,?), ref: 00E0466D
            • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 00E04682
            • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00E0468F
            • HttpQueryInfoW.WININET(00000000,00000005,?,?,00000000), ref: 00E046BF
            • InternetCloseHandle.WININET(00000000), ref: 00E04706
              • Part of subcall function 00E05052: GetLastError.KERNEL32(?,?,00E043CC,00000000,00000000,00000001), ref: 00E05067
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: Internet$Http$OptionQueryRequest$CloseConnectErrorHandleInfoLastOpenSend
            • String ID:
            • API String ID: 1241431887-3916222277
            • Opcode ID: 3d0b849e8e38665e7fb78d4a859b1af1e10699680be40a47582697694c4a44d4
            • Instruction ID: 1e1b87d7ac9c47bcf3b63ed9b02436556b0bf5cb5b31a41c15e1a64be0a314f6
            • Opcode Fuzzy Hash: 3d0b849e8e38665e7fb78d4a859b1af1e10699680be40a47582697694c4a44d4
            • Instruction Fuzzy Hash: 65416DF2501209BFEB029F50DD89FBB7BACEF09354F005116FA05BA1C1E7B199848BA4
            APIs
            • GetModuleFileNameW.KERNEL32(?,?,00000104,?,00E4DC00), ref: 00E0B715
            • FreeLibrary.KERNEL32(00000000,00000001,00000000,?,00E4DC00), ref: 00E0B749
            • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 00E0B8C1
            • SysFreeString.OLEAUT32(?), ref: 00E0B8EB
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: Free$FileLibraryModuleNamePathQueryStringType
            • String ID:
            • API String ID: 560350794-0
            • Opcode ID: 413aec5cc93644576df1595623ab09f27bb6493ec6eabe5bd1b1f6f75e815cc6
            • Instruction ID: e26f1842cf621c99e9f162ee536c58e1f4c3db26b465bc27f5f1ab408ae9258a
            • Opcode Fuzzy Hash: 413aec5cc93644576df1595623ab09f27bb6493ec6eabe5bd1b1f6f75e815cc6
            • Instruction Fuzzy Hash: 86F12C75A00109EFCF04DF94C888EAEB7B9FF49315F149459F915AB290DB31AE85CB60
            APIs
            • _memset.LIBCMT ref: 00E124F5
            • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00E12688
            • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00E126AC
            • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00E126EC
            • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00E1270E
            • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00E1286F
            • GetLastError.KERNEL32(00000000,00000001,00000000), ref: 00E128A1
            • CloseHandle.KERNEL32(?), ref: 00E128D0
            • CloseHandle.KERNEL32(?), ref: 00E12947
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: Directory$CloseCurrentHandleSystem$CreateErrorLastProcess_memset
            • String ID:
            • API String ID: 4090791747-0
            • Opcode ID: 61cfa870a1bfb981a76d2169eb99d764d29edf7f58b392995d8dcf28bb3bd7f8
            • Instruction ID: 47bb3e16958b3ce674889177459babaa915bc0f528ecad19691fefb2404bcf06
            • Opcode Fuzzy Hash: 61cfa870a1bfb981a76d2169eb99d764d29edf7f58b392995d8dcf28bb3bd7f8
            • Instruction Fuzzy Hash: B8D19E31604241DFCB14EF24C891BAEBBE5EF84314F14945DFA8AAB2A1DB31DC54CB62
            APIs
            • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 00E1B3F4
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: InvalidateRect
            • String ID:
            • API String ID: 634782764-0
            • Opcode ID: 48ff1b40b1c7574457d72d2b2b355ea9b34105d2d41a9c347d9f0eb4973e3f2c
            • Instruction ID: 6cb1095b23d08df920cbc2c695b4d634ebb19900af25d98effcca5b9374c9647
            • Opcode Fuzzy Hash: 48ff1b40b1c7574457d72d2b2b355ea9b34105d2d41a9c347d9f0eb4973e3f2c
            • Instruction Fuzzy Hash: 1451A170500208BFEB209F69CC89BEE3B65EB05328F645115F635F61E2D7B1E9D48B61
            APIs
            • LoadImageW.USER32(00000000,?,00000001,00000010,00000010,00000010), ref: 00E2DB1B
            • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 00E2DB3C
            • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 00E2DB51
            • ExtractIconExW.SHELL32(?,00000000,?,00000000,00000001), ref: 00E2DB6E
            • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 00E2DB95
            • DestroyIcon.USER32(00000000,?,?,?,?,?,?,00DCA67C,00000000,00000000,00000000,000000FF,00000000,000000FF,000000FF), ref: 00E2DBA0
            • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 00E2DBBD
            • DestroyIcon.USER32(00000000,?,?,?,?,?,?,00DCA67C,00000000,00000000,00000000,000000FF,00000000,000000FF,000000FF), ref: 00E2DBC8
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: Icon$DestroyExtractImageLoadMessageSend
            • String ID:
            • API String ID: 1268354404-0
            • Opcode ID: 7d2bbed22293b670e904e2e7b50af07ab3039758ca5cfb44a8e01b9a1cb99ada
            • Instruction ID: e700775438b4f898e2bdaea5eb098dbb9b4e5154b83ac9c5504658e41a029a2f
            • Opcode Fuzzy Hash: 7d2bbed22293b670e904e2e7b50af07ab3039758ca5cfb44a8e01b9a1cb99ada
            • Instruction Fuzzy Hash: 81515870604209EFDB20DF69DC96FAA3BB8BB08758F100519FA46A72D0D770EC80DB60
            APIs
              • Part of subcall function 00DF6EBB: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00DF5FA6,?), ref: 00DF6ED8
              • Part of subcall function 00DF6EBB: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00DF5FA6,?), ref: 00DF6EF1
              • Part of subcall function 00DF72CB: GetFileAttributesW.KERNEL32(?,00DF6019), ref: 00DF72CC
            • lstrcmpiW.KERNEL32(?,?), ref: 00DF75CA
            • _wcscmp.LIBCMT ref: 00DF75E2
            • MoveFileW.KERNEL32(?,?), ref: 00DF75FB
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: FileFullNamePath$AttributesMove_wcscmplstrcmpi
            • String ID:
            • API String ID: 793581249-0
            • Opcode ID: 2e56470f766cf9941d9eef405c7d30b73df7226f0aa969637de456cf89948e81
            • Instruction ID: f8a3f7b45e9fee1e7bc6b17d33a1d73fb5f4e47d34060f110ccf8651166d6a3d
            • Opcode Fuzzy Hash: 2e56470f766cf9941d9eef405c7d30b73df7226f0aa969637de456cf89948e81
            • Instruction Fuzzy Hash: 855101B2A0921D9ADF50EB94E8459ED77BCDF48310F04809AF605E3541EA74D6C9CB74
            APIs
            • ShowWindow.USER32(00000000,000000FF,00000000,00000000,00000000,?,00E2DAD1,00000004,00000000,00000000), ref: 00DCEAEB
            • ShowWindow.USER32(00000000,00000000,00000000,00000000,00000000,?,00E2DAD1,00000004,00000000,00000000), ref: 00DCEB32
            • ShowWindow.USER32(00000000,00000006,00000000,00000000,00000000,?,00E2DAD1,00000004,00000000,00000000), ref: 00E2DC86
            • ShowWindow.USER32(00000000,000000FF,00000000,00000000,00000000,?,00E2DAD1,00000004,00000000,00000000), ref: 00E2DCF2
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: ShowWindow
            • String ID:
            • API String ID: 1268545403-0
            • Opcode ID: e6942778258b89c555f47ccc9b7342b4d12bb4e5b99e628edb0898ad45889267
            • Instruction ID: f274694f3599ee817609b49ff3f5f3f32ad133875087f60f2837dc3dabb75745
            • Opcode Fuzzy Hash: e6942778258b89c555f47ccc9b7342b4d12bb4e5b99e628edb0898ad45889267
            • Instruction Fuzzy Hash: 1841E4F020C6829ED7394B29AE8EF7ABB97AB45314F1D140DF187A3561C670AC84C731
            APIs
            • GetProcessHeap.KERNEL32(00000008,0000000C,00000000,00000000,?,00DEAEF1,00000B00,?,?), ref: 00DEB26C
            • HeapAlloc.KERNEL32(00000000,?,00DEAEF1,00000B00,?,?), ref: 00DEB273
            • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00DEAEF1,00000B00,?,?), ref: 00DEB288
            • GetCurrentProcess.KERNEL32(?,00000000,?,00DEAEF1,00000B00,?,?), ref: 00DEB290
            • DuplicateHandle.KERNEL32(00000000,?,00DEAEF1,00000B00,?,?), ref: 00DEB293
            • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,00DEAEF1,00000B00,?,?), ref: 00DEB2A3
            • GetCurrentProcess.KERNEL32(00DEAEF1,00000000,?,00DEAEF1,00000B00,?,?), ref: 00DEB2AB
            • DuplicateHandle.KERNEL32(00000000,?,00DEAEF1,00000B00,?,?), ref: 00DEB2AE
            • CreateThread.KERNEL32(00000000,00000000,00DEB2D4,00000000,00000000,00000000), ref: 00DEB2C8
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
            • String ID:
            • API String ID: 1957940570-0
            • Opcode ID: f1f89694973af2b98fe6538e60a3f72995d3f24aa296bf9e61bb3dc611d168d9
            • Instruction ID: 71838a9a54c48f8824560390d8a162a2f9c24bc5a159ac5c6b20c92d59b4717e
            • Opcode Fuzzy Hash: f1f89694973af2b98fe6538e60a3f72995d3f24aa296bf9e61bb3dc611d168d9
            • Instruction Fuzzy Hash: A601BBB5644348BFE710ABA6EC4DF6B7FACEB88B11F018411FA05DB1A1CA749C04CB61
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID:
            • String ID: NULL Pointer assignment$Not an Object type
            • API String ID: 0-572801152
            • Opcode ID: 006876edde9ad1fd250c05b6223b7ef90127ae14b9abf559d9cf5c3b054584ab
            • Instruction ID: 1d882f090932e70eacb9a9340c22e26723696a209e82d1e1431aae4da69c9bfa
            • Opcode Fuzzy Hash: 006876edde9ad1fd250c05b6223b7ef90127ae14b9abf559d9cf5c3b054584ab
            • Instruction Fuzzy Hash: 2DE1B271A00219AFCF14DFA4D885AEEB7B5EF48714F249229F905B72C1D770AD85CBA0
            APIs
              • Part of subcall function 00DB936C: __swprintf.LIBCMT ref: 00DB93AB
              • Part of subcall function 00DB936C: __itow.LIBCMT ref: 00DB93DF
              • Part of subcall function 00DCC6F4: _wcscpy.LIBCMT ref: 00DCC717
            • _wcstok.LIBCMT ref: 00E0184E
            • _wcscpy.LIBCMT ref: 00E018DD
            • _memset.LIBCMT ref: 00E01910
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: _wcscpy$__itow__swprintf_memset_wcstok
            • String ID: X$p2
            • API String ID: 774024439-3332900272
            • Opcode ID: 1d8455e22dfcbacd5c9d6d9073c5ad4948092274fb96a4e9a4189268e5647662
            • Instruction ID: f4f1a9d6b74b0997d22a8e4dba7a0ccdcde9b81664d249c6c96387afb47f743d
            • Opcode Fuzzy Hash: 1d8455e22dfcbacd5c9d6d9073c5ad4948092274fb96a4e9a4189268e5647662
            • Instruction Fuzzy Hash: 77C16C30608340DFC714EF64C991A9EB7E4FF85354F04596DF59AAB2A2DB30E944CBA2
            APIs
            • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00E19B19
            • SendMessageW.USER32(?,00001036,00000000,?), ref: 00E19B2D
            • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00E19B47
            • _wcscat.LIBCMT ref: 00E19BA2
            • SendMessageW.USER32(?,00001057,00000000,?), ref: 00E19BB9
            • SendMessageW.USER32(?,00001061,?,0000000F), ref: 00E19BE7
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: MessageSend$Window_wcscat
            • String ID: SysListView32
            • API String ID: 307300125-78025650
            • Opcode ID: 3ce59e2c8a518ed1c601fe0b7a165a209926422921441da3c633b789db728381
            • Instruction ID: b2c7f922dbfc8ba31a5a21c026969cba4b9f781ce0bc21bc1f31f3a866957308
            • Opcode Fuzzy Hash: 3ce59e2c8a518ed1c601fe0b7a165a209926422921441da3c633b789db728381
            • Instruction Fuzzy Hash: 1F41A171944308AFDB219FA4DC85FEE7BA8EF08354F10442AF589B7292D7719D88CB64
            APIs
              • Part of subcall function 00DF6532: CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,00000000), ref: 00DF6554
              • Part of subcall function 00DF6532: Process32FirstW.KERNEL32(00000000,0000022C), ref: 00DF6564
              • Part of subcall function 00DF6532: CloseHandle.KERNEL32(00000000,?,00000000), ref: 00DF65F9
            • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00E1179A
            • GetLastError.KERNEL32 ref: 00E117AD
            • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00E117D9
            • TerminateProcess.KERNEL32(00000000,00000000), ref: 00E11855
            • GetLastError.KERNEL32(00000000), ref: 00E11860
            • CloseHandle.KERNEL32(00000000), ref: 00E11895
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
            • String ID: SeDebugPrivilege
            • API String ID: 2533919879-2896544425
            • Opcode ID: 8651898b1abde746c520e3548fb8fe251ecddc6aa7c920480e9b26f08d544203
            • Instruction ID: 73135902040cec78a199b94f1c48b5104ae63a2fb4fe6c006976d483ca483b86
            • Opcode Fuzzy Hash: 8651898b1abde746c520e3548fb8fe251ecddc6aa7c920480e9b26f08d544203
            • Instruction Fuzzy Hash: 8741AB71600205AFDB05EF54CDA5FBEB7A1EF44314F09C099FA06AF2D2DB74A9448B61
            APIs
            • LoadIconW.USER32(00000000,00007F03), ref: 00DF58B8
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: IconLoad
            • String ID: blank$info$question$stop$warning
            • API String ID: 2457776203-404129466
            • Opcode ID: 1d141f10cb4c30aafadded8dc7364275e9d604e42e04a32d0704451395994c9b
            • Instruction ID: 6de052bfab9f7dfcff1ae9bfe66db75c8ef5b4c966101453e6690e540ecd5881
            • Opcode Fuzzy Hash: 1d141f10cb4c30aafadded8dc7364275e9d604e42e04a32d0704451395994c9b
            • Instruction Fuzzy Hash: 0B11D83164974AFAA7115B64FC82DBE679CDF653A4F21403BF741B5281E7A0AA0042B4
            APIs
            • SafeArrayGetVartype.OLEAUT32(?,00000000), ref: 00DFA806
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: ArraySafeVartype
            • String ID:
            • API String ID: 1725837607-0
            • Opcode ID: 4f7acb7a490effc0b7a58712c408efc674500eb159dde1bd74ca8686b7e51ed3
            • Instruction ID: ab0c549f8fcabcaf0b77041fa3fd7db42417d8a10a951fa24d78ad82d44a21ec
            • Opcode Fuzzy Hash: 4f7acb7a490effc0b7a58712c408efc674500eb159dde1bd74ca8686b7e51ed3
            • Instruction Fuzzy Hash: C3C19BB5A0420ADFDB04CF98D481BBEB7F4EF08314F25806AE659E7241C774AA45CBB1
            APIs
            • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 00DF6B63
            • LoadStringW.USER32(00000000), ref: 00DF6B6A
            • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00DF6B80
            • LoadStringW.USER32(00000000), ref: 00DF6B87
            • _wprintf.LIBCMT ref: 00DF6BAD
            • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00DF6BCB
            Strings
            • %s (%d) : ==> %s: %s %s, xrefs: 00DF6BA8
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: HandleLoadModuleString$Message_wprintf
            • String ID: %s (%d) : ==> %s: %s %s
            • API String ID: 3648134473-3128320259
            • Opcode ID: 0cfd0316f1b7798f757536f1e16ec1965aaeb026cd62f2999c219394d9dfc810
            • Instruction ID: b4f8fd26e714fa93e5184d3723d2fee7bf27f2033565f566af7f04dc9b8bb00e
            • Opcode Fuzzy Hash: 0cfd0316f1b7798f757536f1e16ec1965aaeb026cd62f2999c219394d9dfc810
            • Instruction Fuzzy Hash: B8011DF690421CBFEB11ABA5AD8DEF7766CD708304F0044A1B746E2141EAB4DE888B70
            APIs
              • Part of subcall function 00E13C06: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00E12BB5,?,?), ref: 00E13C1D
            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00E12BF6
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: BuffCharConnectRegistryUpper
            • String ID:
            • API String ID: 2595220575-0
            • Opcode ID: 577b45acf8d99cd9b02eb52932b2100a431dd781179f5a6358680045555bc1b0
            • Instruction ID: 46a8f3e206b261459465969eca034c695f352ccc0a815469125bc088035836db
            • Opcode Fuzzy Hash: 577b45acf8d99cd9b02eb52932b2100a431dd781179f5a6358680045555bc1b0
            • Instruction Fuzzy Hash: 429189312042059FCB01EF14CC85BAEB7E5FF88314F04981DFA96A72A1DB30E955CB62
            APIs
            • select.WSOCK32 ref: 00E09691
            • WSAGetLastError.WSOCK32(00000000), ref: 00E0969E
            • __WSAFDIsSet.WSOCK32(00000000,?,00000000), ref: 00E096C8
            • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 00E096E9
            • WSAGetLastError.WSOCK32(00000000), ref: 00E096F8
            • htons.WSOCK32(?,?,?,00000000,?), ref: 00E097AA
            • inet_ntoa.WSOCK32(?,?,?,?,?,?,?,?,?,?,?,?,00E4DC00), ref: 00E09765
              • Part of subcall function 00DED2FF: _strlen.LIBCMT ref: 00DED309
            • _strlen.LIBCMT ref: 00E09800
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: ErrorLast_strlen$htonsinet_ntoaselect
            • String ID:
            • API String ID: 3480843537-0
            • Opcode ID: 42c69e609c861140701b14afa767bcea64b6bc893f88d82d1fa2117fead74e7e
            • Instruction ID: c416375e590b1b610c905cdf52c663abaa9d012a0fe7845c52ace9fce41ce050
            • Opcode Fuzzy Hash: 42c69e609c861140701b14afa767bcea64b6bc893f88d82d1fa2117fead74e7e
            • Instruction Fuzzy Hash: 6981BD31508200ABC714EF64DC85FAFBBA9EF85714F10461DF556AB292EB30D944CBB6
            APIs
            • __mtinitlocknum.LIBCMT ref: 00DDA991
              • Part of subcall function 00DD7D7C: __FF_MSGBANNER.LIBCMT ref: 00DD7D91
              • Part of subcall function 00DD7D7C: __NMSG_WRITE.LIBCMT ref: 00DD7D98
              • Part of subcall function 00DD7D7C: __malloc_crt.LIBCMT ref: 00DD7DB8
            • __lock.LIBCMT ref: 00DDA9A4
            • __lock.LIBCMT ref: 00DDA9F0
            • InitializeCriticalSectionAndSpinCount.KERNEL32(8000000C,00000FA0,00E66DE0,00000018,00DE5E7B,?,00000000,00000109), ref: 00DDAA0C
            • EnterCriticalSection.KERNEL32(8000000C,00E66DE0,00000018,00DE5E7B,?,00000000,00000109), ref: 00DDAA29
            • LeaveCriticalSection.KERNEL32(8000000C), ref: 00DDAA39
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: CriticalSection$__lock$CountEnterInitializeLeaveSpin__malloc_crt__mtinitlocknum
            • String ID:
            • API String ID: 1422805418-0
            • Opcode ID: 48ee73f9590acbd018c144004a4ea99b54320f1eeb9f0c04309cd76ad1ed7704
            • Instruction ID: ab93cfc3b6836bb1745880a54943765a8b0db047a767a1b8f98e02fae0ae0eb9
            • Opcode Fuzzy Hash: 48ee73f9590acbd018c144004a4ea99b54320f1eeb9f0c04309cd76ad1ed7704
            • Instruction Fuzzy Hash: 5F412271A002059FEB10DF6CDA44759BBA0AF41334F15C31AE529AB3D1DB749845CBB2
            APIs
            • DeleteObject.GDI32(00000000), ref: 00E18EE4
            • GetDC.USER32(00000000), ref: 00E18EEC
            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00E18EF7
            • ReleaseDC.USER32(00000000,00000000), ref: 00E18F03
            • CreateFontW.GDI32(?,00000000,00000000,00000000,00000000,?,?,?,00000001,00000004,00000000,?,00000000,?), ref: 00E18F3F
            • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00E18F50
            • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,00E1BD19,?,?,000000FF,00000000,?,000000FF,?), ref: 00E18F8A
            • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00E18FAA
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
            • String ID:
            • API String ID: 3864802216-0
            • Opcode ID: 2e0b9e95c5174ccbf7d4dfcff2c72f2d40d644e28487a3d333da8b921b677a43
            • Instruction ID: c46a2c3e37b03ecde5e2675d5558b5985f0b6618549932f712aa326c60993662
            • Opcode Fuzzy Hash: 2e0b9e95c5174ccbf7d4dfcff2c72f2d40d644e28487a3d333da8b921b677a43
            • Instruction Fuzzy Hash: 6A317F72204618BFEB118F51DD4AFEA3FAEEF49715F044065FE09AA191C6759842CB70
            APIs
              • Part of subcall function 00DCB34E: GetWindowLongW.USER32(?,000000EB), ref: 00DCB35F
            • GetSystemMetrics.USER32(0000000F), ref: 00E2016D
            • MoveWindow.USER32(00000003,?,00000000,00000001,00000000,00000000,?,?,?), ref: 00E2038D
            • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 00E203AB
            • InvalidateRect.USER32(?,00000000,00000001,?), ref: 00E203D6
            • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 00E203FF
            • ShowWindow.USER32(00000003,00000000), ref: 00E20421
            • DefDlgProcW.USER32(?,00000005,?,?), ref: 00E20440
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: Window$MessageSend$InvalidateLongMetricsMoveProcRectShowSystem
            • String ID:
            • API String ID: 3356174886-0
            • Opcode ID: 94d02abe08c328023b66581107c733da9c9d12be538c602589b466ddd530a322
            • Instruction ID: 24a053f60534673346ef7e2de92ac62d3e251d7d41e1f27b8510d46f68f43f3c
            • Opcode Fuzzy Hash: 94d02abe08c328023b66581107c733da9c9d12be538c602589b466ddd530a322
            • Instruction Fuzzy Hash: 0BA1CD3160062AEFDB18CF68D9897BDBBB1BF08714F149115EC59BB292D734AD60CB90
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 8f8c525103962b0427bb41aeb94d45ad8d58176bcf08c43e7560c5b320723aa8
            • Instruction ID: 99f14aa037539b681ca2ddd02608d6e8cbf92a8f1415ad8faba0670fa015e3df
            • Opcode Fuzzy Hash: 8f8c525103962b0427bb41aeb94d45ad8d58176bcf08c43e7560c5b320723aa8
            • Instruction Fuzzy Hash: FB7139B190411AAFCB14CF98CC89EAEBB79FF85318F24814DF915AB251C7309A51CFA1
            APIs
            • _memset.LIBCMT ref: 00E1225A
            • _memset.LIBCMT ref: 00E12323
            • ShellExecuteExW.SHELL32(?), ref: 00E12368
              • Part of subcall function 00DB936C: __swprintf.LIBCMT ref: 00DB93AB
              • Part of subcall function 00DB936C: __itow.LIBCMT ref: 00DB93DF
              • Part of subcall function 00DCC6F4: _wcscpy.LIBCMT ref: 00DCC717
            • CloseHandle.KERNEL32(00000000), ref: 00E1242F
            • FreeLibrary.KERNEL32(00000000), ref: 00E1243E
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: _memset$CloseExecuteFreeHandleLibraryShell__itow__swprintf_wcscpy
            • String ID: @
            • API String ID: 4082843840-2766056989
            • Opcode ID: 28f81eed5eb9b1e7b4ebadc2447eca23dbd779302883e0df4f1eff0d86bb302d
            • Instruction ID: 71e62b38f6dabdf5840a98fe126869f744b6f819e850d4a8c73d8eb49606e9ac
            • Opcode Fuzzy Hash: 28f81eed5eb9b1e7b4ebadc2447eca23dbd779302883e0df4f1eff0d86bb302d
            • Instruction Fuzzy Hash: 1A715770A006199FCB04EFA4C981AEEBBF5FF48310B108459E95ABB351CB34AD50CBA4
            APIs
            • GetParent.USER32(?), ref: 00DF3DE7
            • GetKeyboardState.USER32(?), ref: 00DF3DFC
            • SetKeyboardState.USER32(?), ref: 00DF3E5D
            • PostMessageW.USER32(?,00000101,00000010,?), ref: 00DF3E8B
            • PostMessageW.USER32(?,00000101,00000011,?), ref: 00DF3EAA
            • PostMessageW.USER32(?,00000101,00000012,?), ref: 00DF3EF0
            • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00DF3F13
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: MessagePost$KeyboardState$Parent
            • String ID:
            • API String ID: 87235514-0
            • Opcode ID: 5e37c654ce0e74bc0cce82a80984db6765ff3e1d8cc58e2ee1e5880c68fd921b
            • Instruction ID: 050d39b15861a4b8476ef1dbb5bf735d496db963414f0f6b3ccd73a47311a7a3
            • Opcode Fuzzy Hash: 5e37c654ce0e74bc0cce82a80984db6765ff3e1d8cc58e2ee1e5880c68fd921b
            • Instruction Fuzzy Hash: 1151B3A0A047D93DFB364224CC45BBA7EA95F06304F0EC589F2D5968C2D2A4DEC8D770
            APIs
            • GetParent.USER32(00000000), ref: 00DF3C02
            • GetKeyboardState.USER32(?), ref: 00DF3C17
            • SetKeyboardState.USER32(?), ref: 00DF3C78
            • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 00DF3CA4
            • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 00DF3CC1
            • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 00DF3D05
            • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 00DF3D26
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: MessagePost$KeyboardState$Parent
            • String ID:
            • API String ID: 87235514-0
            • Opcode ID: c3c2375a731971ce319166f4fb5b141e0db3b7b91c2b93413b1684951aed776f
            • Instruction ID: 02e56344054e01e09a658837ad374a5ca4445fcc5732e46ec9deb1ede87c9aec
            • Opcode Fuzzy Hash: c3c2375a731971ce319166f4fb5b141e0db3b7b91c2b93413b1684951aed776f
            • Instruction Fuzzy Hash: 6751E6A05087D93DFB368774CC55B76BE999B06304F0EC488E2D55A4C2D294EE94D770
            APIs
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: _wcsncpy$LocalTime
            • String ID:
            • API String ID: 2945705084-0
            • Opcode ID: 116a34e00d7f8fb6e0a2440c891a306313d98ad951d1466e2c7633b3102c3c6d
            • Instruction ID: 91af17a5ad948d0b6a6ebe140774aa1e1401394e58483258a681de4b93004ae8
            • Opcode Fuzzy Hash: 116a34e00d7f8fb6e0a2440c891a306313d98ad951d1466e2c7633b3102c3c6d
            • Instruction Fuzzy Hash: E3416F66C14218B6CB20EBF88846ADFB7ACDF54310F558967E514E3221FA34E614C3B5
            APIs
            • RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,?,?,?), ref: 00E13DA1
            • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00E13DCB
            • FreeLibrary.KERNEL32(00000000), ref: 00E13E80
              • Part of subcall function 00E13D72: RegCloseKey.ADVAPI32(?), ref: 00E13DE8
              • Part of subcall function 00E13D72: FreeLibrary.KERNEL32(?), ref: 00E13E3A
              • Part of subcall function 00E13D72: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 00E13E5D
            • RegDeleteKeyW.ADVAPI32(?,?), ref: 00E13E25
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: EnumFreeLibrary$CloseDeleteOpen
            • String ID:
            • API String ID: 395352322-0
            • Opcode ID: 0ec152990ba85d3026f0a70ad862cf4246ab6ee8b49eccbf9dbade6715f9d5f3
            • Instruction ID: 0370ec21632e1232d5f6098d7f4d53367c0cd7b235e01035764a572a09bee173
            • Opcode Fuzzy Hash: 0ec152990ba85d3026f0a70ad862cf4246ab6ee8b49eccbf9dbade6715f9d5f3
            • Instruction Fuzzy Hash: EC310DB1905209BFDB159BA1EC89AFFBBBDEF08304F001169E512F2150D6709F899BA0
            APIs
            • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00E18FE7
            • GetWindowLongW.USER32(0164F6E8,000000F0), ref: 00E1901A
            • GetWindowLongW.USER32(0164F6E8,000000F0), ref: 00E1904F
            • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 00E19081
            • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 00E190AB
            • GetWindowLongW.USER32(00000000,000000F0), ref: 00E190BC
            • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 00E190D6
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: LongWindow$MessageSend
            • String ID:
            • API String ID: 2178440468-0
            • Opcode ID: 7dc62b82d6720306daa8d97ca482f06eb61930b77170d2fa2185fcdf5f2bc7e3
            • Instruction ID: 3b275a37cf7c5610ffafa24cc48dd8f7fcd811126d58a74e70ba7b5175c20f1d
            • Opcode Fuzzy Hash: 7dc62b82d6720306daa8d97ca482f06eb61930b77170d2fa2185fcdf5f2bc7e3
            • Instruction Fuzzy Hash: A8315734604218DFDB21CF59DC99FA437A5FB4A718F1411A8F529AB2B2CB72AC84DF41
            APIs
            • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00DF08F2
            • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00DF0918
            • SysAllocString.OLEAUT32(00000000), ref: 00DF091B
            • SysAllocString.OLEAUT32(?), ref: 00DF0939
            • SysFreeString.OLEAUT32(?), ref: 00DF0942
            • StringFromGUID2.OLE32(?,?,00000028), ref: 00DF0967
            • SysAllocString.OLEAUT32(?), ref: 00DF0975
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
            • String ID:
            • API String ID: 3761583154-0
            • Opcode ID: dc952c6dfec2ee26e55f94aa9ede9e3540234ffe2f1a7cc72e4649dd072addf6
            • Instruction ID: 2182330cc039b134217b42fd1a842e2165d20316ba9f9eaa2fd0accff94dcc64
            • Opcode Fuzzy Hash: dc952c6dfec2ee26e55f94aa9ede9e3540234ffe2f1a7cc72e4649dd072addf6
            • Instruction Fuzzy Hash: 6D21E77660520DAFDB009F78DC88DBB7BACEB08360B05C125FA14DB152E6B0EC458B70
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: __wcsnicmp
            • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
            • API String ID: 1038674560-2734436370
            • Opcode ID: fd64f2c4e4ef69f1bf2936603852ad0206a627ab771290082d888e65b96d7321
            • Instruction ID: 914bde0229429524f827b2bfb3cc85c4a314cfad36150466a40c26cbb047768b
            • Opcode Fuzzy Hash: fd64f2c4e4ef69f1bf2936603852ad0206a627ab771290082d888e65b96d7321
            • Instruction Fuzzy Hash: B121493220821977D320AB34DC12FBBB398EF65314F15C02AF68AA7281E695D942C3B5
            APIs
            • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00DF09CB
            • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00DF09F1
            • SysAllocString.OLEAUT32(00000000), ref: 00DF09F4
            • SysAllocString.OLEAUT32 ref: 00DF0A15
            • SysFreeString.OLEAUT32 ref: 00DF0A1E
            • StringFromGUID2.OLE32(?,?,00000028), ref: 00DF0A38
            • SysAllocString.OLEAUT32(?), ref: 00DF0A46
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
            • String ID:
            • API String ID: 3761583154-0
            • Opcode ID: caf0adb72c38013ecaa8a90bacac611e53687f10fe83c63982a1b03b5a77f8df
            • Instruction ID: 6ac535765cc080e1cd91c980c7c0fadc2570cd9bec9411c2449b71ff2d00897d
            • Opcode Fuzzy Hash: caf0adb72c38013ecaa8a90bacac611e53687f10fe83c63982a1b03b5a77f8df
            • Instruction Fuzzy Hash: CF217475204208AFDB109FA9DC88DBABBECEF08360745C125FA59DB261E670ED458B74
            APIs
              • Part of subcall function 00DCD17C: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00DCD1BA
              • Part of subcall function 00DCD17C: GetStockObject.GDI32(00000011), ref: 00DCD1CE
              • Part of subcall function 00DCD17C: SendMessageW.USER32(00000000,00000030,00000000), ref: 00DCD1D8
            • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00E1A32D
            • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 00E1A33A
            • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00E1A345
            • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00E1A354
            • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00E1A360
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: MessageSend$CreateObjectStockWindow
            • String ID: Msctls_Progress32
            • API String ID: 1025951953-3636473452
            • Opcode ID: 8df06a3ddb678ef0ab549c3d12ec9e580d02a0a7792252b269b30b2e8990233d
            • Instruction ID: 0eeb7e7979a36213e28018fa5cb70da2af275271e2b1ad2013b7278e2153b5cc
            • Opcode Fuzzy Hash: 8df06a3ddb678ef0ab549c3d12ec9e580d02a0a7792252b269b30b2e8990233d
            • Instruction Fuzzy Hash: 4F11D3B1140219BEEF105FA0CC85EFB7F6DFF08398F014114BA08A20A0C6729C21DBA4
            APIs
            • GetClientRect.USER32(?,?), ref: 00DCCCF6
            • GetWindowRect.USER32(?,?), ref: 00DCCD37
            • ScreenToClient.USER32(?,?), ref: 00DCCD5F
            • GetClientRect.USER32(?,?), ref: 00DCCE8C
            • GetWindowRect.USER32(?,?), ref: 00DCCEA5
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: Rect$Client$Window$Screen
            • String ID:
            • API String ID: 1296646539-0
            • Opcode ID: 90ed4b179b14bf36d062e6f986de96fc44a2043286930bdbe9c5241759fd045a
            • Instruction ID: eb4731fc89336a4f7168636e00aa6136fc4646416d9fca6a7b88fd220a81c92a
            • Opcode Fuzzy Hash: 90ed4b179b14bf36d062e6f986de96fc44a2043286930bdbe9c5241759fd045a
            • Instruction Fuzzy Hash: 44B1607991024ADBDF10CFA8C484BEDBBB5FF08310F14A529ED99EB250DB30A951CB64
            APIs
            • CreateToolhelp32Snapshot.KERNEL32 ref: 00E11C18
            • Process32FirstW.KERNEL32(00000000,?), ref: 00E11C26
            • __wsplitpath.LIBCMT ref: 00E11C54
              • Part of subcall function 00DD1DFC: __wsplitpath_helper.LIBCMT ref: 00DD1E3C
            • _wcscat.LIBCMT ref: 00E11C69
            • Process32NextW.KERNEL32(00000000,?), ref: 00E11CDF
            • CloseHandle.KERNEL32(00000000,?,?,00000002,00000000), ref: 00E11CF1
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32__wsplitpath__wsplitpath_helper_wcscat
            • String ID:
            • API String ID: 1380811348-0
            • Opcode ID: b6bfcb5fc7212790afe67e94bb5adadaaece617203205082b91d7c70f7374e79
            • Instruction ID: dde4a57dc2a0d7e142b29f18640d0f38545ef9855f90ae3b7b90e8b2b894444f
            • Opcode Fuzzy Hash: b6bfcb5fc7212790afe67e94bb5adadaaece617203205082b91d7c70f7374e79
            • Instruction Fuzzy Hash: 03516D711083459FD720DF24D885FABBBE8EF88754F00491EF586A7291EB30D944CBA2
            APIs
              • Part of subcall function 00E13C06: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00E12BB5,?,?), ref: 00E13C1D
            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00E130AF
            • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00E130EF
            • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 00E13112
            • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 00E1313B
            • RegCloseKey.ADVAPI32(?,?,00000000), ref: 00E1317E
            • RegCloseKey.ADVAPI32(00000000), ref: 00E1318B
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: Close$BuffCharConnectEnumOpenRegistryUpperValue
            • String ID:
            • API String ID: 3451389628-0
            • Opcode ID: 987c3b60a7d9576160a9ba0312a1dd2fbc5a3defbbe60303da60f22c3fd6200c
            • Instruction ID: a53e4f0a26073c320f28d6ab2dcefe16efad97c2c1b71a98d3c627f4a1d7ba25
            • Opcode Fuzzy Hash: 987c3b60a7d9576160a9ba0312a1dd2fbc5a3defbbe60303da60f22c3fd6200c
            • Instruction Fuzzy Hash: E7514831208204AFC704EF64CC95EAEBBE9FF88304F04495DF55697291DB31EA49CB62
            APIs
            • GetMenu.USER32(?), ref: 00E18540
            • GetMenuItemCount.USER32(00000000), ref: 00E18577
            • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 00E1859F
            • GetMenuItemID.USER32(?,?), ref: 00E1860E
            • GetSubMenu.USER32(?,?), ref: 00E1861C
            • PostMessageW.USER32(?,00000111,?,00000000), ref: 00E1866D
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: Menu$Item$CountMessagePostString
            • String ID:
            • API String ID: 650687236-0
            • Opcode ID: 93e5a20493e4eaf26cd5f9e1219fd04def2e0d9da03aba1fb927c06567db9f5e
            • Instruction ID: 2a9b0152d602a13c102b77c3c3ea706ebb3c5c6e96532567eae301605705a50f
            • Opcode Fuzzy Hash: 93e5a20493e4eaf26cd5f9e1219fd04def2e0d9da03aba1fb927c06567db9f5e
            • Instruction Fuzzy Hash: FF51A075A00219EFCF11EF64C945AEEBBF5EF48310F154499E916B7351DB30AE818BA0
            APIs
            • _memset.LIBCMT ref: 00DF4B10
            • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00DF4B5B
            • IsMenu.USER32(00000000), ref: 00DF4B7B
            • CreatePopupMenu.USER32 ref: 00DF4BAF
            • GetMenuItemCount.USER32(000000FF), ref: 00DF4C0D
            • InsertMenuItemW.USER32(00000000,?,00000001,00000030), ref: 00DF4C3E
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: Menu$Item$CountCreateInfoInsertPopup_memset
            • String ID:
            • API String ID: 3311875123-0
            • Opcode ID: 012a1f6fa1d83771e476373715fb9503c78dedd7fb115e67882ae6d029017ceb
            • Instruction ID: fd9a4f8442cc1653bf74508dc443a35f4a532886b7ee67bc8432bcdd8eef2134
            • Opcode Fuzzy Hash: 012a1f6fa1d83771e476373715fb9503c78dedd7fb115e67882ae6d029017ceb
            • Instruction Fuzzy Hash: E151CC7060120DEFDF20CF68D988BBEBBF4EF44318F198119E6659A291D3709984CB31
            APIs
            • select.WSOCK32(00000000,00000001,00000000,00000000,?,000003E8,00E4DC00), ref: 00E08E7C
            • WSAGetLastError.WSOCK32(00000000), ref: 00E08E89
            • __WSAFDIsSet.WSOCK32(00000000,00000001,00000000), ref: 00E08EAD
            • #16.WSOCK32(?,?,00000000,00000000), ref: 00E08EC5
            • _strlen.LIBCMT ref: 00E08EF7
            • WSAGetLastError.WSOCK32(00000000), ref: 00E08F6A
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: ErrorLast$_strlenselect
            • String ID:
            • API String ID: 2217125717-0
            • Opcode ID: d56111af539ac11a7f8158a871c7d34f16ed9690d48cda6ed65d7462e6fec89c
            • Instruction ID: 8e77a699c6f77162b047d5a8db50a50af979ca9245908c0f77b91e59b930e214
            • Opcode Fuzzy Hash: d56111af539ac11a7f8158a871c7d34f16ed9690d48cda6ed65d7462e6fec89c
            • Instruction Fuzzy Hash: 54419D71600109ABCB14EBA4CE85EEEB7BAEF58314F10525AF156A72D1DF30AE44CA70
            APIs
              • Part of subcall function 00DCB34E: GetWindowLongW.USER32(?,000000EB), ref: 00DCB35F
            • BeginPaint.USER32(?,?,?), ref: 00DCAC2A
            • GetWindowRect.USER32(?,?), ref: 00DCAC8E
            • ScreenToClient.USER32(?,?), ref: 00DCACAB
            • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00DCACBC
            • EndPaint.USER32(?,?,?,?,?), ref: 00DCAD06
            • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00E2E673
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: PaintWindow$BeginClientLongRectRectangleScreenViewport
            • String ID:
            • API String ID: 2592858361-0
            • Opcode ID: 7aa60efe498e07c5950f217e70ba8fb12dfd506bc6d929c08bf93c7d8f61844d
            • Instruction ID: b619fa2240cc86179192f7320d138cbe6d8cb3c1059738f3142f033471c5e11a
            • Opcode Fuzzy Hash: 7aa60efe498e07c5950f217e70ba8fb12dfd506bc6d929c08bf93c7d8f61844d
            • Instruction Fuzzy Hash: 3141D0701043169FC710DF69DC89FB67BA8EB59724F08026DF9A9972A1C7319888DB72
            APIs
            • ShowWindow.USER32(00E71628,00000000,00E71628,00000000,00000000,00E71628,?,00E2DC5D,00000000,?,00000000,00000000,00000000,?,00E2DAD1,00000004), ref: 00E1E40B
            • EnableWindow.USER32(00000000,00000000), ref: 00E1E42F
            • ShowWindow.USER32(00E71628,00000000), ref: 00E1E48F
            • ShowWindow.USER32(00000000,00000004), ref: 00E1E4A1
            • EnableWindow.USER32(00000000,00000001), ref: 00E1E4C5
            • SendMessageW.USER32(?,0000130C,00000000,00000000), ref: 00E1E4E8
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: Window$Show$Enable$MessageSend
            • String ID:
            • API String ID: 642888154-0
            • Opcode ID: 60bc950b941f9db3ee0b2fcaf24865f27d6d57f5e149e56b3013860f0c617a83
            • Instruction ID: 3927324492020c53f3a9e8d465bde578aaf9aff7351ee222288aefc02765f1d2
            • Opcode Fuzzy Hash: 60bc950b941f9db3ee0b2fcaf24865f27d6d57f5e149e56b3013860f0c617a83
            • Instruction Fuzzy Hash: 6D417230601154EFDB22CF24C499BD47BE1BF05308F5851A9FE69AF2A2C731E885CB91
            APIs
            • InterlockedExchange.KERNEL32(?,000001F5), ref: 00DF98D1
              • Part of subcall function 00DCF4EA: std::exception::exception.LIBCMT ref: 00DCF51E
              • Part of subcall function 00DCF4EA: __CxxThrowException@8.LIBCMT ref: 00DCF533
            • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,?,00000000), ref: 00DF9908
            • EnterCriticalSection.KERNEL32(?), ref: 00DF9924
            • LeaveCriticalSection.KERNEL32(?), ref: 00DF999E
            • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,00000000,00000000), ref: 00DF99B3
            • InterlockedExchange.KERNEL32(?,000001F6), ref: 00DF99D2
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: CriticalExchangeFileInterlockedReadSection$EnterException@8LeaveThrowstd::exception::exception
            • String ID:
            • API String ID: 2537439066-0
            • Opcode ID: 704f5161f2e868a8da7012d7eaa16876bacf9d744af04e6143bf41022144bfb3
            • Instruction ID: 291f8a5a0632192b475f2b0a627c6c924ab4c30f2fe5cbd7ce8cac92e42daf1c
            • Opcode Fuzzy Hash: 704f5161f2e868a8da7012d7eaa16876bacf9d744af04e6143bf41022144bfb3
            • Instruction Fuzzy Hash: 0C318131A00109AFDB109F95DC89EAFBBB9FF45710B1580A9F904AB256D770DE14CBB0
            APIs
            • GetForegroundWindow.USER32(?,?,?,?,?,?,00E077F4,?,?,00000000,00000001), ref: 00E09B53
              • Part of subcall function 00E06544: GetWindowRect.USER32(?,?), ref: 00E06557
            • GetDesktopWindow.USER32 ref: 00E09B7D
            • GetWindowRect.USER32(00000000), ref: 00E09B84
            • mouse_event.USER32(00008001,?,?,00000001,00000001), ref: 00E09BB6
              • Part of subcall function 00DF7A58: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?), ref: 00DF7AD0
            • GetCursorPos.USER32(?), ref: 00E09BE2
            • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 00E09C44
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: Window$Rectmouse_event$CursorDesktopForegroundSleep
            • String ID:
            • API String ID: 4137160315-0
            • Opcode ID: 5c5bfa0d1a073ab9321bda267d288ccf946859b9a96711c8a54dd8f623d3112d
            • Instruction ID: 4c1df30ef06634eedd0f5214fd8ce97cb99c8d3a8dfdabb6c409acd8f7855143
            • Opcode Fuzzy Hash: 5c5bfa0d1a073ab9321bda267d288ccf946859b9a96711c8a54dd8f623d3112d
            • Instruction Fuzzy Hash: 8C31C172508309AFC710DF14EC49F9ABBE9FF89314F00091AF599E7182D631E958CBA2
            APIs
            • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 00DEAFAE
            • OpenProcessToken.ADVAPI32(00000000), ref: 00DEAFB5
            • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 00DEAFC4
            • CloseHandle.KERNEL32(00000004), ref: 00DEAFCF
            • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00DEAFFE
            • DestroyEnvironmentBlock.USERENV(00000000), ref: 00DEB012
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
            • String ID:
            • API String ID: 1413079979-0
            • Opcode ID: d06592fe9650847a05c6931f56d82919ece1476d904d2e855cbb6715bca0912c
            • Instruction ID: b9a8bd57b4ec65ec17e35cb1b5f6fe0d86005aa4af590af603443666c1c47095
            • Opcode Fuzzy Hash: d06592fe9650847a05c6931f56d82919ece1476d904d2e855cbb6715bca0912c
            • Instruction Fuzzy Hash: 0E218E7210424EAFCF029FAAED09FAE7BA9EF44304F144055FA01A2161C376ED24EB71
            APIs
              • Part of subcall function 00DCAF83: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,?,00000000), ref: 00DCAFE3
              • Part of subcall function 00DCAF83: SelectObject.GDI32(?,00000000), ref: 00DCAFF2
              • Part of subcall function 00DCAF83: BeginPath.GDI32(?), ref: 00DCB009
              • Part of subcall function 00DCAF83: SelectObject.GDI32(?,00000000), ref: 00DCB033
            • MoveToEx.GDI32(00000000,-00000002,?,00000000), ref: 00E1EC20
            • LineTo.GDI32(00000000,00000003,?), ref: 00E1EC34
            • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 00E1EC42
            • LineTo.GDI32(00000000,00000000,?), ref: 00E1EC52
            • EndPath.GDI32(00000000), ref: 00E1EC62
            • StrokePath.GDI32(00000000), ref: 00E1EC72
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
            • String ID:
            • API String ID: 43455801-0
            • Opcode ID: fda2bfb6925ef5ad5bd6de4128a88fae6a4d0a3eca987f8a682e2b329b45096d
            • Instruction ID: b7c40952194507b29e33ae82fc6678106194d0f24064ce914082a6f310e0a891
            • Opcode Fuzzy Hash: fda2bfb6925ef5ad5bd6de4128a88fae6a4d0a3eca987f8a682e2b329b45096d
            • Instruction Fuzzy Hash: C0110C7200414DBFDB029FA5EC88EDA7F6DEF08354F048112BE1869160D7719D99DBA0
            APIs
            • GetDC.USER32(00000000), ref: 00DEE1C0
            • GetDeviceCaps.GDI32(00000000,00000058), ref: 00DEE1D1
            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00DEE1D8
            • ReleaseDC.USER32(00000000,00000000), ref: 00DEE1E0
            • MulDiv.KERNEL32(000009EC,?,00000000), ref: 00DEE1F7
            • MulDiv.KERNEL32(000009EC,?,?), ref: 00DEE209
              • Part of subcall function 00DE9AA3: RaiseException.KERNEL32(-C0000018,00000001,00000000,00000000,00DE9A05,00000000,00000000,?,00DE9DDB), ref: 00DEA53A
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: CapsDevice$ExceptionRaiseRelease
            • String ID:
            • API String ID: 603618608-0
            • Opcode ID: e401e91ad166194910baf9af829d00eb97d8d34d85d8ec6f99ac3d2176bf849f
            • Instruction ID: e46091da249d0a533539ac9431753bf17d811c4f27ad6e2fc460cb5da3fa377f
            • Opcode Fuzzy Hash: e401e91ad166194910baf9af829d00eb97d8d34d85d8ec6f99ac3d2176bf849f
            • Instruction Fuzzy Hash: 750184B5A00758BFEB109BA79C49B5EBFB9EB48751F044066FE04A7290D6719C00CF60
            APIs
            • __init_pointers.LIBCMT ref: 00DD7B47
              • Part of subcall function 00DD123A: __initp_misc_winsig.LIBCMT ref: 00DD125E
              • Part of subcall function 00DD123A: GetModuleHandleW.KERNEL32(kernel32.dll), ref: 00DD7F51
              • Part of subcall function 00DD123A: GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00DD7F65
              • Part of subcall function 00DD123A: GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00DD7F78
              • Part of subcall function 00DD123A: GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00DD7F8B
              • Part of subcall function 00DD123A: GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00DD7F9E
              • Part of subcall function 00DD123A: GetProcAddress.KERNEL32(00000000,InitializeCriticalSectionEx), ref: 00DD7FB1
              • Part of subcall function 00DD123A: GetProcAddress.KERNEL32(00000000,CreateSemaphoreExW), ref: 00DD7FC4
              • Part of subcall function 00DD123A: GetProcAddress.KERNEL32(00000000,SetThreadStackGuarantee), ref: 00DD7FD7
              • Part of subcall function 00DD123A: GetProcAddress.KERNEL32(00000000,CreateThreadpoolTimer), ref: 00DD7FEA
              • Part of subcall function 00DD123A: GetProcAddress.KERNEL32(00000000,SetThreadpoolTimer), ref: 00DD7FFD
              • Part of subcall function 00DD123A: GetProcAddress.KERNEL32(00000000,WaitForThreadpoolTimerCallbacks), ref: 00DD8010
              • Part of subcall function 00DD123A: GetProcAddress.KERNEL32(00000000,CloseThreadpoolTimer), ref: 00DD8023
              • Part of subcall function 00DD123A: GetProcAddress.KERNEL32(00000000,CreateThreadpoolWait), ref: 00DD8036
              • Part of subcall function 00DD123A: GetProcAddress.KERNEL32(00000000,SetThreadpoolWait), ref: 00DD8049
              • Part of subcall function 00DD123A: GetProcAddress.KERNEL32(00000000,CloseThreadpoolWait), ref: 00DD805C
              • Part of subcall function 00DD123A: GetProcAddress.KERNEL32(00000000,FlushProcessWriteBuffers), ref: 00DD806F
            • __mtinitlocks.LIBCMT ref: 00DD7B4C
              • Part of subcall function 00DD7E23: InitializeCriticalSectionAndSpinCount.KERNEL32(00E6AC68,00000FA0,?,?,00DD7B51,00DD5E77,00E66C70,00000014), ref: 00DD7E41
            • __mtterm.LIBCMT ref: 00DD7B55
              • Part of subcall function 00DD7BBD: DeleteCriticalSection.KERNEL32(00000000,00000000,?,?,00DD7B5A,00DD5E77,00E66C70,00000014), ref: 00DD7D3F
              • Part of subcall function 00DD7BBD: _free.LIBCMT ref: 00DD7D46
              • Part of subcall function 00DD7BBD: DeleteCriticalSection.KERNEL32(00E6AC68,?,?,00DD7B5A,00DD5E77,00E66C70,00000014), ref: 00DD7D68
            • __calloc_crt.LIBCMT ref: 00DD7B7A
            • GetCurrentThreadId.KERNEL32 ref: 00DD7BA3
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: AddressProc$CriticalSection$Delete$CountCurrentHandleInitializeModuleSpinThread__calloc_crt__init_pointers__initp_misc_winsig__mtinitlocks__mtterm_free
            • String ID:
            • API String ID: 2942034483-0
            • Opcode ID: 6bbbb86ff2c0df9dca772667349ef2eab7d36835b14eb9a250936ee32fbad2ff
            • Instruction ID: dda73dbc153669f83c4deaae7c5d20589d2b63fe23cb27d891e2ed53745a4fd7
            • Opcode Fuzzy Hash: 6bbbb86ff2c0df9dca772667349ef2eab7d36835b14eb9a250936ee32fbad2ff
            • Instruction Fuzzy Hash: FFF0B43250D3121EE62877347C0BA4B2BC4DF01730B2906EBF8A4EA3D2FF21984145B0
            APIs
            • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00DB281D
            • MapVirtualKeyW.USER32(00000010,00000000), ref: 00DB2825
            • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00DB2830
            • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00DB283B
            • MapVirtualKeyW.USER32(00000011,00000000), ref: 00DB2843
            • MapVirtualKeyW.USER32(00000012,00000000), ref: 00DB284B
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: Virtual
            • String ID:
            • API String ID: 4278518827-0
            • Opcode ID: 4d0a35e58d63cab74789f1ae89ec389663b08cbc792033b11309b366de92ee11
            • Instruction ID: 962087e786d57c6fcc63a5ef735c68177fdfecd837f1fe22e76db4ae30ef779e
            • Opcode Fuzzy Hash: 4d0a35e58d63cab74789f1ae89ec389663b08cbc792033b11309b366de92ee11
            • Instruction Fuzzy Hash: E70167B0902B5EBDE3008F6A8C85B52FFA8FF19354F00411BA15C47A42C7F5A868CBE5
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: CriticalExchangeInterlockedSection$EnterLeaveObjectSingleTerminateThreadWait
            • String ID:
            • API String ID: 1423608774-0
            • Opcode ID: 495ad348c8befcd99556b065f20b6b8e604ce1995e295641ffd5ea34d5a9802a
            • Instruction ID: 86d7ef3a2879dba4ec4722aafca870543287e1fa1b2332dbea40033146c1416d
            • Opcode Fuzzy Hash: 495ad348c8befcd99556b065f20b6b8e604ce1995e295641ffd5ea34d5a9802a
            • Instruction Fuzzy Hash: 5101863254521AAFD7151B55FC5CEFBBB7AFF887017054429F603A20A0DB649814DB70
            APIs
            • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 00DF7C07
            • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 00DF7C1D
            • GetWindowThreadProcessId.USER32(?,?), ref: 00DF7C2C
            • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00DF7C3B
            • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00DF7C45
            • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00DF7C4C
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
            • String ID:
            • API String ID: 839392675-0
            • Opcode ID: 2f39f81237e13f577e0f436b939a34d6dafb0313cbf19d90c62e8a9d27218361
            • Instruction ID: db86d95d49f9cb705e5f6fc27af75e37c06b20055391000784163456187684b9
            • Opcode Fuzzy Hash: 2f39f81237e13f577e0f436b939a34d6dafb0313cbf19d90c62e8a9d27218361
            • Instruction Fuzzy Hash: C2F0177224615CBFE6215B63AC0EEEF7FBCEBC6B11F000058FA12A1051D7A05A49D6B5
            APIs
            • InterlockedExchange.KERNEL32(?,?), ref: 00DF9A33
            • EnterCriticalSection.KERNEL32(?,?,?,?,00E25DEE,?,?,?,?,?,00DBED63), ref: 00DF9A44
            • TerminateThread.KERNEL32(?,000001F6,?,?,?,00E25DEE,?,?,?,?,?,00DBED63), ref: 00DF9A51
            • WaitForSingleObject.KERNEL32(?,000003E8,?,?,?,00E25DEE,?,?,?,?,?,00DBED63), ref: 00DF9A5E
              • Part of subcall function 00DF93D1: CloseHandle.KERNEL32(?,?,00DF9A6B,?,?,?,00E25DEE,?,?,?,?,?,00DBED63), ref: 00DF93DB
            • InterlockedExchange.KERNEL32(?,000001F6), ref: 00DF9A71
            • LeaveCriticalSection.KERNEL32(?,?,?,?,00E25DEE,?,?,?,?,?,00DBED63), ref: 00DF9A78
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
            • String ID:
            • API String ID: 3495660284-0
            • Opcode ID: 6c48bb4a8ff02fd4e968b5b2db99840307c753207fadf58b4b49ee6b83a2fdf1
            • Instruction ID: 030644463f966ad586a03cdc732c94fd95fd2630c8a52796c70272f0fb3ade4c
            • Opcode Fuzzy Hash: 6c48bb4a8ff02fd4e968b5b2db99840307c753207fadf58b4b49ee6b83a2fdf1
            • Instruction Fuzzy Hash: DBF08232549219AFD7121BA5FC8DEEBBB7AFF84301B150425F603B10B0DBB59819DB61
            APIs
              • Part of subcall function 00DCF4EA: std::exception::exception.LIBCMT ref: 00DCF51E
              • Part of subcall function 00DCF4EA: __CxxThrowException@8.LIBCMT ref: 00DCF533
            • __swprintf.LIBCMT ref: 00DB1EA6
            Strings
            • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 00DB1D49
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: Exception@8Throw__swprintfstd::exception::exception
            • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
            • API String ID: 2125237772-557222456
            • Opcode ID: 729f902a7b4f05d951b12749d8bc5a47b2b473d056a02d4ba696638aa3c98600
            • Instruction ID: 3ca178288b8835757f1c9689a700a600c2e2f233afcfbfab77e111be63e17742
            • Opcode Fuzzy Hash: 729f902a7b4f05d951b12749d8bc5a47b2b473d056a02d4ba696638aa3c98600
            • Instruction Fuzzy Hash: 04915A75108211EFC724EF24D895CAEB7A4EF85700F54492DF996A72A1DB70ED04CBB2
            APIs
            • VariantInit.OLEAUT32(?), ref: 00E0B006
            • CharUpperBuffW.USER32(?,?), ref: 00E0B115
            • VariantClear.OLEAUT32(?), ref: 00E0B298
              • Part of subcall function 00DF9DC5: VariantInit.OLEAUT32(00000000), ref: 00DF9E05
              • Part of subcall function 00DF9DC5: VariantCopy.OLEAUT32(?,?), ref: 00DF9E0E
              • Part of subcall function 00DF9DC5: VariantClear.OLEAUT32(?), ref: 00DF9E1A
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: Variant$ClearInit$BuffCharCopyUpper
            • String ID: AUTOIT.ERROR$Incorrect Parameter format
            • API String ID: 4237274167-1221869570
            • Opcode ID: dda217f3bd892e0c9d51aae1ac1c13cce785d9a4712c338e87f51f3d31b7c80a
            • Instruction ID: 478d6902050ea9ec07a72af59f0ca298c0bc69a6e28b280f03fff8bba6d2a94c
            • Opcode Fuzzy Hash: dda217f3bd892e0c9d51aae1ac1c13cce785d9a4712c338e87f51f3d31b7c80a
            • Instruction Fuzzy Hash: 9B915B74608301DFCB10DF24D49599ABBE4FF89704F04586DF89AAB3A2DB31E945CB62
            APIs
              • Part of subcall function 00DCC6F4: _wcscpy.LIBCMT ref: 00DCC717
            • _memset.LIBCMT ref: 00DF5438
            • GetMenuItemInfoW.USER32(?), ref: 00DF5467
            • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00DF5513
            • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 00DF553D
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: ItemMenu$Info$Default_memset_wcscpy
            • String ID: 0
            • API String ID: 4152858687-4108050209
            • Opcode ID: 05adf6ef5a02678e37febf53e8fa4d75a791a064262c39c0ec6b9a2b95a63a8f
            • Instruction ID: 0cb029d3610a55b3722c2b25b8410e352004aa79a718088a2f10dda8ba1aa327
            • Opcode Fuzzy Hash: 05adf6ef5a02678e37febf53e8fa4d75a791a064262c39c0ec6b9a2b95a63a8f
            • Instruction Fuzzy Hash: 6A5143311047099BD314DF2CE8416BBBBE8EB85310F09862EFB9AD3294DB60CD4487B2
            APIs
            • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00DF027B
            • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 00DF02B1
            • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 00DF02C2
            • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 00DF0344
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: ErrorMode$AddressCreateInstanceProc
            • String ID: DllGetClassObject
            • API String ID: 753597075-1075368562
            • Opcode ID: c9c5692e89473d66293c32ed3b5e548d5958102e7b5fbee4200e8aa535414769
            • Instruction ID: f2417b4f7c8569d9f0b5768691748c7540f3fe5c761fd0ae34a984e73aca633d
            • Opcode Fuzzy Hash: c9c5692e89473d66293c32ed3b5e548d5958102e7b5fbee4200e8aa535414769
            • Instruction Fuzzy Hash: 1C414CB1604208EFDB05CF54C985BAA7FF9EF44310B15C0A9EA09AF216D7B1DA44CBB0
            APIs
            • _memset.LIBCMT ref: 00DF5075
            • GetMenuItemInfoW.USER32 ref: 00DF5091
            • DeleteMenu.USER32(00000004,00000007,00000000), ref: 00DF50D7
            • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,00E71708,00000000), ref: 00DF5120
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: Menu$Delete$InfoItem_memset
            • String ID: 0
            • API String ID: 1173514356-4108050209
            • Opcode ID: 31f99782ee1bb4d77ef1baa7e837867bc144348ef643469eb24c8f776a01d8a6
            • Instruction ID: e885c3080bc4aa3a4b03570a0e5827946fb906ed8228567483ca4a0b3715341f
            • Opcode Fuzzy Hash: 31f99782ee1bb4d77ef1baa7e837867bc144348ef643469eb24c8f776a01d8a6
            • Instruction Fuzzy Hash: 9841C230204705AFD710DF28EC85B6ABBE8EF85324F09861EFA5597295D770E904CB72
            APIs
            • CharLowerBuffW.USER32(?,?,?,?), ref: 00E10587
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: BuffCharLower
            • String ID: cdecl$none$stdcall$winapi
            • API String ID: 2358735015-567219261
            • Opcode ID: 9da3488a12cc7a225670a373d2fcbdc50be2d32f62f02f6022dcfa8c711d85cb
            • Instruction ID: adb204afa96b5de44e3214dca38bbc3da3e62788dfbb7cf9e7d68f121ea33137
            • Opcode Fuzzy Hash: 9da3488a12cc7a225670a373d2fcbdc50be2d32f62f02f6022dcfa8c711d85cb
            • Instruction Fuzzy Hash: 8131AF70500216AFCF00EF54CD429EEB3B4FF95354B00962AE826B76D1DBB1A995CBA0
            APIs
            • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00DEB88E
            • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00DEB8A1
            • SendMessageW.USER32(?,00000189,?,00000000), ref: 00DEB8D1
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: MessageSend
            • String ID: ComboBox$ListBox
            • API String ID: 3850602802-1403004172
            • Opcode ID: ed22119c830abde193a6e067083f8df91cee7616634be41dba830fcdd7497cc2
            • Instruction ID: f461624edf4c562dead28ea6eefa868c792bbba323e543ed1d1a4e9e7f56cc89
            • Opcode Fuzzy Hash: ed22119c830abde193a6e067083f8df91cee7616634be41dba830fcdd7497cc2
            • Instruction Fuzzy Hash: 6A210471900148AFDB04ABA5DC86DFF7B79EF05360B14412AF122A32E0DB759D0A8A30
            APIs
            • _memset.LIBCMT ref: 00DB522F
            • _wcscpy.LIBCMT ref: 00DB5283
            • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00DB5293
            • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 00E23CB0
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: IconLoadNotifyShell_String_memset_wcscpy
            • String ID: Line:
            • API String ID: 1053898822-1585850449
            • Opcode ID: 934429fb25f78c13238072aca12f811440c88f71355881d9028559607156184a
            • Instruction ID: 9b0ea326a8551e4899c56aecc584b2c0797205a987e1a41a35f9b578c9f27890
            • Opcode Fuzzy Hash: 934429fb25f78c13238072aca12f811440c88f71355881d9028559607156184a
            • Instruction Fuzzy Hash: 4F31A171508740EED321EB64EC46FDE77D8EB44350F40451EF58AA2191EB74A64CCBB6
            APIs
            • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00E04401
            • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00E04427
            • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 00E04457
            • InternetCloseHandle.WININET(00000000), ref: 00E0449E
              • Part of subcall function 00E05052: GetLastError.KERNEL32(?,?,00E043CC,00000000,00000000,00000001), ref: 00E05067
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: HttpInternet$CloseErrorHandleInfoLastOpenQueryRequestSend
            • String ID:
            • API String ID: 1951874230-3916222277
            • Opcode ID: 782d9b65b1f31344123d7a40151218689b58943984f4ffe5ecdd1e450cd7726b
            • Instruction ID: abd00efb5a70ac202f5bc77a74f61d659650afe8e32f3804684ce35fe5c1177b
            • Opcode Fuzzy Hash: 782d9b65b1f31344123d7a40151218689b58943984f4ffe5ecdd1e450cd7726b
            • Instruction Fuzzy Hash: 5F218EF6500208BEE7219F64DD85EBFBAECEB48758F10901AF219F61C0EA748D859770
            APIs
              • Part of subcall function 00DCD17C: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00DCD1BA
              • Part of subcall function 00DCD17C: GetStockObject.GDI32(00000011), ref: 00DCD1CE
              • Part of subcall function 00DCD17C: SendMessageW.USER32(00000000,00000030,00000000), ref: 00DCD1D8
            • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00E1915C
            • LoadLibraryW.KERNEL32(?), ref: 00E19163
            • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 00E19178
            • DestroyWindow.USER32(?), ref: 00E19180
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: MessageSend$Window$CreateDestroyLibraryLoadObjectStock
            • String ID: SysAnimate32
            • API String ID: 4146253029-1011021900
            • Opcode ID: 556db8d7e8d73b6f5d61bc6264da27c6b343cd2413926e8d2a2a8b3453cbeaf5
            • Instruction ID: 85c2f1248c15f78f82fd7e3c01443ea5d00ff4dd1e87d8f30bcdc8972522d511
            • Opcode Fuzzy Hash: 556db8d7e8d73b6f5d61bc6264da27c6b343cd2413926e8d2a2a8b3453cbeaf5
            • Instruction Fuzzy Hash: 25218E7120020ABFEF104E64DC99EFB37A9EB99368F111658FA14A2191C735DCD1A760
            APIs
            • GetStdHandle.KERNEL32(0000000C), ref: 00DF9588
            • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00DF95B9
            • GetStdHandle.KERNEL32(0000000C), ref: 00DF95CB
            • CreateFileW.KERNEL32(nul,40000000,00000002,0000000C,00000003,00000080,00000000), ref: 00DF9605
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: CreateHandle$FilePipe
            • String ID: nul
            • API String ID: 4209266947-2873401336
            • Opcode ID: 41a1afb736c8546defb00e7fc0b9673e34d89ba98b32eb7e941b9772aa72a9ed
            • Instruction ID: caeec5072ed42012684ac46ffa3faecaa02aca9db3aa246f9cf11e9ecbf6c89e
            • Opcode Fuzzy Hash: 41a1afb736c8546defb00e7fc0b9673e34d89ba98b32eb7e941b9772aa72a9ed
            • Instruction Fuzzy Hash: 04218D7090020DABDB219F75DC14BAABBB4AF44724F258A19FAA1E72E0D770D944CB30
            APIs
            • GetStdHandle.KERNEL32(000000F6), ref: 00DF9653
            • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00DF9683
            • GetStdHandle.KERNEL32(000000F6), ref: 00DF9694
            • CreateFileW.KERNEL32(nul,80000000,00000001,0000000C,00000003,00000080,00000000), ref: 00DF96CE
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: CreateHandle$FilePipe
            • String ID: nul
            • API String ID: 4209266947-2873401336
            • Opcode ID: fc4c3e300b7eabe8e9dc819ae9864a79617de8bcc02ea635801e1c0260bc252e
            • Instruction ID: a3faa42416b07367f760851ede036612a8cb307da5ebe098ad79b4cc60c9df07
            • Opcode Fuzzy Hash: fc4c3e300b7eabe8e9dc819ae9864a79617de8bcc02ea635801e1c0260bc252e
            • Instruction Fuzzy Hash: 1821957190020D9BDB209F699C14FAAF7E8AF54724F258619FEA1E72D0E770D845CB30
            APIs
            • SetErrorMode.KERNEL32(00000001), ref: 00DFDB0A
            • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 00DFDB5E
            • __swprintf.LIBCMT ref: 00DFDB77
            • SetErrorMode.KERNEL32(00000000,00000001,00000000,00E4DC00), ref: 00DFDBB5
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: ErrorMode$InformationVolume__swprintf
            • String ID: %lu
            • API String ID: 3164766367-685833217
            • Opcode ID: 82478041a0332ae1348955b27b381f23cc36b0cc5506e7a9ae33c753fe39a51a
            • Instruction ID: 34a82d9854f86582a7928b3e887af1eabafd8ecd38e260f6a70addca3ecb0b51
            • Opcode Fuzzy Hash: 82478041a0332ae1348955b27b381f23cc36b0cc5506e7a9ae33c753fe39a51a
            • Instruction Fuzzy Hash: E521603560020CAFCB10EFA5DD85EEEBBB8EF48704B154069F605E7251DA70EA05DB71
            APIs
              • Part of subcall function 00DEC82D: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00DEC84A
              • Part of subcall function 00DEC82D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00DEC85D
              • Part of subcall function 00DEC82D: GetCurrentThreadId.KERNEL32 ref: 00DEC864
              • Part of subcall function 00DEC82D: AttachThreadInput.USER32(00000000), ref: 00DEC86B
            • GetFocus.USER32 ref: 00DECA05
              • Part of subcall function 00DEC876: GetParent.USER32(?), ref: 00DEC884
            • GetClassNameW.USER32(?,?,00000100), ref: 00DECA4E
            • EnumChildWindows.USER32(?,00DECAC4), ref: 00DECA76
            • __swprintf.LIBCMT ref: 00DECA90
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows__swprintf
            • String ID: %s%d
            • API String ID: 3187004680-1110647743
            • Opcode ID: 210b1216fe0b10adb1db37aaf0cf2407f822c6b6ae237c176cce15a30a6d1443
            • Instruction ID: d40829870a6ddea58b2e869d13be4ed15867f3ab4a21dc7e2fa23a69fe9add42
            • Opcode Fuzzy Hash: 210b1216fe0b10adb1db37aaf0cf2407f822c6b6ae237c176cce15a30a6d1443
            • Instruction Fuzzy Hash: 4D117F71610209BBCF11BFA19CCAFED3B79EB44714F04906AFE19AA182CB749546DB70
            APIs
            • __lock.LIBCMT ref: 00DD7AD8
              • Part of subcall function 00DD7CF4: __mtinitlocknum.LIBCMT ref: 00DD7D06
              • Part of subcall function 00DD7CF4: EnterCriticalSection.KERNEL32(00000000,?,00DD7ADD,0000000D), ref: 00DD7D1F
            • InterlockedIncrement.KERNEL32(?), ref: 00DD7AE5
            • __lock.LIBCMT ref: 00DD7AF9
            • ___addlocaleref.LIBCMT ref: 00DD7B17
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: __lock$CriticalEnterIncrementInterlockedSection___addlocaleref__mtinitlocknum
            • String ID: `
            • API String ID: 1687444384-4168407445
            • Opcode ID: 20c7c9846a87ca0591995432c23e69bfcd64b71a7f5a4df97a2b4c156c340946
            • Instruction ID: e99415dd261ac6bc91b290443de752655f9b05ff45f4104846c593ee16826792
            • Opcode Fuzzy Hash: 20c7c9846a87ca0591995432c23e69bfcd64b71a7f5a4df97a2b4c156c340946
            • Instruction Fuzzy Hash: D2015B71445B009ED7209F79D90A74ABBF0EF40321F20894FE49AA73A0DBB0A644CB61
            APIs
            • _memset.LIBCMT ref: 00E1E33D
            • _memset.LIBCMT ref: 00E1E34C
            • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,00E73D00,00E73D44), ref: 00E1E37B
            • CloseHandle.KERNEL32 ref: 00E1E38D
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: _memset$CloseCreateHandleProcess
            • String ID: D=
            • API String ID: 3277943733-488882995
            • Opcode ID: 06f82b87177c448ed92a12e252ba5e97821f142b1b45cbbb47766c5f7ba58a88
            • Instruction ID: ceba86114ce66d4dc4ed80706229f5d85c26cd94389a533646644ad7ee08f5ba
            • Opcode Fuzzy Hash: 06f82b87177c448ed92a12e252ba5e97821f142b1b45cbbb47766c5f7ba58a88
            • Instruction Fuzzy Hash: 20F05EF1540314BEE2605B72AC4AF7B7E5CDB05754F004422BF0DF62A2D3759E44A6B9
            APIs
            • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 00E119F3
            • GetProcessIoCounters.KERNEL32(00000000,?), ref: 00E11A26
            • GetProcessMemoryInfo.PSAPI(00000000,?,00000028), ref: 00E11B49
            • CloseHandle.KERNEL32(?), ref: 00E11BBF
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: Process$CloseCountersHandleInfoMemoryOpen
            • String ID:
            • API String ID: 2364364464-0
            • Opcode ID: 7acf4b82c3fef4ab20084202972235a56467d2547054ad7fcd3b9b94a558315f
            • Instruction ID: 3aa8413e9a6382f00c93fd71923ad8751e9c7012b47a3e9d35a9e36016112b58
            • Opcode Fuzzy Hash: 7acf4b82c3fef4ab20084202972235a56467d2547054ad7fcd3b9b94a558315f
            • Instruction Fuzzy Hash: 4E817F70600215ABDF119F64C986FADBBF5EF44720F148499FA05BF382DBB5E9418BA0
            APIs
            • SendMessageW.USER32(?,0000041C,00000000,00000000), ref: 00E1E1D5
            • SendMessageW.USER32(?,000000B0,?,?), ref: 00E1E20D
            • IsDlgButtonChecked.USER32(?,00000001), ref: 00E1E248
            • GetWindowLongW.USER32(?,000000EC), ref: 00E1E269
            • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 00E1E281
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: MessageSend$ButtonCheckedLongWindow
            • String ID:
            • API String ID: 3188977179-0
            • Opcode ID: 273ce7b589d1be1071cc151283f83a4a6c48f0c7425f71c6a428be01cab71f9b
            • Instruction ID: 30e24d9566447e17f2fe5fbc9c07b92c97843ce84d9df90f4cfc18126f094ef3
            • Opcode Fuzzy Hash: 273ce7b589d1be1071cc151283f83a4a6c48f0c7425f71c6a428be01cab71f9b
            • Instruction Fuzzy Hash: 8E618E34B05204AFDB25CF58C895FEA7BBABB89304F145099FC59B73A1C771A980CB11
            APIs
            • VariantInit.OLEAUT32(?), ref: 00DF1CB4
            • VariantClear.OLEAUT32(00000013), ref: 00DF1D26
            • VariantClear.OLEAUT32(00000000), ref: 00DF1D81
            • VariantClear.OLEAUT32(?), ref: 00DF1DF8
            • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00DF1E26
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: Variant$Clear$ChangeInitType
            • String ID:
            • API String ID: 4136290138-0
            • Opcode ID: 84a83d1dbecc87fd7da107dfd4062dd706e18262e9fd00bd9a10bde670e13bf9
            • Instruction ID: 240b057b900acf75d6ee37ac56ec7328790b92acf6745cee9598ddbf88e4691d
            • Opcode Fuzzy Hash: 84a83d1dbecc87fd7da107dfd4062dd706e18262e9fd00bd9a10bde670e13bf9
            • Instruction Fuzzy Hash: 85514BB9A00209EFDB14CF58D884AAAB7B9FF4C314B158559FA59DB301E330E951CFA0
            APIs
              • Part of subcall function 00DB936C: __swprintf.LIBCMT ref: 00DB93AB
              • Part of subcall function 00DB936C: __itow.LIBCMT ref: 00DB93DF
            • LoadLibraryW.KERNEL32(?,00000004,?,?), ref: 00E106EE
            • GetProcAddress.KERNEL32(00000000,?), ref: 00E1077D
            • GetProcAddress.KERNEL32(00000000,00000000), ref: 00E1079B
            • GetProcAddress.KERNEL32(00000000,?), ref: 00E107E1
            • FreeLibrary.KERNEL32(00000000,00000004), ref: 00E107FB
              • Part of subcall function 00DCE65E: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?,00DFA574,?,?,00000000,00000008), ref: 00DCE675
              • Part of subcall function 00DCE65E: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,?,?,00DFA574,?,?,00000000,00000008), ref: 00DCE699
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad__itow__swprintf
            • String ID:
            • API String ID: 327935632-0
            • Opcode ID: 47f9e87a0ca8e09c639e147aab10b94deef680ada428437825c22cb750f58238
            • Instruction ID: 77c3b48e66f79e6427b8b26b9683b5a79661d754a81b82d6e81fd1e439902e4f
            • Opcode Fuzzy Hash: 47f9e87a0ca8e09c639e147aab10b94deef680ada428437825c22cb750f58238
            • Instruction Fuzzy Hash: BE514B75A04209DFCB00EFA8C885DEDB7B5FF49314B14805AE916AB352DB70ED85CBA0
            APIs
              • Part of subcall function 00E13C06: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00E12BB5,?,?), ref: 00E13C1D
            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00E12EEF
            • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00E12F2E
            • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 00E12F75
            • RegCloseKey.ADVAPI32(?,?), ref: 00E12FA1
            • RegCloseKey.ADVAPI32(00000000), ref: 00E12FAE
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: Close$BuffCharConnectEnumOpenRegistryUpper
            • String ID:
            • API String ID: 3740051246-0
            • Opcode ID: d0571f7a2fcbf09e3c81d960a8b8cc85b5f7deed9f4f0915fb7919d20c93250e
            • Instruction ID: 5cae65c1a4e41cf89c98e6a9ce3c36523d5b5c02f411cd0d9440aabe8b707c06
            • Opcode Fuzzy Hash: d0571f7a2fcbf09e3c81d960a8b8cc85b5f7deed9f4f0915fb7919d20c93250e
            • Instruction Fuzzy Hash: 41516771218204AFC704EB64CC81EAEB7F9FF88304F00981DF696A7291DB30E955CB62
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 56c6ca104423e6970327bcc9b4bc074517ac147507cebc5dbdcc7ba26f379be7
            • Instruction ID: 4021812d6fe5a3a61d1983441d87541726c76a4b1455b72968d0e2ade3b5eaa4
            • Opcode Fuzzy Hash: 56c6ca104423e6970327bcc9b4bc074517ac147507cebc5dbdcc7ba26f379be7
            • Instruction Fuzzy Hash: 6341C179944248AFC720DB68DC48FE9BF68EB09314F242265E95AF72E1C630AD91DA50
            APIs
            • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 00E012B4
            • GetPrivateProfileSectionW.KERNEL32(?,00000001,00000003,?), ref: 00E012DD
            • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 00E0131C
              • Part of subcall function 00DB936C: __swprintf.LIBCMT ref: 00DB93AB
              • Part of subcall function 00DB936C: __itow.LIBCMT ref: 00DB93DF
            • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 00E01341
            • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 00E01349
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: PrivateProfile$SectionWrite$String$__itow__swprintf
            • String ID:
            • API String ID: 1389676194-0
            • Opcode ID: 9cb47e74e4a2ebae2578a5ef0696a21a42eec7c6d256625603b63727d552c260
            • Instruction ID: 4d25ab3758c1fda261558da5156fa1e50e7d736684c5f080a0ef5881c40a38fb
            • Opcode Fuzzy Hash: 9cb47e74e4a2ebae2578a5ef0696a21a42eec7c6d256625603b63727d552c260
            • Instruction Fuzzy Hash: B7411F35600109DFCF01EF64C995AAEBBF5FF08314B148099E906AB3A2DB35ED51DB61
            APIs
            • GetCursorPos.USER32(000000FF), ref: 00DCB64F
            • ScreenToClient.USER32(00000000,000000FF), ref: 00DCB66C
            • GetAsyncKeyState.USER32(00000001), ref: 00DCB691
            • GetAsyncKeyState.USER32(00000002), ref: 00DCB69F
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: AsyncState$ClientCursorScreen
            • String ID:
            • API String ID: 4210589936-0
            • Opcode ID: 2803bae4aca72231de5a960f7e33166bba5334daab13946e998ab099be993b80
            • Instruction ID: c1be98b8ba4ddb593a349395bab0c94b55b5813fa9fb19ada0cfe7841aa9155d
            • Opcode Fuzzy Hash: 2803bae4aca72231de5a960f7e33166bba5334daab13946e998ab099be993b80
            • Instruction Fuzzy Hash: 07416C7560811AFFDF159F64CD45EE9BBB4FB05324F20431AE829A7290CB30A994DFA1
            APIs
            • GetWindowRect.USER32(?,?), ref: 00DEB369
            • PostMessageW.USER32(?,00000201,00000001), ref: 00DEB413
            • Sleep.KERNEL32(00000000,?,00000201,00000001,?,?,?), ref: 00DEB41B
            • PostMessageW.USER32(?,00000202,00000000), ref: 00DEB429
            • Sleep.KERNEL32(00000000,?,00000202,00000000,?,?,00000201,00000001,?,?,?), ref: 00DEB431
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: MessagePostSleep$RectWindow
            • String ID:
            • API String ID: 3382505437-0
            • Opcode ID: fe3376494f6ef0eb8df8706d32cbc9271e36268bf5c3f1a550c07bff67468ddf
            • Instruction ID: 3680de685cf2d700564a7d0f52403d14cba5c00080628eb05879d9ec5759d7e8
            • Opcode Fuzzy Hash: fe3376494f6ef0eb8df8706d32cbc9271e36268bf5c3f1a550c07bff67468ddf
            • Instruction Fuzzy Hash: 6131BF7190025DEFDB04DF69DD4EA9E3BB5EB04329F10422AF921A61D1C3B0E914CBA0
            APIs
            • IsWindowVisible.USER32(?), ref: 00DEDBD7
            • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00DEDBF4
            • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 00DEDC2C
            • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 00DEDC52
            • _wcsstr.LIBCMT ref: 00DEDC5C
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: MessageSend$BuffCharUpperVisibleWindow_wcsstr
            • String ID:
            • API String ID: 3902887630-0
            • Opcode ID: f328ab0c57be71ffb2f2e7389e4d3da8bd4d0e63a6afe2134a14b26db7f265e0
            • Instruction ID: 2021471e6db9d81cd1e131b7032e6b39a3fa3b8da738bf3dda531ad8176bfb9a
            • Opcode Fuzzy Hash: f328ab0c57be71ffb2f2e7389e4d3da8bd4d0e63a6afe2134a14b26db7f265e0
            • Instruction Fuzzy Hash: 2D21DA71208144BFE7156F3ADC49E7B7BAADF49760F244029F909DA151EEA1DC41D2B0
            APIs
              • Part of subcall function 00DCB34E: GetWindowLongW.USER32(?,000000EB), ref: 00DCB35F
            • GetWindowLongW.USER32(?,000000F0), ref: 00E1DEB0
            • SetWindowLongW.USER32(00000000,000000F0,00000001), ref: 00E1DED4
            • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 00E1DEEC
            • GetSystemMetrics.USER32(00000004), ref: 00E1DF14
            • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000047,?,?,?,?,?,00000000,?,00E03A1E,00000000), ref: 00E1DF32
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: Window$Long$MetricsSystem
            • String ID:
            • API String ID: 2294984445-0
            • Opcode ID: 48108c89e257affefad6709b774bb42c82388d2222622b1aabe54fd66e681e0d
            • Instruction ID: 48a6ed489c3457f06babc6d75813b704b8151026bdbb2ef1cb1b930fe966d9a9
            • Opcode Fuzzy Hash: 48108c89e257affefad6709b774bb42c82388d2222622b1aabe54fd66e681e0d
            • Instruction Fuzzy Hash: AE21D631A18216AFCB204F79DC48BE63B94FB15739F151324F936E61E0D73098A1CB90
            APIs
            • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00DEBC90
            • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00DEBCC2
            • __itow.LIBCMT ref: 00DEBCDA
            • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00DEBD00
            • __itow.LIBCMT ref: 00DEBD11
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: MessageSend$__itow
            • String ID:
            • API String ID: 3379773720-0
            • Opcode ID: 20f2a30bb3e4fee4dafc13aed2e8b33431ae5615399f33000bb7b2d921a34397
            • Instruction ID: fd284aae01d3ffe2b3d58b8d541cab5f0d7f6515f4a10426a8c7b1a2b7bfef14
            • Opcode Fuzzy Hash: 20f2a30bb3e4fee4dafc13aed2e8b33431ae5615399f33000bb7b2d921a34397
            • Instruction Fuzzy Hash: F721A435600748BADB11BE6A9C86FDF7A68EF49760F101026FA06EB181DB60DD4587B1
            APIs
              • Part of subcall function 00DB50E6: _wcsncpy.LIBCMT ref: 00DB50FA
            • GetFileAttributesW.KERNEL32(?,?,?,?,00DF60C3), ref: 00DF6369
            • GetLastError.KERNEL32(?,?,?,00DF60C3), ref: 00DF6374
            • CreateDirectoryW.KERNEL32(?,00000000,?,?,?,00DF60C3), ref: 00DF6388
            • _wcsrchr.LIBCMT ref: 00DF63AA
              • Part of subcall function 00DF6318: CreateDirectoryW.KERNEL32(?,00000000,?,?,?,00DF60C3), ref: 00DF63E0
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: CreateDirectory$AttributesErrorFileLast_wcsncpy_wcsrchr
            • String ID:
            • API String ID: 3633006590-0
            • Opcode ID: d10b8b7bf476418a950ab1d5eee3ae5890fcef1ef30f45fb05e1b5b5cdd2329a
            • Instruction ID: 9c5137d7c8a4a29079307c6230fd0d901c807ef5e3a392cfc48ad93964c7bc52
            • Opcode Fuzzy Hash: d10b8b7bf476418a950ab1d5eee3ae5890fcef1ef30f45fb05e1b5b5cdd2329a
            • Instruction Fuzzy Hash: E3216D3150421D8BDB14AB78AC06FFA33ECEF15360F1D806AF245D34C0EB60D9848A71
            APIs
              • Part of subcall function 00E0A82C: inet_addr.WSOCK32(00000000,00000000,?,?,?,00000000), ref: 00E0A84E
            • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 00E08BD3
            • WSAGetLastError.WSOCK32(00000000), ref: 00E08BE2
            • connect.WSOCK32(00000000,?,00000010), ref: 00E08BFE
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: ErrorLastconnectinet_addrsocket
            • String ID:
            • API String ID: 3701255441-0
            • Opcode ID: c3791434ee4fce76fbc88adc7008b861b2a359a8247236fab5001ab03650009d
            • Instruction ID: f83c2791df92483c9d59df22336260ac782d293e3770120d18890d57cffbefff
            • Opcode Fuzzy Hash: c3791434ee4fce76fbc88adc7008b861b2a359a8247236fab5001ab03650009d
            • Instruction Fuzzy Hash: 1121AE312042189FDB10EF28DE89F7EB7A9EF58710F048459F946AB2D2CF70AC458B61
            APIs
            • IsWindow.USER32(00000000), ref: 00E08441
            • GetForegroundWindow.USER32 ref: 00E08458
            • GetDC.USER32(00000000), ref: 00E08494
            • GetPixel.GDI32(00000000,?,00000003), ref: 00E084A0
            • ReleaseDC.USER32(00000000,00000003), ref: 00E084DB
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: Window$ForegroundPixelRelease
            • String ID:
            • API String ID: 4156661090-0
            • Opcode ID: 8607df73517c3224232fe5ea07e717230b3bd64ece5d196be11efc3385dddd2c
            • Instruction ID: 7d4e0d9e80d045addbcbf27305512a961a79379ada4013c0cdde24fe748de2a7
            • Opcode Fuzzy Hash: 8607df73517c3224232fe5ea07e717230b3bd64ece5d196be11efc3385dddd2c
            • Instruction Fuzzy Hash: 4C218175A00208AFD700DFA5DD89AAEBBF5EF48301F148479E95AA7352DB70AD44CB60
            APIs
            • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,?,00000000), ref: 00DCAFE3
            • SelectObject.GDI32(?,00000000), ref: 00DCAFF2
            • BeginPath.GDI32(?), ref: 00DCB009
            • SelectObject.GDI32(?,00000000), ref: 00DCB033
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: ObjectSelect$BeginCreatePath
            • String ID:
            • API String ID: 3225163088-0
            • Opcode ID: 88499f0d8e78b90b504af3733b1cb6c922ea71bffac6076bed2277350ff09fed
            • Instruction ID: 5c9cc38b4f386973a59282f1420da0c6b2fb0ce834267e78f6120fdd58956730
            • Opcode Fuzzy Hash: 88499f0d8e78b90b504af3733b1cb6c922ea71bffac6076bed2277350ff09fed
            • Instruction Fuzzy Hash: 0121777080434AEFDB10DF9AEC49B997B69BB11365F18425EF415771A0C370889DDFA1
            APIs
            • __calloc_crt.LIBCMT ref: 00DD21A9
            • CreateThread.KERNEL32(?,?,00DD22DF,00000000,?,?), ref: 00DD21ED
            • GetLastError.KERNEL32 ref: 00DD21F7
            • _free.LIBCMT ref: 00DD2200
            • __dosmaperr.LIBCMT ref: 00DD220B
              • Part of subcall function 00DD7C0E: __getptd_noexit.LIBCMT ref: 00DD7C0E
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: CreateErrorLastThread__calloc_crt__dosmaperr__getptd_noexit_free
            • String ID:
            • API String ID: 2664167353-0
            • Opcode ID: 7350cb7bd7df274ee1cc3673e92b9b3e18d3ef03b1d8ba3ceb5910bdbe807b69
            • Instruction ID: cce48ef34ca4246a756c5adb303512c9363475dc7f1c8b1b41dec6ee271ded52
            • Opcode Fuzzy Hash: 7350cb7bd7df274ee1cc3673e92b9b3e18d3ef03b1d8ba3ceb5910bdbe807b69
            • Instruction Fuzzy Hash: AC112B33104306AFDB11AFA5DC42DBB3B98EF50770B14002BF91486341EB31C81187B1
            APIs
            • GetUserObjectSecurity.USER32(?,?,?,00000000,?), ref: 00DEABD7
            • GetLastError.KERNEL32(?,00DEA69F,?,?,?), ref: 00DEABE1
            • GetProcessHeap.KERNEL32(00000008,?,?,00DEA69F,?,?,?), ref: 00DEABF0
            • HeapAlloc.KERNEL32(00000000,?,00DEA69F,?,?,?), ref: 00DEABF7
            • GetUserObjectSecurity.USER32(?,?,00000000,?,?), ref: 00DEAC0E
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
            • String ID:
            • API String ID: 842720411-0
            • Opcode ID: 9e1a38a9d6664a32a6149a9068b72701c9e9a578cf162968f330a84bf09d472a
            • Instruction ID: 64925a53411ffed6091eabfbedec908185818ee431c59a7745581d4d75f7c49a
            • Opcode Fuzzy Hash: 9e1a38a9d6664a32a6149a9068b72701c9e9a578cf162968f330a84bf09d472a
            • Instruction Fuzzy Hash: 1C014674205249BFDB105FAAEC48DAB3EBCEF8A3547240429F905D3260DA719C44CA71
            APIs
            • CLSIDFromProgID.OLE32 ref: 00DE9ADC
            • ProgIDFromCLSID.OLE32(?,00000000), ref: 00DE9AF7
            • lstrcmpiW.KERNEL32(?,00000000), ref: 00DE9B05
            • CoTaskMemFree.OLE32(00000000,?,00000000), ref: 00DE9B15
            • CLSIDFromString.OLE32(?,?), ref: 00DE9B21
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: From$Prog$FreeStringTasklstrcmpi
            • String ID:
            • API String ID: 3897988419-0
            • Opcode ID: ade2e5f1d616443cc5910da169fccb50c6a007704f7ece164c8ff296db53e5b3
            • Instruction ID: 1cf86dabb18a3a6433c236ea01151b01cfc7fa8d06c52f3e077ccd133f039731
            • Opcode Fuzzy Hash: ade2e5f1d616443cc5910da169fccb50c6a007704f7ece164c8ff296db53e5b3
            • Instruction Fuzzy Hash: 5F018B76601248BFDB146F6AEC88BAABEEDEF44352F148424F905E2210D770ED049BB0
            APIs
            • QueryPerformanceCounter.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?), ref: 00DF7A74
            • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 00DF7A82
            • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 00DF7A8A
            • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 00DF7A94
            • Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?), ref: 00DF7AD0
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: PerformanceQuery$CounterSleep$Frequency
            • String ID:
            • API String ID: 2833360925-0
            • Opcode ID: 81064114583901eabde3ab12b0c65d0fd92f86ea97a1b36aa209e0ef9527e1ac
            • Instruction ID: 41cd903a00f6062c3d1483105d95fe66f48e1d64b4d2e1044137f8a0038d20b0
            • Opcode Fuzzy Hash: 81064114583901eabde3ab12b0c65d0fd92f86ea97a1b36aa209e0ef9527e1ac
            • Instruction Fuzzy Hash: F6012931C0962DEFCF00AFE9EC4CAEEBB78FB08751F068495E646B2150DB30965487A1
            APIs
            • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00DEAADA
            • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00DEAAE4
            • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00DEAAF3
            • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00DEAAFA
            • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00DEAB10
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: HeapInformationToken$AllocErrorLastProcess
            • String ID:
            • API String ID: 44706859-0
            • Opcode ID: 486febd39354c8b365acacdbec209b6ad719cbec27607b64b9b69200d42f799e
            • Instruction ID: 8ba69e16cbdb91a1269aea12edda11c1b392dbb3b31fc69ff2d51218fb042a1c
            • Opcode Fuzzy Hash: 486febd39354c8b365acacdbec209b6ad719cbec27607b64b9b69200d42f799e
            • Instruction Fuzzy Hash: 40F04F71205209AFEB111FAAFC88EA73B6DFF45754F040029F941D7190CA61EC159E71
            APIs
            • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00DEAA79
            • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00DEAA83
            • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00DEAA92
            • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00DEAA99
            • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00DEAAAF
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: HeapInformationToken$AllocErrorLastProcess
            • String ID:
            • API String ID: 44706859-0
            • Opcode ID: b5721a0f99cb688cbfeccbee7309daa879a67217ae0e552a97e4b4ffb54f942a
            • Instruction ID: bf1c65a7584e815df24cd0c41f6b33957ccdf14eb7d718e8954d4a3dd47409b1
            • Opcode Fuzzy Hash: b5721a0f99cb688cbfeccbee7309daa879a67217ae0e552a97e4b4ffb54f942a
            • Instruction Fuzzy Hash: BCF0AF31205309AFEB102FAAAC8CEA73FACFF49758F04002AF901D7190DA61EC05CA71
            APIs
            • GetDlgItem.USER32(?,000003E9), ref: 00DEEC94
            • GetWindowTextW.USER32(00000000,?,00000100), ref: 00DEECAB
            • MessageBeep.USER32(00000000), ref: 00DEECC3
            • KillTimer.USER32(?,0000040A), ref: 00DEECDF
            • EndDialog.USER32(?,00000001), ref: 00DEECF9
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: BeepDialogItemKillMessageTextTimerWindow
            • String ID:
            • API String ID: 3741023627-0
            • Opcode ID: e252be0d921d4bfc763035eb5dbbf83c931370fc47ca47b2cdf98853ce11c3c4
            • Instruction ID: b59c24800aef09b523e3115621fe829eb1bca8f9b298bc77174c2059c79c2557
            • Opcode Fuzzy Hash: e252be0d921d4bfc763035eb5dbbf83c931370fc47ca47b2cdf98853ce11c3c4
            • Instruction Fuzzy Hash: 06018630504748EFEB246B21EE4EB967BB8FF00705F140559B693714E0DBF4A958CB60
            APIs
            • EndPath.GDI32(?), ref: 00DCB0BA
            • StrokeAndFillPath.GDI32(?,?,00E2E680,00000000,?,?,?), ref: 00DCB0D6
            • SelectObject.GDI32(?,00000000), ref: 00DCB0E9
            • DeleteObject.GDI32 ref: 00DCB0FC
            • StrokePath.GDI32(?), ref: 00DCB117
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: Path$ObjectStroke$DeleteFillSelect
            • String ID:
            • API String ID: 2625713937-0
            • Opcode ID: bc314fb46472c50e9e227768c290371b9c542c3a9ef3db7c6fdf2a5549f283af
            • Instruction ID: a3c4baac057cfe1a9050ffa1ba0dccb4498a7f7f046ad7f87a2a6982f4a5431d
            • Opcode Fuzzy Hash: bc314fb46472c50e9e227768c290371b9c542c3a9ef3db7c6fdf2a5549f283af
            • Instruction Fuzzy Hash: 2BF0B63000834AAFDB259FAAEC0DB553F65B711762F088359F469660F0C731899DDF60
            APIs
            • CoInitialize.OLE32(00000000), ref: 00DFF2DA
            • CoCreateInstance.OLE32(00E3DA7C,00000000,00000001,00E3D8EC,?), ref: 00DFF2F2
            • CoUninitialize.OLE32 ref: 00DFF555
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: CreateInitializeInstanceUninitialize
            • String ID: .lnk
            • API String ID: 948891078-24824748
            • Opcode ID: 8e6ba0a896301a33eb7c2acd4044b6d503d4d9a6b0f818f07f70bc0ed3e081b8
            • Instruction ID: cd7fc4f48f2c76429f595fd4e1483625f047acaf4037cb18c4b454a132721997
            • Opcode Fuzzy Hash: 8e6ba0a896301a33eb7c2acd4044b6d503d4d9a6b0f818f07f70bc0ed3e081b8
            • Instruction Fuzzy Hash: 6FA11971108205AFD300EF64C891EAFB7B8EF98714F04491DF65697292EB70EA49CB72
            APIs
              • Part of subcall function 00DB660F: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00DB53B1,?,?,00DB61FF,?,00000000,00000001,00000000), ref: 00DB662F
            • CoInitialize.OLE32(00000000), ref: 00DFE85D
            • CoCreateInstance.OLE32(00E3DA7C,00000000,00000001,00E3D8EC,?), ref: 00DFE876
            • CoUninitialize.OLE32 ref: 00DFE893
              • Part of subcall function 00DB936C: __swprintf.LIBCMT ref: 00DB93AB
              • Part of subcall function 00DB936C: __itow.LIBCMT ref: 00DB93DF
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: CreateFullInitializeInstanceNamePathUninitialize__itow__swprintf
            • String ID: .lnk
            • API String ID: 2126378814-24824748
            • Opcode ID: 3cb551741aa31634b8251bef5d7ffd7515e955b378afd9985a1cd2f076fb61fd
            • Instruction ID: 151be86c3859932f103c9e0e7c1b066761cf2f5e97cd1fae10ab2d4a123a84e7
            • Opcode Fuzzy Hash: 3cb551741aa31634b8251bef5d7ffd7515e955b378afd9985a1cd2f076fb61fd
            • Instruction Fuzzy Hash: ECA134356043059FCB14DF14C88496EBBE5FF88310F198998FA9A9B3A1CB31ED45CBA1
            APIs
            • __startOneArgErrorHandling.LIBCMT ref: 00DD32ED
              • Part of subcall function 00DDE0D0: __87except.LIBCMT ref: 00DDE10B
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: ErrorHandling__87except__start
            • String ID: pow
            • API String ID: 2905807303-2276729525
            • Opcode ID: 2dce5ad3419a114333be896e37964adbde0899970d6fba08babc1b3f9cbbf28b
            • Instruction ID: 993460e5e04d2acd131ee97ac1404aad5d26607fa9391e7e5a337925aa4cfe07
            • Opcode Fuzzy Hash: 2dce5ad3419a114333be896e37964adbde0899970d6fba08babc1b3f9cbbf28b
            • Instruction Fuzzy Hash: 62513921E092019ACB157714CE4137E7F94EB81710F688D2BF4C58A3A9DE74CDC996BB
            APIs
            • CharUpperBuffW.USER32(0000000C,00000016,00000016,00000000,00000000,?,00000000,00E4DC50,?,0000000F,0000000C,00000016,00E4DC50,?), ref: 00DF4645
              • Part of subcall function 00DB936C: __swprintf.LIBCMT ref: 00DB93AB
              • Part of subcall function 00DB936C: __itow.LIBCMT ref: 00DB93DF
            • CharUpperBuffW.USER32(?,?,00000000,?), ref: 00DF46C5
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: BuffCharUpper$__itow__swprintf
            • String ID: REMOVE$THIS
            • API String ID: 3797816924-776492005
            • Opcode ID: dac402147fa5135ddb7adc18a996594ee7eb5dbb0ef8558e455b89c80fdd51b6
            • Instruction ID: c04b94de78194d6576c1aed854869635cef9a57be143f44177217edab2f7fc85
            • Opcode Fuzzy Hash: dac402147fa5135ddb7adc18a996594ee7eb5dbb0ef8558e455b89c80fdd51b6
            • Instruction Fuzzy Hash: 85414B74A0021D9FCF01EF64C885ABEB7B5FF49314F198059EA16AB2A2DB34D945CB70
            APIs
              • Part of subcall function 00DF430B: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00DEBC08,?,?,00000034,00000800,?,00000034), ref: 00DF4335
            • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 00DEC1D3
              • Part of subcall function 00DF42D6: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00DEBC37,?,?,00000800,?,00001073,00000000,?,?), ref: 00DF4300
              • Part of subcall function 00DF422F: GetWindowThreadProcessId.USER32(?,?), ref: 00DF425A
              • Part of subcall function 00DF422F: OpenProcess.KERNEL32(00000438,00000000,?,?,?,00DEBBCC,00000034,?,?,00001004,00000000,00000000), ref: 00DF426A
              • Part of subcall function 00DF422F: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,00DEBBCC,00000034,?,?,00001004,00000000,00000000), ref: 00DF4280
            • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00DEC240
            • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00DEC28D
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
            • String ID: @
            • API String ID: 4150878124-2766056989
            • Opcode ID: 113264931196c3d68dfa62f7f80f58ebeabb52294dcc6c82babaca5966a85ece
            • Instruction ID: b522d4d6578690a0f0d3ae5b5a2a5dda5ed9cab793b57a7ece426c33124ac7af
            • Opcode Fuzzy Hash: 113264931196c3d68dfa62f7f80f58ebeabb52294dcc6c82babaca5966a85ece
            • Instruction Fuzzy Hash: C1411C7290021CAEDB11EBA4CD81AEEB7B8FB09710F044095FA56B7181DA716E45CB75
            APIs
            • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,00E4DC00,00000000,?,?,?,?), ref: 00E1A6D8
            • GetWindowLongW.USER32 ref: 00E1A6F5
            • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00E1A705
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: Window$Long
            • String ID: SysTreeView32
            • API String ID: 847901565-1698111956
            • Opcode ID: 55fbb2c31cac6be2a74d50d4e471ab7109963f1b28568720f271bd35b27c18cc
            • Instruction ID: bc60eb7b907a58767fda7f747b3ee57a0806fb11dc9bae9b304b81498ffc5609
            • Opcode Fuzzy Hash: 55fbb2c31cac6be2a74d50d4e471ab7109963f1b28568720f271bd35b27c18cc
            • Instruction Fuzzy Hash: E631B371141205AFDB118F34DC45BE67BA9EB45328F185725F875A32E0C730E9908B60
            APIs
            • _memset.LIBCMT ref: 00E05190
            • InternetCrackUrlW.WININET(?,00000000,00000000,?), ref: 00E051C6
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: CrackInternet_memset
            • String ID: |$D
            • API String ID: 1413715105-465884809
            • Opcode ID: a86579e35f047e9eac56397f1592943bae1d650bb7fc9fe8fb0046883b111b33
            • Instruction ID: 1bc3a85f5ca06bae68ee69870530d6850752cdcfcf6994e9857de12d8bfcfe6f
            • Opcode Fuzzy Hash: a86579e35f047e9eac56397f1592943bae1d650bb7fc9fe8fb0046883b111b33
            • Instruction Fuzzy Hash: A8311671811119EBCF01EFA4CC85AEEBFB9FF19714F100019E915A6166EA31AA46DBB0
            APIs
            • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00E1A15E
            • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00E1A172
            • SendMessageW.USER32(?,00001002,00000000,?), ref: 00E1A196
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: MessageSend$Window
            • String ID: SysMonthCal32
            • API String ID: 2326795674-1439706946
            • Opcode ID: 1f66e06e79aa3389bf8fa197b1da8fcabc96f9c8385d92267c83d2927fa720e9
            • Instruction ID: 3c72274c9b60c102bd8eb4d9ddbb4a63ed380fa94510672aa8f701458be446dc
            • Opcode Fuzzy Hash: 1f66e06e79aa3389bf8fa197b1da8fcabc96f9c8385d92267c83d2927fa720e9
            • Instruction Fuzzy Hash: FC21AD72600218BBDF118FA4CC42FEA3B79EF48724F151224FA55BB1D0D6B5A894CBA0
            APIs
            • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 00E1A941
            • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 00E1A94F
            • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 00E1A956
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: MessageSend$DestroyWindow
            • String ID: msctls_updown32
            • API String ID: 4014797782-2298589950
            • Opcode ID: 29dd848ab9da21260cf6e2f5514d9c942fecfc2490cc47fe2b998c2a37d04dc8
            • Instruction ID: ba76735357f6a6c921bd11ab79ea72205a98e0279815a0bf795c227069553559
            • Opcode Fuzzy Hash: 29dd848ab9da21260cf6e2f5514d9c942fecfc2490cc47fe2b998c2a37d04dc8
            • Instruction Fuzzy Hash: 082195B5600209AFDB10DF68DC92DB737ADEB5A358B050059F905A7351CB30EC91CB71
            APIs
            • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00E19A30
            • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00E19A40
            • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00E19A65
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: MessageSend$MoveWindow
            • String ID: Listbox
            • API String ID: 3315199576-2633736733
            • Opcode ID: fe3abe86c0135587ee5f0b3a38f228f9b2c6e005c3e2af91c56e669572d049a8
            • Instruction ID: 8bd2babfc6d851102eb0551bc00e461009da164d69c2484b0e1a92f19a891301
            • Opcode Fuzzy Hash: fe3abe86c0135587ee5f0b3a38f228f9b2c6e005c3e2af91c56e669572d049a8
            • Instruction Fuzzy Hash: E721F572600118BFDB118F54DC95FFB3BAAEF89754F019128F95467191C6719C9187A0
            APIs
            • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00E1A46D
            • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 00E1A482
            • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00E1A48F
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: MessageSend
            • String ID: msctls_trackbar32
            • API String ID: 3850602802-1010561917
            • Opcode ID: f7c202fa41f921362370063bf3f17a9b480a7a9ceb9a0e24ce31afec75657e2f
            • Instruction ID: fa09b5ee6ccb81e032d13382d5542f913821c78833081de1ecb1c85a560a89ff
            • Opcode Fuzzy Hash: f7c202fa41f921362370063bf3f17a9b480a7a9ceb9a0e24ce31afec75657e2f
            • Instruction Fuzzy Hash: 1A110A71240308BEEF205F65CC49FEB3B69EF89758F054128FA55B60D1D2B2E851CB20
            APIs
            • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoInitialize,00DD2350,?), ref: 00DD22A1
            • GetProcAddress.KERNEL32(00000000), ref: 00DD22A8
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: AddressLibraryLoadProc
            • String ID: RoInitialize$combase.dll
            • API String ID: 2574300362-340411864
            • Opcode ID: 0ec0d6df9db50040df61819dade0fab46e1f51688cf1a3165ebcdce8eaad18a6
            • Instruction ID: 1ac7dcfd8b88bea0c130938603e40e65018e3fb922194e6dbde0e72a9c67e692
            • Opcode Fuzzy Hash: 0ec0d6df9db50040df61819dade0fab46e1f51688cf1a3165ebcdce8eaad18a6
            • Instruction Fuzzy Hash: D8E01270A99300EFDB609F72FD4EB263E69AB10B02F804020F106F61A0CBF44098DF18
            APIs
            • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,00DD2276), ref: 00DD2376
            • GetProcAddress.KERNEL32(00000000), ref: 00DD237D
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: AddressLibraryLoadProc
            • String ID: RoUninitialize$combase.dll
            • API String ID: 2574300362-2819208100
            • Opcode ID: 6069532b9516f16deafba72e98eb80eba1130ec4fc052f446d68808cb8a6e5a6
            • Instruction ID: d8abfcfb118ec2841d8d1857c20a1896368d8c6131d5749d20bdcb6e3c134489
            • Opcode Fuzzy Hash: 6069532b9516f16deafba72e98eb80eba1130ec4fc052f446d68808cb8a6e5a6
            • Instruction Fuzzy Hash: D3E0B67054A304EFDB60AF62FD0DB153A65B710712F550424F10DF21B0CBF99499DA14
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: LocalTime__swprintf
            • String ID: %.3d$WIN_XPe
            • API String ID: 2070861257-2409531811
            • Opcode ID: 89ce0e0b6315e0d9f3fd9ce62510916a781117f8375dad9b7926709187d5dd6f
            • Instruction ID: 2ba7023fe17a90734caa957fabd8e62ecb738260b9222c86d60d4e845f0b9b85
            • Opcode Fuzzy Hash: 89ce0e0b6315e0d9f3fd9ce62510916a781117f8375dad9b7926709187d5dd6f
            • Instruction Fuzzy Hash: D9E012B180862CEFCB119750ED06DFAB37DEB04741F2814E2F906B2110D6359B94AB22
            APIs
            • LoadLibraryA.KERNEL32(kernel32.dll,00000000,00DB42EC,?,00DB42AA,?), ref: 00DB4304
            • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00DB4316
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: AddressLibraryLoadProc
            • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
            • API String ID: 2574300362-1355242751
            • Opcode ID: dac01aadea600aa85b7ed8baa60a3de8f2254e0d877a81c91829fd23dacfa2ac
            • Instruction ID: fa72a8cad42542f09ec79a51fccf5a25a41c3a442961e3f0550629b737dcfff0
            • Opcode Fuzzy Hash: dac01aadea600aa85b7ed8baa60a3de8f2254e0d877a81c91829fd23dacfa2ac
            • Instruction Fuzzy Hash: 56D0A730485B12DFC7208F31FC0C6417BD4AB05301B08442EE542F2265D7B0CC848B60
            APIs
            • LoadLibraryA.KERNEL32(kernel32.dll,?,00E121FB,?,00E123EF), ref: 00E12213
            • GetProcAddress.KERNEL32(00000000,GetProcessId), ref: 00E12225
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: AddressLibraryLoadProc
            • String ID: GetProcessId$kernel32.dll
            • API String ID: 2574300362-399901964
            • Opcode ID: 11d39030fc33bd0a13516d452fb2cb0fdd23a91eb8f8231b607d502b6871243e
            • Instruction ID: 0a33fe790f115935ba15bae41ba20bc0d14d665e7611468b3c981c64381b3049
            • Opcode Fuzzy Hash: 11d39030fc33bd0a13516d452fb2cb0fdd23a91eb8f8231b607d502b6871243e
            • Instruction Fuzzy Hash: 44D0A7744457169FC7214F31FC0C6457BD5EB04308B00642EE942F2160D770D8D4C650
            APIs
            • LoadLibraryA.KERNEL32(kernel32.dll,00DB41BB,00DB4341,?,00DB422F,?,00DB41BB,?,?,?,?,00DB39FE,?,00000001), ref: 00DB4359
            • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00DB436B
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: AddressLibraryLoadProc
            • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
            • API String ID: 2574300362-3689287502
            • Opcode ID: a8517115cdda80850682c0895a638d8d79c7c2d6bac5aa193bfca6e551102b38
            • Instruction ID: a36af50ffe4614b8b0ed145a621ef3595d8b0711f2302eddf620445ea18f3120
            • Opcode Fuzzy Hash: a8517115cdda80850682c0895a638d8d79c7c2d6bac5aa193bfca6e551102b38
            • Instruction Fuzzy Hash: FDD0A730485722DFC7208F31FC0CA417BD4AB10715B08842EE482F2250D7B0D8848B60
            APIs
            • LoadLibraryA.KERNEL32(oleaut32.dll,00000000,00DF052F,?,00DF06D7), ref: 00DF0572
            • GetProcAddress.KERNEL32(00000000,UnRegisterTypeLibForUser), ref: 00DF0584
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: AddressLibraryLoadProc
            • String ID: UnRegisterTypeLibForUser$oleaut32.dll
            • API String ID: 2574300362-1587604923
            • Opcode ID: 34ec40837b74f85df6521d376ee58a16a4830ad114ccf3e3a11bcf7c11280886
            • Instruction ID: 9d2b360c2989ffa95456f16741a108a7c122debd29ec3315eed3b631919fb3a4
            • Opcode Fuzzy Hash: 34ec40837b74f85df6521d376ee58a16a4830ad114ccf3e3a11bcf7c11280886
            • Instruction Fuzzy Hash: 7ED05E305447169FC7205F21BC08A127FE4AB04301B55C41DEA41F2250D6B0C4888A60
            APIs
            • LoadLibraryA.KERNEL32(oleaut32.dll,?,00DF051D,?,00DF05FE), ref: 00DF0547
            • GetProcAddress.KERNEL32(00000000,RegisterTypeLibForUser), ref: 00DF0559
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: AddressLibraryLoadProc
            • String ID: RegisterTypeLibForUser$oleaut32.dll
            • API String ID: 2574300362-1071820185
            • Opcode ID: 622153084f94d8829dda0a19329a25e0ef2d22460806e2707198b9882d640b12
            • Instruction ID: d0cd074a7445e3050468fbb0f6f6a78775442053d749d6a4ece4408597cd7345
            • Opcode Fuzzy Hash: 622153084f94d8829dda0a19329a25e0ef2d22460806e2707198b9882d640b12
            • Instruction Fuzzy Hash: C0D0A730544B169FC7208F21FC0C6117EE4AB00341B15C41DE546F3251D6F0C8848A60
            APIs
            • LoadLibraryA.KERNEL32(kernel32.dll,?,00E0ECBE,?,00E0EBBB), ref: 00E0ECD6
            • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 00E0ECE8
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: AddressLibraryLoadProc
            • String ID: GetSystemWow64DirectoryW$kernel32.dll
            • API String ID: 2574300362-1816364905
            • Opcode ID: 03666df40c6ed796db06ae8f68aaaad462cab1dd221652010b01287a53987775
            • Instruction ID: ff352219cdca6899de0b448d43586873f6c553a28a235b4edfb3a6365206bc9c
            • Opcode Fuzzy Hash: 03666df40c6ed796db06ae8f68aaaad462cab1dd221652010b01287a53987775
            • Instruction Fuzzy Hash: CFD05E704467239FDB245B61BC88702BBE4AB00344B04982AF855F2290DA70C8848650
            APIs
            • LoadLibraryA.KERNEL32(kernel32.dll,00000000,00E0BAD3,00000001,00E0B6EE,?,00E4DC00), ref: 00E0BAEB
            • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 00E0BAFD
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: AddressLibraryLoadProc
            • String ID: GetModuleHandleExW$kernel32.dll
            • API String ID: 2574300362-199464113
            • Opcode ID: 2b101326824ec655319631a3584928f24ae0ba6c9fd6df36baee3cd0f74eb38b
            • Instruction ID: 66eeb76fb5fd3bb53e86ffeb570619a1080fceebb8b40a9582534ba900c7dfa9
            • Opcode Fuzzy Hash: 2b101326824ec655319631a3584928f24ae0ba6c9fd6df36baee3cd0f74eb38b
            • Instruction Fuzzy Hash: 36D05E70C557129FC7305F61BC48A117BD4AB00344B00542AA843F2190D770C894CA50
            APIs
            • LoadLibraryA.KERNEL32(advapi32.dll,?,00E13BD1,?,00E13E06), ref: 00E13BE9
            • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00E13BFB
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: AddressLibraryLoadProc
            • String ID: RegDeleteKeyExW$advapi32.dll
            • API String ID: 2574300362-4033151799
            • Opcode ID: 9baf5cf00c887dfce418d6f7f31923878cd687be4230cb332548bc6be319e7ad
            • Instruction ID: 40d9ee6cef39955543f54857c862053997f16304890eec0aade72c06bd24f07b
            • Opcode Fuzzy Hash: 9baf5cf00c887dfce418d6f7f31923878cd687be4230cb332548bc6be319e7ad
            • Instruction Fuzzy Hash: E5D0A7B44447169FC7205F71FC0C64BFEF4AB01318B105429E446F2190D6B0C4C48EA0
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 6172ed31aa9a91cf50ba1debc7a0fbad5f6e4e9700b85ba55e610d42f02c77d5
            • Instruction ID: daf31853453b59bbe992f7d1b50a61ee79b6d66573840483b8f99d21c4452e7b
            • Opcode Fuzzy Hash: 6172ed31aa9a91cf50ba1debc7a0fbad5f6e4e9700b85ba55e610d42f02c77d5
            • Instruction Fuzzy Hash: B8C17D75A0125AEFCB14EFA5C8A4AAEF7B5FF48700F244598E905EB251D730DE41CBA0
            APIs
            • CoInitialize.OLE32(00000000), ref: 00E0AAB4
            • CoUninitialize.OLE32 ref: 00E0AABF
              • Part of subcall function 00DF0213: CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00DF027B
            • VariantInit.OLEAUT32(?), ref: 00E0AACA
            • VariantClear.OLEAUT32(?), ref: 00E0AD9D
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: Variant$ClearCreateInitInitializeInstanceUninitialize
            • String ID:
            • API String ID: 780911581-0
            • Opcode ID: 508627efc1273ad1a2fc4d2d4ae74188f408be589a3524347dde36cfb81af604
            • Instruction ID: 0d0fddc58d3a9dfa6a349bb963f43359d5a7d5618563bed56a353a80db1742f2
            • Opcode Fuzzy Hash: 508627efc1273ad1a2fc4d2d4ae74188f408be589a3524347dde36cfb81af604
            • Instruction Fuzzy Hash: 78A135352047059FDB10DF14C891B6AB7E5FF89314F188459FA96AB3A2CB30ED44CBA6
            APIs
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: Variant$AllocClearCopyInitString
            • String ID:
            • API String ID: 2808897238-0
            • Opcode ID: b117e69a101d1b1309f475343c64784d259eb571f641e9866f87afb51083c983
            • Instruction ID: 96f2a10b5014ce608a9b1e9e0e5fb778cc6a3eb4cbf5b0a2d02e65850036113b
            • Opcode Fuzzy Hash: b117e69a101d1b1309f475343c64784d259eb571f641e9866f87afb51083c983
            • Instruction Fuzzy Hash: B551B030605386ABDB24BF6BD8A1A6EF3A5EF45310F24881FE596CB2D1DB70D8408735
            APIs
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: _memset$__filbuf__getptd_noexit_memcpy_s
            • String ID:
            • API String ID: 3877424927-0
            • Opcode ID: 065ad613f1183b824f05baa70d3d15c8958660488bca00daffb81e2f860a9d07
            • Instruction ID: 71867716eecdd00d6656fdd8a649d87127e16ce1ec7584547fc0c3aa2bd34841
            • Opcode Fuzzy Hash: 065ad613f1183b824f05baa70d3d15c8958660488bca00daffb81e2f860a9d07
            • Instruction Fuzzy Hash: 7751A5B0A00705ABDB249FA9888566E77A1EF40320F28872BF865963D0D771DF50DB72
            APIs
            • GetWindowRect.USER32(01657CF8,?), ref: 00E1C544
            • ScreenToClient.USER32(?,00000002), ref: 00E1C574
            • MoveWindow.USER32(00000002,?,?,?,000000FF,00000001,?,00000002,?,?,?,00000002,?,?), ref: 00E1C5DA
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: Window$ClientMoveRectScreen
            • String ID:
            • API String ID: 3880355969-0
            • Opcode ID: d6183f9534994bfdb9dff3914d87a4ec1ad5b811148c64f6c516ac421ae4728b
            • Instruction ID: 94239dd60df3473b5a797f913d26ac10f87ba733c7ae8103899ec47187c23d01
            • Opcode Fuzzy Hash: d6183f9534994bfdb9dff3914d87a4ec1ad5b811148c64f6c516ac421ae4728b
            • Instruction Fuzzy Hash: 93515075900204EFCF10DF69D881AEE7BB6EB55724F209259F969E7290D730ED81CB90
            APIs
            • SendMessageW.USER32(?,0000110A,00000004,00000000), ref: 00DEC462
            • __itow.LIBCMT ref: 00DEC49C
              • Part of subcall function 00DEC6E8: SendMessageW.USER32(?,0000113E,00000000,00000000), ref: 00DEC753
            • SendMessageW.USER32(?,0000110A,00000001,?), ref: 00DEC505
            • __itow.LIBCMT ref: 00DEC55A
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: MessageSend$__itow
            • String ID:
            • API String ID: 3379773720-0
            • Opcode ID: e3e180f191d4ff5f566f999f8d482730d86099960aca6ef40874109696e14e80
            • Instruction ID: ef75f198eb5b393bada3a260a75229c977041ecf6afa3d8d4bdf9de1106ea138
            • Opcode Fuzzy Hash: e3e180f191d4ff5f566f999f8d482730d86099960aca6ef40874109696e14e80
            • Instruction Fuzzy Hash: 2441D771600748AFDF11EF59D851FEE7BB5EF44740F041059F906A3281DB74AA468BB1
            APIs
            • GetKeyboardState.USER32(?,00000000,?,00000001), ref: 00DF3966
            • SetKeyboardState.USER32(00000080,?,00000001), ref: 00DF3982
            • PostMessageW.USER32(00000000,00000102,?,00000001), ref: 00DF39EF
            • SendInput.USER32(00000001,?,0000001C,00000000,?,00000001), ref: 00DF3A4D
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: KeyboardState$InputMessagePostSend
            • String ID:
            • API String ID: 432972143-0
            • Opcode ID: 24a361357bc59e1d3edf7492bff7acc2a5c125cc27f6a197c596677db19ed83b
            • Instruction ID: 11908c001b503696e2d7a5c8014d6310a7e08ee3200203821ef8240dbaedb81d
            • Opcode Fuzzy Hash: 24a361357bc59e1d3edf7492bff7acc2a5c125cc27f6a197c596677db19ed83b
            • Instruction Fuzzy Hash: A541F770A0424CAEEF208B6588097FDBBB99B55310F1A815AF6C1662C1C7F4CE85DB75
            APIs
            • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 00DFE742
            • GetLastError.KERNEL32(?,00000000), ref: 00DFE768
            • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 00DFE78D
            • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 00DFE7B9
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: CreateHardLink$DeleteErrorFileLast
            • String ID:
            • API String ID: 3321077145-0
            • Opcode ID: 72c12f61a2b215e0fea030ad68a6453d41c48d9de181ab5f40893a260720c973
            • Instruction ID: 3240a92f0b7cdba0311ca23ea31dcb3e137a3a9fb15644049905a046a69dc98f
            • Opcode Fuzzy Hash: 72c12f61a2b215e0fea030ad68a6453d41c48d9de181ab5f40893a260720c973
            • Instruction Fuzzy Hash: 04413739204654DFCB11EF15C544A9DBBE6FF59710B19C498EA46AB3A2CB30FC04CBA1
            APIs
            • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00E1B5D1
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: InvalidateRect
            • String ID:
            • API String ID: 634782764-0
            • Opcode ID: d64bc42f57833d9ef9b8a100536f63e06ecbbec48b69eb48de104e747c474cee
            • Instruction ID: 64e52f46022fe0e4ea19b628d32ea1cb2c8e96420e9fc6cfe2ee1ca16ddba962
            • Opcode Fuzzy Hash: d64bc42f57833d9ef9b8a100536f63e06ecbbec48b69eb48de104e747c474cee
            • Instruction Fuzzy Hash: 5931E074601208BFEF209F19CC89FE93B6AEB15354F646105FA62F62E1C730A9C08B61
            APIs
            • ClientToScreen.USER32(?,?), ref: 00E1D807
            • GetWindowRect.USER32(?,?), ref: 00E1D87D
            • PtInRect.USER32(?,?,00E1ED5A), ref: 00E1D88D
            • MessageBeep.USER32(00000000), ref: 00E1D8FE
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: Rect$BeepClientMessageScreenWindow
            • String ID:
            • API String ID: 1352109105-0
            • Opcode ID: f92dc1200f2d301687bab9fcde8471196878b7550bea498a650542a5192fa23e
            • Instruction ID: b3bc65454dd35362e279687ece9eadb89a8a1eed4e5dac84f40378b36ff3714e
            • Opcode Fuzzy Hash: f92dc1200f2d301687bab9fcde8471196878b7550bea498a650542a5192fa23e
            • Instruction Fuzzy Hash: 6D418A70A08218EFCB19DF99DC84BE97BF5FB48315F1891A9E418AB260D330E985CB40
            APIs
            • GetKeyboardState.USER32(?,75A4C0D0,?,00008000), ref: 00DF3AB8
            • SetKeyboardState.USER32(00000080,?,00008000), ref: 00DF3AD4
            • PostMessageW.USER32(00000000,00000101,00000000,?), ref: 00DF3B34
            • SendInput.USER32(00000001,?,0000001C,75A4C0D0,?,00008000), ref: 00DF3B92
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: KeyboardState$InputMessagePostSend
            • String ID:
            • API String ID: 432972143-0
            • Opcode ID: b8c5fe52eda44a579aa83932333bd3fa6c480d39f1c2ebd639e15385b60af770
            • Instruction ID: 4c10d7f451ea260efd92371c0c5f3ae8b98cbc00d3db0245670a6fb5ed3bf0cf
            • Opcode Fuzzy Hash: b8c5fe52eda44a579aa83932333bd3fa6c480d39f1c2ebd639e15385b60af770
            • Instruction Fuzzy Hash: CE312430A0025CAEEF258B64CC29BFE7BA99B55310F0B815AE6C1A72D1C7748B85C771
            APIs
            • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00DE4038
            • __isleadbyte_l.LIBCMT ref: 00DE4066
            • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,?,00000000,?,00000000,?,?,?), ref: 00DE4094
            • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,?,00000000,?,00000000,?,?,?), ref: 00DE40CA
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
            • String ID:
            • API String ID: 3058430110-0
            • Opcode ID: 3349aa5377e37b28e80b688d9dfd4030efbcedc35741e24ba310978dcfbba17b
            • Instruction ID: 23f345efea3e51ded071c763fb1eb5a487021c198344f8690fb4beae599ab170
            • Opcode Fuzzy Hash: 3349aa5377e37b28e80b688d9dfd4030efbcedc35741e24ba310978dcfbba17b
            • Instruction Fuzzy Hash: 0131B231604286EFDF21AF76C844B6A7BB5FF40361F194439E66587191E731D890D7B0
            APIs
            • GetForegroundWindow.USER32 ref: 00E17CB9
              • Part of subcall function 00DF5F55: GetWindowThreadProcessId.USER32(?,00000000), ref: 00DF5F6F
              • Part of subcall function 00DF5F55: GetCurrentThreadId.KERNEL32 ref: 00DF5F76
              • Part of subcall function 00DF5F55: AttachThreadInput.USER32(00000000,?,00DF781F), ref: 00DF5F7D
            • GetCaretPos.USER32(?), ref: 00E17CCA
            • ClientToScreen.USER32(00000000,?), ref: 00E17D03
            • GetForegroundWindow.USER32 ref: 00E17D09
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
            • String ID:
            • API String ID: 2759813231-0
            • Opcode ID: b39621da84919a3867750079f9c747b1c1abc1392605370c0462fb292fbd964d
            • Instruction ID: 4db884e50ab4ffb7f9200ebc8be26098651b83311a24af9f4e7e3978a44bf77f
            • Opcode Fuzzy Hash: b39621da84919a3867750079f9c747b1c1abc1392605370c0462fb292fbd964d
            • Instruction Fuzzy Hash: C4312D71900108AFCB00EFA5DC459FFBBF9EF58314B10846AE915E3211DA309E458BB0
            APIs
              • Part of subcall function 00DCB34E: GetWindowLongW.USER32(?,000000EB), ref: 00DCB35F
            • GetCursorPos.USER32(?), ref: 00E1F211
            • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,00E2E4C0,?,?,?,?,?), ref: 00E1F226
            • GetCursorPos.USER32(?), ref: 00E1F270
            • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,00E2E4C0,?,?,?), ref: 00E1F2A6
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: Cursor$LongMenuPopupProcTrackWindow
            • String ID:
            • API String ID: 2864067406-0
            • Opcode ID: 0b17852ab898546e28f23c7d10c96327e9b2f6dc4c979f7163d0e76f5dd77727
            • Instruction ID: e81a9dd440739c5aa903f87d4c0b4524685e56e7a1628ecbc42c6eb2394fed2a
            • Opcode Fuzzy Hash: 0b17852ab898546e28f23c7d10c96327e9b2f6dc4c979f7163d0e76f5dd77727
            • Instruction Fuzzy Hash: 61219139500128EFCB158F95DC59EEA7FB5FF0A714F048469F90A671B1D3309990DBA0
            APIs
            • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00E04358
              • Part of subcall function 00E043E2: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00E04401
              • Part of subcall function 00E043E2: InternetCloseHandle.WININET(00000000), ref: 00E0449E
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: Internet$CloseConnectHandleOpen
            • String ID:
            • API String ID: 1463438336-0
            • Opcode ID: 2925a22ccde6c2c748489957274edf7955700b1f971b06528bc8dc493777427f
            • Instruction ID: 5ccf1cd1c0bb6e4806c35589155f86075782bfebb20ff5049275c05e68923f54
            • Opcode Fuzzy Hash: 2925a22ccde6c2c748489957274edf7955700b1f971b06528bc8dc493777427f
            • Instruction Fuzzy Hash: 1421F2F1200605BFDB119F609D01FBBBBE9FF44704F00601ABB45A65D0D77598A09B90
            APIs
            • select.WSOCK32(00000000,00000001,00000000,00000000,?), ref: 00E08AE0
            • __WSAFDIsSet.WSOCK32(00000000,00000001), ref: 00E08AF2
            • accept.WSOCK32(00000000,00000000,00000000), ref: 00E08AFF
            • WSAGetLastError.WSOCK32(00000000), ref: 00E08B16
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: ErrorLastacceptselect
            • String ID:
            • API String ID: 385091864-0
            • Opcode ID: b7e0b8da0365238275c43ebeb7774122ed3724fcbbe06af602e140a1a9eea5a0
            • Instruction ID: 195fb633940233c1b845d37549a5835a3d07c956cb2256db884a769895901061
            • Opcode Fuzzy Hash: b7e0b8da0365238275c43ebeb7774122ed3724fcbbe06af602e140a1a9eea5a0
            • Instruction Fuzzy Hash: 8B21A871A001289FC7219F69DD85ADEBBFCEF49310F00416AF849E7290DB74DA458FA0
            APIs
            • GetWindowLongW.USER32(?,000000EC), ref: 00E18AA6
            • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00E18AC0
            • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00E18ACE
            • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002), ref: 00E18ADC
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: Window$Long$AttributesLayered
            • String ID:
            • API String ID: 2169480361-0
            • Opcode ID: 7ed1386b7022dea4fdbbc323deba5e6a9bb9551ce8654f26f3805230a906a5e4
            • Instruction ID: 11f2b8c27c7ad8fd341681f39ccb874d66905075feaa261b6cbce37183156755
            • Opcode Fuzzy Hash: 7ed1386b7022dea4fdbbc323deba5e6a9bb9551ce8654f26f3805230a906a5e4
            • Instruction Fuzzy Hash: 8311D031205115AFD744AB28DD09FFE7BADEF85321F18411AF926E72E1CB70AC4087A4
            APIs
              • Part of subcall function 00DF1E68: lstrlenW.KERNEL32(?,00000002,?,?,000000EF,?,00DF0ABB,?,?,?,00DF187A,00000000,000000EF,00000119,?,?), ref: 00DF1E77
              • Part of subcall function 00DF1E68: lstrcpyW.KERNEL32(00000000,?,?,00DF0ABB,?,?,?,00DF187A,00000000,000000EF,00000119,?,?,00000000), ref: 00DF1E9D
              • Part of subcall function 00DF1E68: lstrcmpiW.KERNEL32(00000000,?,00DF0ABB,?,?,?,00DF187A,00000000,000000EF,00000119,?,?), ref: 00DF1ECE
            • lstrlenW.KERNEL32(?,00000002,?,?,?,?,00DF187A,00000000,000000EF,00000119,?,?,00000000), ref: 00DF0AD4
            • lstrcpyW.KERNEL32(00000000,?,?,00DF187A,00000000,000000EF,00000119,?,?,00000000), ref: 00DF0AFA
            • lstrcmpiW.KERNEL32(00000002,cdecl,?,00DF187A,00000000,000000EF,00000119,?,?,00000000), ref: 00DF0B2E
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: lstrcmpilstrcpylstrlen
            • String ID: cdecl
            • API String ID: 4031866154-3896280584
            • Opcode ID: e9251f12b94fbd3ddca4300f1f238716492419a02d0c706b5faaeddbeb9d6b7c
            • Instruction ID: c6f625bb224480c8dd80153dbf7ac5b4783fb0c3e6a482c293f10972a80f967f
            • Opcode Fuzzy Hash: e9251f12b94fbd3ddca4300f1f238716492419a02d0c706b5faaeddbeb9d6b7c
            • Instruction Fuzzy Hash: 0C11B436200309AFDB259F34DC05D7A7BA9FF45350B81802AF905CB251EB719850C7B0
            APIs
            • _free.LIBCMT ref: 00DE2FB5
              • Part of subcall function 00DD395C: __FF_MSGBANNER.LIBCMT ref: 00DD3973
              • Part of subcall function 00DD395C: __NMSG_WRITE.LIBCMT ref: 00DD397A
              • Part of subcall function 00DD395C: RtlAllocateHeap.NTDLL(01630000,00000000,00000001,00000001,00000000,?,?,00DCF507,?,0000000E), ref: 00DD399F
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: AllocateHeap_free
            • String ID:
            • API String ID: 614378929-0
            • Opcode ID: 887ded58efc99ace81cc36b1be0f85fadabe2e9aaf1fad2d7bbd30e5c97e6ac3
            • Instruction ID: 132b7d2d53cf6fdbc839c78ff282efe280abc07b4ac5fc25302a340ba5e623d2
            • Opcode Fuzzy Hash: 887ded58efc99ace81cc36b1be0f85fadabe2e9aaf1fad2d7bbd30e5c97e6ac3
            • Instruction Fuzzy Hash: 3111EC31549255EFDB313F77AC4967A3BA8EF44360F244926F949D7251DB30CD409AB0
            APIs
            • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000,00000000), ref: 00DF05AC
            • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 00DF05C7
            • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 00DF05DD
            • FreeLibrary.KERNEL32(?), ref: 00DF0632
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: Type$FileFreeLibraryLoadModuleNameRegister
            • String ID:
            • API String ID: 3137044355-0
            • Opcode ID: f87a4b52487fdbdf318063cc2a4c293f7a1caf2dbb1d12c99ac5abba0f73f699
            • Instruction ID: 666555a6aa4e44d2f83d0f9991716c7be4e77141a408598be52951c44203f30a
            • Opcode Fuzzy Hash: f87a4b52487fdbdf318063cc2a4c293f7a1caf2dbb1d12c99ac5abba0f73f699
            • Instruction Fuzzy Hash: 02215E7190020DAFDB209F91EC88AEABFB8EF40700F11C469A656D3151D7B0EA599B60
            APIs
            • CreateFileW.KERNEL32(?,C0000000,00000003,00000000,00000003,00000080,00000000), ref: 00DF6733
            • _memset.LIBCMT ref: 00DF6754
            • DeviceIoControl.KERNEL32(00000000,0004D02C,?,00000200,?,00000200,?,00000000), ref: 00DF67A6
            • CloseHandle.KERNEL32(00000000), ref: 00DF67AF
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: CloseControlCreateDeviceFileHandle_memset
            • String ID:
            • API String ID: 1157408455-0
            • Opcode ID: 9041fc290224e49acb6a7ec818bbb0f126ddb2789e176151941fcf98f1fe47aa
            • Instruction ID: 350bc8a3ca76a7bd59c1ade689c806614fc56163612a529364a0256b845fd560
            • Opcode Fuzzy Hash: 9041fc290224e49acb6a7ec818bbb0f126ddb2789e176151941fcf98f1fe47aa
            • Instruction Fuzzy Hash: A0110A7190122CBAE72067A5AC4DFABBABCEF44724F10419AF504E71D0D2708F848B74
            APIs
              • Part of subcall function 00DEAA62: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00DEAA79
              • Part of subcall function 00DEAA62: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00DEAA83
              • Part of subcall function 00DEAA62: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00DEAA92
              • Part of subcall function 00DEAA62: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00DEAA99
              • Part of subcall function 00DEAA62: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00DEAAAF
            • GetLengthSid.ADVAPI32(?,00000000,00DEADE4,?,?), ref: 00DEB21B
            • GetProcessHeap.KERNEL32(00000008,00000000), ref: 00DEB227
            • HeapAlloc.KERNEL32(00000000), ref: 00DEB22E
            • CopySid.ADVAPI32(?,00000000,?), ref: 00DEB247
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: Heap$AllocInformationProcessToken$CopyErrorLastLength
            • String ID:
            • API String ID: 4217664535-0
            • Opcode ID: 325bf99f89018b41792002592905afdc97393ab0eb83e6e93dc7e4e23bbe1ddc
            • Instruction ID: 6b616ad1a31ad367b7b9783dc655882fd3231692b549943e86716cc8671fec00
            • Opcode Fuzzy Hash: 325bf99f89018b41792002592905afdc97393ab0eb83e6e93dc7e4e23bbe1ddc
            • Instruction Fuzzy Hash: D5119871901205EFDB04AF5ADD45AAF77B9EF85318F14802EEA42D7211D731AE44DB30
            APIs
            • SendMessageW.USER32(?,000000B0,?,?), ref: 00DEB498
            • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00DEB4AA
            • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00DEB4C0
            • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00DEB4DB
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: MessageSend
            • String ID:
            • API String ID: 3850602802-0
            • Opcode ID: a2e95a080e7c5ccb91adacbc0a3aa1b80efa1c770a45dde67463e4cfafec3bef
            • Instruction ID: e8d3e45daef15511c4ddb95fbf2557d7992b10862b9a722626c96720d359dc76
            • Opcode Fuzzy Hash: a2e95a080e7c5ccb91adacbc0a3aa1b80efa1c770a45dde67463e4cfafec3bef
            • Instruction Fuzzy Hash: 78115E7A900218FFDB11DF99CC85E9EBBB4FB08714F204091E604B7290D771AE10DBA4
            APIs
              • Part of subcall function 00DCB34E: GetWindowLongW.USER32(?,000000EB), ref: 00DCB35F
            • DefDlgProcW.USER32(?,00000020,?,00000000), ref: 00DCB5A5
            • GetClientRect.USER32(?,?), ref: 00E2E69A
            • GetCursorPos.USER32(?), ref: 00E2E6A4
            • ScreenToClient.USER32(?,?), ref: 00E2E6AF
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: Client$CursorLongProcRectScreenWindow
            • String ID:
            • API String ID: 4127811313-0
            • Opcode ID: 03ca819d608a5dba2c0c5c668d44b71aface922a6a544ffb82d51ce49c51f4ab
            • Instruction ID: e6eea4b0411f89cf0cb6355aa04e12b581b88a37a1ad644d06180a8be1445f42
            • Opcode Fuzzy Hash: 03ca819d608a5dba2c0c5c668d44b71aface922a6a544ffb82d51ce49c51f4ab
            • Instruction Fuzzy Hash: 1E11F53190012ABFCB10DFA9EC4ADEE7BB9EB09315F100456E951E7240D734EA96CBB1
            APIs
            • GetCurrentThreadId.KERNEL32 ref: 00DF7352
            • MessageBoxW.USER32(?,?,?,?), ref: 00DF7385
            • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 00DF739B
            • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00DF73A2
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
            • String ID:
            • API String ID: 2880819207-0
            • Opcode ID: 74f08fb29f52c855c3b3ac1f86b90315de09f8b791a745c99647c67122829c3f
            • Instruction ID: d8acdb9e3d05770154e80b39bab0a0ec061fb70e95a29d57791396a80e45c01b
            • Opcode Fuzzy Hash: 74f08fb29f52c855c3b3ac1f86b90315de09f8b791a745c99647c67122829c3f
            • Instruction Fuzzy Hash: 7311E576A08249BFC701DB6DAC09AEE7FED9B45310F148355F925E3261D7708D0897B0
            APIs
            • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00DCD1BA
            • GetStockObject.GDI32(00000011), ref: 00DCD1CE
            • SendMessageW.USER32(00000000,00000030,00000000), ref: 00DCD1D8
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: CreateMessageObjectSendStockWindow
            • String ID:
            • API String ID: 3970641297-0
            • Opcode ID: e1c1d2f538f3e19f352d92d482aaa7803820f69a08473b00d0839602907955d8
            • Instruction ID: 807595d434893ef9e4159ec9dc0d55144ef15306ff8020d6c9cf242077a9e399
            • Opcode Fuzzy Hash: e1c1d2f538f3e19f352d92d482aaa7803820f69a08473b00d0839602907955d8
            • Instruction Fuzzy Hash: BA11A17250160EBFEB024F909C59EEA7F6AFF09364F080126FA1562150C731DC60DBA0
            APIs
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
            • String ID:
            • API String ID: 3016257755-0
            • Opcode ID: 3c6a35542a271610c24967ae1addb0a5128256cd46e27c9700edfec13bdc5c5a
            • Instruction ID: 4ceed5a601f1fef1a259a163a2672a941122f345894a2f4ccefc91346754cbe3
            • Opcode Fuzzy Hash: 3c6a35542a271610c24967ae1addb0a5128256cd46e27c9700edfec13bdc5c5a
            • Instruction Fuzzy Hash: 87014C3600018EBBCF126E85DC068EE3F23FB18794B588455FE2859035D336CAB1ABA1
            APIs
              • Part of subcall function 00DD7A0D: __getptd_noexit.LIBCMT ref: 00DD7A0E
            • __lock.LIBCMT ref: 00DD748F
            • InterlockedDecrement.KERNEL32(?), ref: 00DD74AC
            • _free.LIBCMT ref: 00DD74BF
            • InterlockedIncrement.KERNEL32(01641CB0), ref: 00DD74D7
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: Interlocked$DecrementIncrement__getptd_noexit__lock_free
            • String ID:
            • API String ID: 2704283638-0
            • Opcode ID: 3fc6a0082fdee5e1fba3560e8a30afd80c3072cf6ffb9673e8f1a6af704944b0
            • Instruction ID: 4d8098b0565b3df39f2b5e2068e375deaad0fe6fed8b75c73da3d1bf35404227
            • Opcode Fuzzy Hash: 3fc6a0082fdee5e1fba3560e8a30afd80c3072cf6ffb9673e8f1a6af704944b0
            • Instruction Fuzzy Hash: 4401C431D49621ABC723AF65A80A75EBB60FF04B10F194097F81473780E7205900CFF2
            APIs
              • Part of subcall function 00DCAF83: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,?,00000000), ref: 00DCAFE3
              • Part of subcall function 00DCAF83: SelectObject.GDI32(?,00000000), ref: 00DCAFF2
              • Part of subcall function 00DCAF83: BeginPath.GDI32(?), ref: 00DCB009
              • Part of subcall function 00DCAF83: SelectObject.GDI32(?,00000000), ref: 00DCB033
            • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 00E1EA8E
            • LineTo.GDI32(00000000,?,?), ref: 00E1EA9B
            • EndPath.GDI32(00000000), ref: 00E1EAAB
            • StrokePath.GDI32(00000000), ref: 00E1EAB9
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
            • String ID:
            • API String ID: 1539411459-0
            • Opcode ID: c6f7f27d87f1a9898d4fe90f2401d3ffa1e3e8e5caea26cd99cb7233358fd8f1
            • Instruction ID: 9068c717b8372f62870ea8754fed44848bea4f11e09c82ec025f6de7fe2eb5a2
            • Opcode Fuzzy Hash: c6f7f27d87f1a9898d4fe90f2401d3ffa1e3e8e5caea26cd99cb7233358fd8f1
            • Instruction Fuzzy Hash: 70F0BE31049259BFDB129FA9AC0EFCA3F2AAF06710F044201FE01710E183B45599CBA5
            APIs
            • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00DEC84A
            • GetWindowThreadProcessId.USER32(?,00000000), ref: 00DEC85D
            • GetCurrentThreadId.KERNEL32 ref: 00DEC864
            • AttachThreadInput.USER32(00000000), ref: 00DEC86B
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
            • String ID:
            • API String ID: 2710830443-0
            • Opcode ID: d6f758bdb34dc077662ded6425982e6297c4a2aeca3e778660ff722139e4839b
            • Instruction ID: ced9df3a14b05be4af7277bffbea79937ee6a4deb8515f5daeb14dafea73288c
            • Opcode Fuzzy Hash: d6f758bdb34dc077662ded6425982e6297c4a2aeca3e778660ff722139e4839b
            • Instruction Fuzzy Hash: 28E03971146268BADB212BA3AC4EEDB7F2CEF067A1F008021B609A4460C6B1C585DBF0
            APIs
            • GetCurrentThread.KERNEL32 ref: 00DEB0D6
            • OpenThreadToken.ADVAPI32(00000000,?,?,?,00DEAC9D), ref: 00DEB0DD
            • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,00DEAC9D), ref: 00DEB0EA
            • OpenProcessToken.ADVAPI32(00000000,?,?,?,00DEAC9D), ref: 00DEB0F1
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: CurrentOpenProcessThreadToken
            • String ID:
            • API String ID: 3974789173-0
            • Opcode ID: 4e539711e20ecae707ebfc47e9ad31246789f6024af7885f6a6fff4832790c9c
            • Instruction ID: 6fb6348021253ff8d60ba37c5d359dc17d967405671086cac0f0ada84767834c
            • Opcode Fuzzy Hash: 4e539711e20ecae707ebfc47e9ad31246789f6024af7885f6a6fff4832790c9c
            • Instruction Fuzzy Hash: 08E04F326052159FD7202FB36D0CB473FA9EF55BA1F018818B241E6040DA2494058B60
            APIs
            • GetSysColor.USER32(00000008), ref: 00DCB496
            • SetTextColor.GDI32(?,000000FF), ref: 00DCB4A0
            • SetBkMode.GDI32(?,00000001), ref: 00DCB4B5
            • GetStockObject.GDI32(00000005), ref: 00DCB4BD
            • GetWindowDC.USER32(?,00000000), ref: 00E2DE2B
            • GetPixel.GDI32(00000000,00000000,00000000), ref: 00E2DE38
            • GetPixel.GDI32(00000000,?,00000000), ref: 00E2DE51
            • GetPixel.GDI32(00000000,00000000,?), ref: 00E2DE6A
            • GetPixel.GDI32(00000000,?,?), ref: 00E2DE8A
            • ReleaseDC.USER32(?,00000000), ref: 00E2DE95
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: Pixel$Color$ModeObjectReleaseStockTextWindow
            • String ID:
            • API String ID: 1946975507-0
            • Opcode ID: 3dd74d10e267635ad828e2de120a97dedf160eb73aa5b01384dddb9a291d0e88
            • Instruction ID: 13da1fe2b12ed07b2ef76a43ca4bc59376cb86fd1d61ef3bd71ba5477cf8f76c
            • Opcode Fuzzy Hash: 3dd74d10e267635ad828e2de120a97dedf160eb73aa5b01384dddb9a291d0e88
            • Instruction Fuzzy Hash: 95E0ED31508248AFDB215B65BC0DBD87F21AB51339F14C766F769680E1C7718985DB11
            APIs
            • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00DEB2DF
            • UnloadUserProfile.USERENV(?,?), ref: 00DEB2EB
            • CloseHandle.KERNEL32(?), ref: 00DEB2F4
            • CloseHandle.KERNEL32(?), ref: 00DEB2FC
              • Part of subcall function 00DEAB24: GetProcessHeap.KERNEL32(00000000,?,00DEA848), ref: 00DEAB2B
              • Part of subcall function 00DEAB24: HeapFree.KERNEL32(00000000), ref: 00DEAB32
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
            • String ID:
            • API String ID: 146765662-0
            • Opcode ID: 90efdec99881bebbbba694b2fd58038c85b7197aad9c8d3099d07f128f95d2ac
            • Instruction ID: 7603ca0a782c6b65c550faed9464de2ecc24e8842a42a165d5f82b5b98be77f3
            • Opcode Fuzzy Hash: 90efdec99881bebbbba694b2fd58038c85b7197aad9c8d3099d07f128f95d2ac
            • Instruction Fuzzy Hash: 37E02F36108409FFDB016B96EC0C859FF76FF993213108621F62591575CB32A875EB91
            APIs
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: CapsDesktopDeviceReleaseWindow
            • String ID:
            • API String ID: 2889604237-0
            • Opcode ID: 094588bcc62196e080bdda216b715ba222513e2a3cd2536b1b0de40a4b2f576c
            • Instruction ID: 0bcb61dd2a1f857c216a80650a22289a384cccfa1bc6c1f08c664dc820af007f
            • Opcode Fuzzy Hash: 094588bcc62196e080bdda216b715ba222513e2a3cd2536b1b0de40a4b2f576c
            • Instruction Fuzzy Hash: 85E01AB1104208EFDB015F71AC4DA6D7FA5EB4C350F118819F86AA7210CA7598458F50
            APIs
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: CapsDesktopDeviceReleaseWindow
            • String ID:
            • API String ID: 2889604237-0
            • Opcode ID: 329b750fee55e2d379220e0ed4369f067cc8bd807baf565df3a15687b0b0813e
            • Instruction ID: 8f02a9b30023a1406c2606880b8a8691998ea87f1fc40e19e29e408382572413
            • Opcode Fuzzy Hash: 329b750fee55e2d379220e0ed4369f067cc8bd807baf565df3a15687b0b0813e
            • Instruction Fuzzy Hash: 7FE046B1508208EFDB015F72EC4DA2D7FA9EB4C350F118819F96EAB210CF7998058F20
            APIs
            • OleSetContainedObject.OLE32(?,00000001), ref: 00DEDEAA
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: ContainedObject
            • String ID: AutoIt3GUI$Container
            • API String ID: 3565006973-3941886329
            • Opcode ID: bc03ed33d63eca445a9c77149f928f3197411954df71aacdcb7b01a3a6fdacab
            • Instruction ID: 11f285dcd4eb3e98b78b4cca0455d8237f64eb3320a12d19f6f3c64102341838
            • Opcode Fuzzy Hash: bc03ed33d63eca445a9c77149f928f3197411954df71aacdcb7b01a3a6fdacab
            • Instruction Fuzzy Hash: 46912670600741AFDB14DF65C888B6ABBBAFF49710F24856DF94ADB291DB70E841CB60
            APIs
              • Part of subcall function 00DCC6F4: _wcscpy.LIBCMT ref: 00DCC717
              • Part of subcall function 00DB936C: __swprintf.LIBCMT ref: 00DB93AB
              • Part of subcall function 00DB936C: __itow.LIBCMT ref: 00DB93DF
            • __wcsnicmp.LIBCMT ref: 00DFDEFD
            • WNetUseConnectionW.MPR(00000000,?,?,00000000,?,?,00000100,?), ref: 00DFDFC6
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: Connection__itow__swprintf__wcsnicmp_wcscpy
            • String ID: LPT
            • API String ID: 3222508074-1350329615
            • Opcode ID: f1f7842a500bc364c56d41faeed3e2d5e1b6acea3dbf319c90a72679152b3b26
            • Instruction ID: 59fad2004cd3b0998c1ab8d25ac6f168ebbd9a598b289b5435252b90607cd91e
            • Opcode Fuzzy Hash: f1f7842a500bc364c56d41faeed3e2d5e1b6acea3dbf319c90a72679152b3b26
            • Instruction Fuzzy Hash: 1E616175A04219AFCB14DF98C995EBEB7F5EF08310F058059F646AB291DB70AE40CB70
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: _wcscpy
            • String ID: I/$I/
            • API String ID: 3048848545-2526233121
            • Opcode ID: 88dfdb524e9d45900ed7a20722aa58de949687d2b7979f4fca71de7ff0cb1198
            • Instruction ID: ef215af49d19e828866234530b3a26e55cd0a890c560e6c750caf222b91480f9
            • Opcode Fuzzy Hash: 88dfdb524e9d45900ed7a20722aa58de949687d2b7979f4fca71de7ff0cb1198
            • Instruction Fuzzy Hash: 3241F83190021EAACF25DF98D441AFDB7B0EF48314F59D05BEA81A7191DB709E82CBB0
            APIs
            • Sleep.KERNEL32(00000000), ref: 00DCBCDA
            • GlobalMemoryStatusEx.KERNEL32 ref: 00DCBCF3
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: GlobalMemorySleepStatus
            • String ID: @
            • API String ID: 2783356886-2766056989
            • Opcode ID: 4bac44456636d85beb01e15ae50a45000651c1b0a7c42d410b60837f4b19b451
            • Instruction ID: a5c37832cc7ca51debf1f8d935a68500b42a8c74acbc556fc320057a4d548e63
            • Opcode Fuzzy Hash: 4bac44456636d85beb01e15ae50a45000651c1b0a7c42d410b60837f4b19b451
            • Instruction Fuzzy Hash: EC5126714087459BE320AF54EC86FAFBBE8FB94354F41484EF1C8520A6DF7185AC8B66
            APIs
              • Part of subcall function 00DB44ED: __fread_nolock.LIBCMT ref: 00DB450B
            • _wcscmp.LIBCMT ref: 00DFC65D
            • _wcscmp.LIBCMT ref: 00DFC670
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: _wcscmp$__fread_nolock
            • String ID: FILE
            • API String ID: 4029003684-3121273764
            • Opcode ID: d995c11e418ff84c970bb7be1c07aaf355a26e3ab77058a62131e7e1faeb1772
            • Instruction ID: 131ce42fb31b2a236d79391eedee4bf2fefc99da7f5a6a71eecea920900ec48d
            • Opcode Fuzzy Hash: d995c11e418ff84c970bb7be1c07aaf355a26e3ab77058a62131e7e1faeb1772
            • Instruction Fuzzy Hash: 6D41E372A0420EBADF20EAA4DC41FEF77B9EF49714F01406AF605EB191D6B19A14CB71
            APIs
            • SendMessageW.USER32(?,00001132,00000000,?), ref: 00E1A85A
            • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00E1A86F
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: MessageSend
            • String ID: '
            • API String ID: 3850602802-1997036262
            • Opcode ID: c7074d42d235f0b3ea41ec51cd26bda0f4d03f3671df0ceb00a8f9f9041e44c9
            • Instruction ID: bd3f5caa8c4de9381ee77772ea80d998d673a6566be55821417688b70033ed27
            • Opcode Fuzzy Hash: c7074d42d235f0b3ea41ec51cd26bda0f4d03f3671df0ceb00a8f9f9041e44c9
            • Instruction Fuzzy Hash: 5541E975E013099FDB14CFA9D885BEA7BB5FB08704F14106AE905AB381D770A985CFA1
            APIs
            • DestroyWindow.USER32(?,?,?,?), ref: 00E1980E
            • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 00E1984A
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: Window$DestroyMove
            • String ID: static
            • API String ID: 2139405536-2160076837
            • Opcode ID: 69e424248a3843c182765fcff435cc32efc8aaa15e3f1869244326a643b453e9
            • Instruction ID: f90cfdff7d78b42bf72c04743caa196bce1082e15adb37ada9503a92c2903288
            • Opcode Fuzzy Hash: 69e424248a3843c182765fcff435cc32efc8aaa15e3f1869244326a643b453e9
            • Instruction Fuzzy Hash: E7319C71110204AEEB149F78CC91BFB77A9FF99764F009619F8A9E7191CB30AC81CB60
            APIs
            • _memset.LIBCMT ref: 00DF51C6
            • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00DF5201
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: InfoItemMenu_memset
            • String ID: 0
            • API String ID: 2223754486-4108050209
            • Opcode ID: f115aabf5579c542e01f76ea9aee2179a62e3aa8258653b690370fc11ece45ed
            • Instruction ID: d0dcc3bbaf31bcc46390ba7f5c6ce219f8916efe4a5430d0b29f804ac560ca9b
            • Opcode Fuzzy Hash: f115aabf5579c542e01f76ea9aee2179a62e3aa8258653b690370fc11ece45ed
            • Instruction Fuzzy Hash: 0731F53160030C9BEB24CF99E845BBEBBF4EF46354F198119EB86A61A4D7709A44CB34
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: __snwprintf
            • String ID: , $$AUTOITCALLVARIABLE%d
            • API String ID: 2391506597-2584243854
            • Opcode ID: 1dbb883f410d1280c711bc48271da4f0f973dff1c162c48ccf0b853361423ecf
            • Instruction ID: 0d1b880bcc9795eefa6487fd539f638dd37fde98e8748318bf2dbe2bd27c3185
            • Opcode Fuzzy Hash: 1dbb883f410d1280c711bc48271da4f0f973dff1c162c48ccf0b853361423ecf
            • Instruction Fuzzy Hash: 16217A71600218AFCF10EFA4E892BEE77B4EF45740F001499F406BB191DA71EA558BB1
            APIs
            • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00E1945C
            • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00E19467
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: MessageSend
            • String ID: Combobox
            • API String ID: 3850602802-2096851135
            • Opcode ID: cbec2d8cdb0e56e502cc3db75d7453a9892e584ba71ed35f898755561775c5f7
            • Instruction ID: 2d919809f2fe512fc31031702657a9ad4599030c5b99d10d63c003194f67272a
            • Opcode Fuzzy Hash: cbec2d8cdb0e56e502cc3db75d7453a9892e584ba71ed35f898755561775c5f7
            • Instruction Fuzzy Hash: FA11B2B1300208AFEF15DE54DCD0EFB376FEB583A8F101125F929A72A1D6319C928760
            APIs
              • Part of subcall function 00DCB34E: GetWindowLongW.USER32(?,000000EB), ref: 00DCB35F
            • GetActiveWindow.USER32 ref: 00E1DA7B
            • EnumChildWindows.USER32(?,00E1D75F,00000000), ref: 00E1DAF5
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: Window$ActiveChildEnumLongWindows
            • String ID: T1
            • API String ID: 3814560230-924183305
            • Opcode ID: f7dfdc0e1505cd650cfbe04ba249fb2ac08db19fe32c041a971330b6c1e40cab
            • Instruction ID: afce037178530e94308e4f1e7e99eaff69fe4b7268c38e7e2f82b9d674a5e05b
            • Opcode Fuzzy Hash: f7dfdc0e1505cd650cfbe04ba249fb2ac08db19fe32c041a971330b6c1e40cab
            • Instruction Fuzzy Hash: 3C212675208301DFC714DF69E852AA677E5EF89320F251659E86AA73E0D730A884CB60
            APIs
              • Part of subcall function 00DCD17C: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00DCD1BA
              • Part of subcall function 00DCD17C: GetStockObject.GDI32(00000011), ref: 00DCD1CE
              • Part of subcall function 00DCD17C: SendMessageW.USER32(00000000,00000030,00000000), ref: 00DCD1D8
            • GetWindowRect.USER32(00000000,?), ref: 00E19968
            • GetSysColor.USER32(00000012), ref: 00E19982
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: Window$ColorCreateMessageObjectRectSendStock
            • String ID: static
            • API String ID: 1983116058-2160076837
            • Opcode ID: 4b316dfb3651ceb556461cc18436f7206789dfee5a03d6c61a86bf6d5a61b313
            • Instruction ID: 2244bac6ae77f582e760b84d84c26326ccb42f8820d521790cfc0abf953ec9ba
            • Opcode Fuzzy Hash: 4b316dfb3651ceb556461cc18436f7206789dfee5a03d6c61a86bf6d5a61b313
            • Instruction Fuzzy Hash: 17116A72510209AFDB04DFB8CC45EEA7BB8FB48344F055628F956E3251D734E850DB60
            APIs
            • GetWindowTextLengthW.USER32(00000000), ref: 00E19699
            • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 00E196A8
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: LengthMessageSendTextWindow
            • String ID: edit
            • API String ID: 2978978980-2167791130
            • Opcode ID: e0d3de6443a85ac75358f93ab59320c61388b50169e09192c15d47817a51dea2
            • Instruction ID: e5a454c096f2f1a19cfce370a1ee24fb21fe709d58b6431bc05faebd84e59563
            • Opcode Fuzzy Hash: e0d3de6443a85ac75358f93ab59320c61388b50169e09192c15d47817a51dea2
            • Instruction Fuzzy Hash: F1118C71500208AFEB109FA4EC64EEB3B6AEB053B8F505314F965A31E1C735DC909BB0
            APIs
            • _memset.LIBCMT ref: 00DF52D5
            • GetMenuItemInfoW.USER32(00000030,?,00000000,00000030), ref: 00DF52F4
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: InfoItemMenu_memset
            • String ID: 0
            • API String ID: 2223754486-4108050209
            • Opcode ID: e7ff0b06866edb1931e215671bd8dd8c99a7a44085519a02658cfcdf6720d471
            • Instruction ID: 9e0326486b66611fe918ecce8e5eb60f9dd4000fd7430dc2d78d46e4c368bd96
            • Opcode Fuzzy Hash: e7ff0b06866edb1931e215671bd8dd8c99a7a44085519a02658cfcdf6720d471
            • Instruction Fuzzy Hash: 7D110331900728AFDB24DA9CF844BBD77E8AB05354F0E8215EB45A7298D3B0ED04C7B1
            APIs
            • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 00E04DF5
            • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 00E04E1E
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: Internet$OpenOption
            • String ID: <local>
            • API String ID: 942729171-4266983199
            • Opcode ID: 6519a650de1d1ab597e04e24dda3c4cb2e8436703a596a9a706051c603b5e057
            • Instruction ID: a18846d3428027ec1f6d05ac97880467c92a4655ad322484272b8c44597e4c2f
            • Opcode Fuzzy Hash: 6519a650de1d1ab597e04e24dda3c4cb2e8436703a596a9a706051c603b5e057
            • Instruction Fuzzy Hash: C8119EF1501225FADB258B61CD88EFBFBA8FB16758F10922AF605A61C0D2705995C6E0
            APIs
            • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 00DE37A7
            • ___raise_securityfailure.LIBCMT ref: 00DE388E
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: FeaturePresentProcessor___raise_securityfailure
            • String ID: (
            • API String ID: 3761405300-2982846942
            • Opcode ID: 01506d619a9088bd5600cd067a670d89f01018b81142bd086fe5450395544452
            • Instruction ID: f5bfc7553361fa89908efa5a754ffbae99e9c137250f84d2ea055b7ac823f690
            • Opcode Fuzzy Hash: 01506d619a9088bd5600cd067a670d89f01018b81142bd086fe5450395544452
            • Instruction Fuzzy Hash: 7D21DFB5501304DFDB10EF56F9956117BB4FB48314F24982AE60DAB2A0E3F0AAC8CF56
            APIs
            • inet_addr.WSOCK32(00000000,00000000,?,?,?,00000000), ref: 00E0A84E
            • htons.WSOCK32(00000000,?,00000000), ref: 00E0A88B
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: htonsinet_addr
            • String ID: 255.255.255.255
            • API String ID: 3832099526-2422070025
            • Opcode ID: 184705c3ae82ea7426e311743e0b854acb303cf9560b86670ecdfb83859f390b
            • Instruction ID: f5086d5f8b59614f6c07917ac6a8355e7386bcda4adac9265f2ecb073bc809bf
            • Opcode Fuzzy Hash: 184705c3ae82ea7426e311743e0b854acb303cf9560b86670ecdfb83859f390b
            • Instruction Fuzzy Hash: 49012234200308ABCB24AF68D88AFADB364EF44314F14A42AF512BB2D1C731E8468762
            APIs
            • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00DEB7EF
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: MessageSend
            • String ID: ComboBox$ListBox
            • API String ID: 3850602802-1403004172
            • Opcode ID: 8103ba21ee77457e5409997dfb82392bcfd29831f5ee6cc50195ddd9fe5258e3
            • Instruction ID: 16b6a5f15d0f90ef3d2911efd177218af672c9c165acdcbd26e17d3bde83a5dc
            • Opcode Fuzzy Hash: 8103ba21ee77457e5409997dfb82392bcfd29831f5ee6cc50195ddd9fe5258e3
            • Instruction Fuzzy Hash: 9D019E71650258EBCB04FBA4DC529FE3369FF46364B04061DF4A2672D2EB61A9188BB4
            APIs
            • SendMessageW.USER32(?,00000180,00000000,?), ref: 00DEB6EB
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: MessageSend
            • String ID: ComboBox$ListBox
            • API String ID: 3850602802-1403004172
            • Opcode ID: 40ebf7d6d260cd741ad972d4018eaa99538a249bbe7a78dfba2304aba569df44
            • Instruction ID: d7567f68b32d39249c0a900f18606e67c1c9e81517a51e1fb588807b98e53363
            • Opcode Fuzzy Hash: 40ebf7d6d260cd741ad972d4018eaa99538a249bbe7a78dfba2304aba569df44
            • Instruction Fuzzy Hash: 40018F71641148ABCB04FBA5D952FFF77B9EB06344B14002DB542B7181EB90AE188BB5
            APIs
            • SendMessageW.USER32(?,00000182,?,00000000), ref: 00DEB76C
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: MessageSend
            • String ID: ComboBox$ListBox
            • API String ID: 3850602802-1403004172
            • Opcode ID: 61bd599dd1b8d553486e0afdfcc3029cb6228ccea8b23827ba6babcc68c8a132
            • Instruction ID: aca85c4b10fcf2b65a5f6f2c358d1fd38517ccc06813d014d886e0e20e2b9155
            • Opcode Fuzzy Hash: 61bd599dd1b8d553486e0afdfcc3029cb6228ccea8b23827ba6babcc68c8a132
            • Instruction Fuzzy Hash: 6701D675640244EBCB01F7A5D903FFF73ACEB05344F54001AB442B3192DBA1AE1987B5
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: __calloc_crt
            • String ID: "
            • API String ID: 3494438863-357034475
            • Opcode ID: 43ec4282d4349ddef397fb68f45f3de8df77cf71cf4bf10c3f581a00fb01035a
            • Instruction ID: fef91af6f34b83519ed54f61c39654e4ac09b110515813baaf7cdb0fc9d5bb44
            • Opcode Fuzzy Hash: 43ec4282d4349ddef397fb68f45f3de8df77cf71cf4bf10c3f581a00fb01035a
            • Instruction Fuzzy Hash: 80F0C2712496019FE724DB1ABC517A667DAE744760B18012FF308EA3A6E730C8C18BB4
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: ClassName_wcscmp
            • String ID: #32770
            • API String ID: 2292705959-463685578
            • Opcode ID: f6250bc51651aef7f4d8539d9c9ba8da062ff252ac5f2f4eaf4c37a25f27c6bb
            • Instruction ID: d9ccd0e28506a7ffe52c2368f2084f804238ef8f5c2f65f7c780b9b84329c288
            • Opcode Fuzzy Hash: f6250bc51651aef7f4d8539d9c9ba8da062ff252ac5f2f4eaf4c37a25f27c6bb
            • Instruction Fuzzy Hash: 1BE09277A043282BD720EAA6EC0AEDBFBACEB55760F014116B915E3141D670A64587E0
            APIs
            • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 00DEA63F
              • Part of subcall function 00DD13F1: _doexit.LIBCMT ref: 00DD13FB
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: Message_doexit
            • String ID: AutoIt$Error allocating memory.
            • API String ID: 1993061046-4017498283
            • Opcode ID: 94e39ba38972a266e3ddc2e3004b98737f23670287ea2d0274b64bd166742e0b
            • Instruction ID: d735260098334e971571669f792a8462fbd1554fb057256d3b8c4f3746a74f7f
            • Opcode Fuzzy Hash: 94e39ba38972a266e3ddc2e3004b98737f23670287ea2d0274b64bd166742e0b
            • Instruction Fuzzy Hash: 8BD05B313C8B1837D214379D7C1BFC5754CCB55B95F04401ABB08E56C249E2D55042F9
            APIs
            • GetSystemDirectoryW.KERNEL32(?), ref: 00E2ACC0
            • FreeLibrary.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000104), ref: 00E2AEBD
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: DirectoryFreeLibrarySystem
            • String ID: WIN_XPe
            • API String ID: 510247158-3257408948
            • Opcode ID: e2e8051a477b28073cb82ee2eb149ef2d859b15a13d42fc400f1acfcaeebe630
            • Instruction ID: 7c9b834ed096a67b75e35e64d5e6a8a7716950dc1b7ac30916eab5b701878d1c
            • Opcode Fuzzy Hash: e2e8051a477b28073cb82ee2eb149ef2d859b15a13d42fc400f1acfcaeebe630
            • Instruction Fuzzy Hash: 72E0ED70C04619DFCB11DBA5ED49AECFBB9AB48301F1890A5E156B2260DB705A88DF22
            APIs
            • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00E186E2
            • PostMessageW.USER32(00000000), ref: 00E186E9
              • Part of subcall function 00DF7A58: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?), ref: 00DF7AD0
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: FindMessagePostSleepWindow
            • String ID: Shell_TrayWnd
            • API String ID: 529655941-2988720461
            • Opcode ID: 4177c5850536e0fab2d03d509c88c631c0782674e04969687ea7ddac7500f4d9
            • Instruction ID: 114ef55842ac26f9c16d4372a6fe283eeb06636f8ad1615e8b27c2f5098da69d
            • Opcode Fuzzy Hash: 4177c5850536e0fab2d03d509c88c631c0782674e04969687ea7ddac7500f4d9
            • Instruction Fuzzy Hash: 45D0C931789318BBE2646771AC0FFC67E189B04B21F111815B75ABA1D0C9A1A9548664
            APIs
            • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00E186A2
            • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 00E186B5
              • Part of subcall function 00DF7A58: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?), ref: 00DF7AD0
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.1336762879.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
            • Associated: 00000001.00000002.1336743484.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E3D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336818674.0000000000E5E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336869898.0000000000E6A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.1336886581.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_db0000_A2028041200SD.jbxd
            Similarity
            • API ID: FindMessagePostSleepWindow
            • String ID: Shell_TrayWnd
            • API String ID: 529655941-2988720461
            • Opcode ID: 5fbeb071da025cd8078671b5f84f1f2379bb9ae2e6d20c3fc6c402f32f09301d
            • Instruction ID: f1c61fe20075584b213f189dc6f8fe308910df90d230049cc278ff3312fe6cea
            • Opcode Fuzzy Hash: 5fbeb071da025cd8078671b5f84f1f2379bb9ae2e6d20c3fc6c402f32f09301d
            • Instruction Fuzzy Hash: AED0123178831CBBE2646771BC0FFD67E189B04B21F111815B75ABB1D0C9E1E954C764